Denial-of-Service Vulnerability of Hash-based Transaction Sharding: Attacks and Countermeasures

07/16/2020
by   Truc Nguyen, et al.
0

Since 2016, sharding has become an auspicious solution to tackle the scalability issue in legacy blockchain systems. Despite its potential to strongly boost the blockchain throughput, sharding comes with its own security issues. To ease the process of deciding which shard to place transactions, existing sharding protocols use a hash-based transaction sharding in which the hash value of a transaction determines its output shard. Unfortunately, we show that this mechanism opens up a loophole that could be exploited to conduct a single-shard flooding attack, a type of Denial-of-Service (DoS) attack, to overwhelm a single shard that ends up reducing the performance of the system as a whole. To counter the single-shard flooding attack, we propose a countermeasure that essentially eliminates the loophole by rejecting the use of hash-based transaction sharding. The countermeasure leverages the Trusted Execution Environment (TEE) to let blockchain's validators securely execute a transaction sharding algorithm with a negligible overhead. We provide a formal specification for the countermeasure and analyze its security properties in the Universal Composability (UC) framework. Finally, a proof-of-concept is developed to demonstrate the feasibility and practicality of our solution.

READ FULL TEXT
research
03/30/2023

Lockless Blockchain Sharding with Multiversion Control

Sharding is used to address the performance and scalability issues of th...
research
06/13/2022

A novel reconstruction attack on foreign-trade official statistics, with a Brazilian case study

In this paper we describe, formalize, implement, and experimentally eval...
research
12/22/2022

TxAllo: Dynamic Transaction Allocation in Sharded Blockchain Systems

The scalability problem has been one of the most significant barriers li...
research
07/11/2022

TIPS: Transaction Inclusion Protocol with Signaling in DAG-based Blockchain

Directed Acyclic Graph (DAG) is a popular approach to achieve scalabilit...
research
06/15/2020

The EMV Standard: Break, Fix, Verify

EMV is the international protocol standard for smartcard payment and is ...
research
07/08/2019

Metamorphic IOTA

IOTA opened recently a new line of research in distributed ledgers area ...
research
09/01/2020

Transaction Pricing for Maximizing Throughput in a Sharded Blockchain Ledger

In this paper, we present a pricing mechanism that aligns incentives of ...

Please sign up or login with your details

Forgot password? Click here to reset