Counting Down Thunder: Timing Attacks on Privacy in Payment Channel Networks

06/22/2020
by   Elias Rohrer, et al.
0

The Lightning Network is a scaling solution for Bitcoin that promises to enable rapid and private payment processing. In Lightning, multi-hop payments are secured by utilizing Hashed Time-Locked Contracts (HTLCs) and encrypted on the network layer by an onion routing scheme to avoid information leakage to intermediate nodes. In this work, we however show that the privacy guarantees of the Lightning Network may be subverted by an on-path adversary conducting timing attacks on the HTLC state negotiation messages. To this end, we provide estimators that enable an adversary to reduce the anonymity set and infer the likeliest payment endpoints. We developed a proof-of-concept measurement node that shows the feasibility of attaining time differences and evaluate the adversarial success in model-based network simulations. We find that controlling a small number malicious nodes is sufficient to observe a large share of all payments, emphasizing the relevance of the on-path adversary model. Moreover, we show that adversaries of different magnitudes could employ timing-based attacks to deanonymize payment endpoints with high precision and recall.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/05/2023

The Adversarial Implications of Variable-Time Inference

Machine learning (ML) models are known to be vulnerable to a number of a...
research
08/03/2022

Mass Exit Attacks on the Lightning Network

The Lightning Network (LN) has enjoyed rapid growth over recent years, a...
research
02/28/2020

Toward Active and Passive Confidentiality Attacks On Cryptocurrency Off-Chain Networks

Cryptocurrency off-chain networks such as Lightning (e.g., Bitcoin) or R...
research
01/17/2019

Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks

We consider the secure communication problem for broadcasting of two enc...
research
03/14/2018

A Game-Theoretic Framework for the Virtual Machines Migration Timing Problem

In a multi-tenant cloud, a number of Virtual Machines (VMs) are collocat...
research
12/31/2018

Stealing Neural Networks via Timing Side Channels

Deep learning is gaining importance in many applications and Cloud infra...
research
07/02/2019

Padding Ain't Enough: Assessing the Privacy Guarantees of Encrypted DNS

DNS over TLS (DoT) and DNS over HTTPS (DoH) encrypt DNS to guard user pr...

Please sign up or login with your details

Forgot password? Click here to reset