Defending Against Malicious Reorgs in Tezos Proof-of-Stake

09/11/2020
by   Michael Neuder, et al.
0

Blockchains are intended to be immutable, so an attacker who is able to delete transactions through a chain reorganization (a malicious reorg) can perform a profitable double-spend attack. We study the rate at which an attacker can execute reorgs in the Tezos Proof-of-Stake protocol. As an example, an attacker with 40 20-block malicious reorg at an average rate of once per day, and the attack probability increases super-linearly as the staking power grows beyond 40 Moreover, an attacker of the Tezos protocol knows in advance when an attack opportunity will arise, and can use this knowledge to arrange transactions to double-spend. We show that in particular cases, the Tezos protocol can be adjusted to protect against deep reorgs. For instance, we demonstrate protocol parameters that reduce the rate of length-20 reorg opportunities for a 40 attacker by two orders of magnitude. We also observe a trade-off between optimizing for robustness to deep reorgs (costly deviations that may be net profitable because they enable double-spends) and robustness to selfish mining (mining deviations that result in typically short reorgs that are profitable even without double-spends). That is, the parameters that optimally protect against one make the other attack easy. Finally, we develop a method that monitors the Tezos blockchain health with respect to malicious reorgs using only publicly available information.

READ FULL TEXT

page 6

page 8

research
02/25/2020

Double-Spend Counterattacks: Threat of Retaliation in Proof-of-Work Systems

Proof-of-Work mining is intended to provide blockchains with robustness ...
research
10/25/2022

Leveraging the Verifier's Dilemma to Double Spend in Bitcoin

We describe and analyze perishing mining, a novel block-withholding mini...
research
02/03/2021

Low-cost attacks on Ethereum 2.0 by sub-1/3 stakeholders

We outline two dishonest strategies that can be cheaply executed on the ...
research
08/10/2022

Block Double-Submission Attack: Block Withholding Can Be Self-Destructive

Proof-of-Work (PoW) is a Sybil control mechanism adopted in blockchain-b...
research
02/01/2023

Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-like Blockchains? Quantitative Analysis

GHOST, like the longest-chain protocol, is a chain selection protocol an...
research
04/30/2023

Breaking Blockchain Rationality with Out-of-Band Collusion

Blockchain systems often rely on rationality assumptions for their secur...
research
08/17/2023

RatGPT: Turning online LLMs into Proxies for Malware Attacks

The evolution of Generative AI and the capabilities of the newly release...

Please sign up or login with your details

Forgot password? Click here to reset