Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators

08/01/2023
by   Alpesh Bhudia, et al.
0

Consensus algorithms facilitate agreement on and resolution of blockchain functions, such as smart contracts and transactions. Ethereum uses a Proof-of-Stake (PoS) consensus mechanism, which depends on financial incentives to ensure that validators perform certain duties and do not act maliciously. Should a validator attempt to defraud the system, legitimate validators will identify this and then staked cryptocurrency is `burned' through a process of slashing. In this paper, we show that an attacker who has compromised a set of validators could threaten to perform malicious actions that would result in slashing and thus, hold those validators to ransom. We use game theory to study how an attacker can coerce payment from a victim, for example by deploying a smart contract to provide a root of trust shared between attacker and victim during the extortion process. Our game theoretic model finds that it is in the interests of the validators to fully pay the ransom due to a lack of systemic protections for validators. Financial risk is solely placed on the victim during such an attack, with no mitigations available to them aside from capitulation (payment of ransom) in many scenarios. Such attacks could be disruptive to Ethereum and, likely, to many other PoS networks, if public trust in the validator system is eroded. We also discuss and evaluate potential mitigation measures arising from our analysis of the game theoretic model.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/06/2021

Reentrancy Vulnerability Identification in Ethereum Smart Contracts

Ethereum Smart contracts use blockchain to transfer values among peers o...
research
11/09/2018

EASYFLOW: Keep Ethereum Away From Overflow

While Ethereum smart contracts enabled a wide range of blockchain applic...
research
03/31/2023

The Blockchain Imitation Game

The use of blockchains for automated and adversarial trading has become ...
research
06/06/2021

Adversarial Classification of the Attacks on Smart Grids Using Game Theory and Deep Learning

Smart grids are vulnerable to cyber-attacks. This paper proposes a game-...
research
06/22/2020

MAD-HTLC: Because HTLC is Crazy-Cheap to Attack

Smart Contracts and transactions allow users to implement elaborate cons...
research
05/07/2023

Stackelberg Attacks or: How I Learned to Stop Worrying and Trust the Blockchain

We identify a subtle security issue that impacts the design of smart con...
research
04/30/2023

Breaking Blockchain Rationality with Out-of-Band Collusion

Blockchain systems often rely on rationality assumptions for their secur...

Please sign up or login with your details

Forgot password? Click here to reset