Revisiting Double-Spending Attacks on the Bitcoin Blockchain: New Findings

被引:3
|
作者
Zheng, Jian [1 ]
Huang, Huawei [1 ]
Li, Canlin [1 ]
Zheng, Zibin [1 ]
Guo, Song [2 ]
机构
[1] Sun Yat Sen Univ, Sch Comp Sci & Engn, Guangzhou, Peoples R China
[2] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Peoples R China
来源
2021 IEEE/ACM 29TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS) | 2021年
基金
中国国家自然科学基金;
关键词
Bitcoin Blockchain; Double-Spending Attack;
D O I
10.1109/IWQOS52092.2021.9521306
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Bitcoin is currently the cryptocurrency with the largest market share. Many previous studies have explored the security of Bitcoin from the perspective of blockchain mining. Especially on the double-spending attacks (DSA), some state-of-the-art studies have proposed various analytical models, aiming to understand the insights behind the double-spending attacks. However, we believe that advanced versions of DSA can be developed to create new threats for the Bitcoin ecosystem. To this end, this paper mainly presents a new type of double-spending attack named Adaptive DSA in the context of the Bitcoin blockchain, and discloses the associated insights. In our analytical model, the double-spending attack is converted into a Markov Decision Process. We then exploit the Stochastic Dynamic Programming (SDP) approach to obtain the optimal attack strategies towards Adaptive DSA. Through the proposed analytical model and the disclosed insights behind Adaptive DSA, we aim to alert the Bitcoin ecosystem that the threat of double-spending attacks is still at a dangerous level.
引用
收藏
页数:6
相关论文
共 8 条
  • [1] ZCC: Mitigating Double-spending Attacks in Micropayment Bitcoin Transactions
    Arote, Prerna
    Kuri, Joy
    2022 FOURTH INTERNATIONAL CONFERENCE ON BLOCKCHAIN COMPUTING AND APPLICATIONS (BCCA), 2022, : 245 - 252
  • [2] Profitable Double-Spending Attacks
    Jang, Jehyuk
    Lee, Heung-No
    APPLIED SCIENCES-BASEL, 2020, 10 (23): : 1 - 23
  • [3] Adaptive Double-Spending Attacks on PoW-Based Blockchains
    Zheng, Jian
    Huang, Huawei
    Zheng, Zibin
    Guo, Song
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (03) : 1098 - 1110
  • [4] Securing IoT Transactions Against Double-Spending Attacks based on Signaling Game Approach
    Benaddi, Hafsa
    Jouhari, Mohammed
    Ibrahimi, Khalil
    Benslimane, Abderrahim
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [5] Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks
    Jiang, Yiming
    Zhang, Jiangfan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8155 - 8171
  • [6] Opportunistic Algorithmic Double-Spending: How I Learned to Stop Worrying and Love the Fork
    Stifter, Nicholas
    Judmayer, Aljosha
    Schindler, Philipp
    Weippl, Edgar
    COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 46 - 66
  • [7] A novel double spending attack countermeasure in blockchain
    Nicolas, Kervins
    Wang, Yi
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 383 - 388
  • [8] Blockchain based optimized data storage with secure communication for Internet of Vehicles considering active, passive, and double spending attacks
    Yahaya, Adamu Sani
    Javaid, Nadeem
    Zeadally, Sherali
    Farooq, Hassan
    VEHICULAR COMMUNICATIONS, 2022, 37