SquirRL: Automating Attack Discovery on Blockchain Incentive Mechanisms with Deep Reinforcement Learning

by   Charlie Hou, et al.

Incentive mechanisms are central to the functionality of permissionless blockchains: they incentivize participants to run and secure the underlying consensus protocol. Designing incentive-compatible incentive mechanisms is notoriously challenging, however. Even systems with strong theoretical security guarantees in traditional settings, where users are either Byzantine or honest, often exclude analysis of rational users, who may exploit incentives to deviate from honest behavior. As a result, most public blockchains today use incentive mechanisms whose security properties are poorly understood and largely untested. In this work, we propose SquirRL, a framework for using deep reinforcement learning to identify attack strategies on blockchain incentive mechanisms. With minimal setup, SquirRL replicates known theoretical results on the Bitcoin protocol. In more complex and realistic settings, as when mining power varies over time, it identifies attack strategies superior to those known in the literature. Finally, SquirRL yields results suggesting that classical selfish mining attacks against Bitcoin lose effectiveness in the presence of multiple attackers. These results shed light on why selfish mining, which is unobserved to date in the wild, may be a poor attack strategy.


page 18

page 19


BDoS: Blockchain Denial of Service

Proof-of-work (PoW) cryptocurrency blockchains like Bitcoin secure vast ...

Tailstorm: A Secure and Fair Blockchain for Cash Transactions

Proof-of-work (PoW) cryptocurrencies rely on a balance of security and f...

Greedy-Mine: A Profitable Mining Attack Strategy in Bitcoin-NG

Bitcoin-NG is an extensible blockchain protocol based on the same trust ...

Incentive Analysis of Bitcoin-NG, Revisited

Bitcoin-NG is among the first blockchain protocols to approach the near-...

Impossibility of Full Decentralization in Permissionless Blockchains

Bitcoin uses blockchain technology and proof-of-work (PoW) mechanism whe...

Information Propagation on Permissionless Blockchains

Blockchain technology, as a decentralized and non-hierarchical platform,...

Nik Defense: An Artificial Intelligence Based Defense Mechanism against Selfish Mining in Bitcoin

The Bitcoin cryptocurrency has received much attention recently. In the ...

Please sign up or login with your details

Forgot password? Click here to reset