Low-cost attacks on Ethereum 2.0 by sub-1/3 stakeholders

02/03/2021
by   Michael Neuder, et al.
0

We outline two dishonest strategies that can be cheaply executed on the Ethereum 2.0 beacon chain, even by validators holding less than one-third of the total stake: malicious chain reorganizations ("reorgs") and finality delays. In a malicious reorg, an attacker withholds their blocks and attestations before releasing them at an opportune time in order to force a chain reorganization, which they can take advantage of by double-spending or front-running transactions. To execute a finality delay an attacker uses delayed block releases and withholding of attestations to increase the mean and variance of the time it takes blocks to become finalized. This impacts the efficiency and predictability of the system. We provide a probabilistic and cost analysis for each of these attacks, considering a validator with 30 the total stake.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/22/2018

The Impact of Uncle Rewards on Selfish Mining in Ethereum

Many of today's crypto currencies use blockchains as decentralized ledge...
research
09/11/2020

Defending Against Malicious Reorgs in Tezos Proof-of-Stake

Blockchains are intended to be immutable, so an attacker who is able to ...
research
06/02/2020

Time-Dilation Attacks on the Lightning Network

Lightning Network (LN) is a widely-used network of payment channels enab...
research
05/24/2020

Better Late than Never; Scaling Computations in Blockchain by Delaying Transactions

Proof-of-Work (PoW) based blockchains typically allocate only a tiny fra...
research
10/29/2022

Optimistic and Validity Rollups: Analysis and Comparison between Optimism and StarkNet

The thesis addresses the problem of scalability in decentralized blockch...
research
06/15/2018

Design Patterns which Facilitate Message Digest Collision Attacks on Blockchains

Message digest algorithms are one of the underlying building blocks of b...
research
11/02/2020

Error- and Tamper-Tolerant State Estimation for Discrete Event Systems under Cost Constraints

This paper deals with the state estimation problem in discrete-event sys...

Please sign up or login with your details

Forgot password? Click here to reset