SquirRL: Automating Attack Discovery on Blockchain Incentive Mechanisms with Deep Reinforcement Learning

12/04/2019
by   Charlie Hou, et al.
0

Incentive mechanisms are central to the functionality of permissionless blockchains: they incentivize participants to run and secure the underlying consensus protocol. Designing incentive-compatible incentive mechanisms is notoriously challenging, however. Even systems with strong theoretical security guarantees in traditional settings, where users are either Byzantine or honest, often exclude analysis of rational users, who may exploit incentives to deviate from honest behavior. As a result, most public blockchains today use incentive mechanisms whose security properties are poorly understood and largely untested. In this work, we propose SquirRL, a framework for using deep reinforcement learning to identify attack strategies on blockchain incentive mechanisms. With minimal setup, SquirRL replicates known theoretical results on the Bitcoin protocol. In more complex and realistic settings, as when mining power varies over time, it identifies attack strategies superior to those known in the literature. Finally, SquirRL yields results suggesting that classical selfish mining attacks against Bitcoin lose effectiveness in the presence of multiple attackers. These results shed light on why selfish mining, which is unobserved to date in the wild, may be a poor attack strategy.

READ FULL TEXT

page 18

page 19

research
12/16/2019

BDoS: Blockchain Denial of Service

Proof-of-work (PoW) cryptocurrency blockchains like Bitcoin secure vast ...
research
06/21/2023

Tailstorm: A Secure and Fair Blockchain for Cash Transactions

Proof-of-work (PoW) cryptocurrencies rely on a balance of security and f...
research
06/06/2023

Greedy-Mine: A Profitable Mining Attack Strategy in Bitcoin-NG

Bitcoin-NG is an extensible blockchain protocol based on the same trust ...
research
01/14/2020

Incentive Analysis of Bitcoin-NG, Revisited

Bitcoin-NG is among the first blockchain protocols to approach the near-...
research
05/13/2019

Impossibility of Full Decentralization in Permissionless Blockchains

Bitcoin uses blockchain technology and proof-of-work (PoW) mechanism whe...
research
12/20/2017

Information Propagation on Permissionless Blockchains

Blockchain technology, as a decentralized and non-hierarchical platform,...
research
01/26/2023

Nik Defense: An Artificial Intelligence Based Defense Mechanism against Selfish Mining in Bitcoin

The Bitcoin cryptocurrency has received much attention recently. In the ...

Please sign up or login with your details

Forgot password? Click here to reset