SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Downloaden Sie, um offline zu lesen
Profitable Double-Spending
Attacks & Prevention
Jehyuk Jang and Heung-No Lee
Department of electrical engineering and computer science, GIST
1
2
• 1995년 대학원 개원
• 2010년 학부 개설
• 학생 10 : 교수 1
• 학부 총원 718명
• 대학원 총원 1282명
• 박사과정 졸업생 SCI급
저널 5.93편
3
Goal
• In Bitcoin white paper, “more confirmations implies less
probability of DS attack success,” Satoshi Nakamoto.
4
Q) For safe blockchain transaction,
how many block confirmations are required?
0 10 20 30 40 50 60
Confirmation number
10
-5
10
-4
10
-3
10
-2
10
-1
10
0
Probability
of
DS
attack
success
q=0.35
q=0.4
q=0.45
• However, it’s still unclear that
how many confirmations are
required to ensure my
transaction SAFE?
A recent (2019) guideline on
Bitcoin confirmations
5
https://www.buybitcoinworldwide.com/confirmations/
Are you sure? Do you agree with this?
Other similar guidelines
• https://www.ethos.io/what-are-blockchain-confirmations/
• https://coincentral.com/blockchain-confirmations/
• https://blog.monetha.io/confirmation/
• https://support.coinjar.com/hc/en-us/articles/115005712843-
Reasons-for-a-pending-Bitcoin-transfer
6
• Blockchain communities agree with the importance
confirmations.
• Yet, they all have suggested abstract confirm. numbers.
• No one has suggested reasonable confirm. numbers.
Why do we need a clearer
guideline on confirmations?
7
Safe transaction
Fast transaction
Confirmation number
A good confirmation number:
1. ensures safe transaction, and
2. keeps fast transaction
Presentation Outline
• Review of
– Blockchain (Bitcoin)
– Double-Spending (DS) Attack
• New Analysis Results: Profitable DS Attacks
• Algorithm to Prevent Profitable DS Attacks
8
9
Blockchain
Block #1
TX #1 TX #2
TX #3
Hash of Block #0

Block #2
TX #4 TX #5
Hash of Block #1
Block #3
TX #6
Hash of Block #2

Blockchain is a chain of blocks.
10
• Data immutability?
 By the chain of PoW
• Double-spending?
 By directed graph of TX in/out
• Consensus?
 Longest-chain rule (Bitcoin)
 A variant of GHOST (Ethereum)
Double-Spending Attack
Mary can cheat John.
But how?
11
1. Target transaction: “Mary sends 10 BTC to John,” put in Block #153.
2. Miners build the public chain (gray).
3. Mary builds her own chain underground (red).
4. Mary’s chain contains a fake transaction that nullifies the target transaction.
5. Mary divulges her fake chain to the public if
1) John has completed shipping the product to Mary, AND
2) Mary’s fake chain has been built longer than the public’s chain.
6. The public adopts Mary’s chain, since it is longer than their own chain.
12
Paper Goal
• To analyze the profitability of double-spending (DS)
• Satoshi Nakamoto,
• We show
“DS attack is difficult since its success requires 51% of
total computing power.”
DS attacks are threatening even with less than 50%.
13
Definitions
Definition. A DS attack succeeds if
• target transaction has got confirmed by 𝑁𝑁𝐵𝐵𝐵𝐵 blocks,
• Mary’s chain has grown longer than the public chain, and
• the above two conditions have been satisfied within a cut
time 𝑡𝑡cut.
Notation Description
𝑝𝑝𝐴𝐴 Attacker’s portion of computing power (0~100%)
𝑁𝑁𝐵𝐵𝐵𝐵 Block confirmation number of target transaction
𝑡𝑡cut Attack cut time for cut loss
14
Nakamoto’s result
If Mary has 𝑝𝑝𝐴𝐴 greater than 50% and no cut time
𝑡𝑡𝑐𝑐𝑐𝑐𝑐𝑐 = ∞,
then double-spending attack succeeds.
• According to this result, double-spending attack seems very difficult.
• However, Nakamoto’s result does not say
Profitable DS Attack
50%
is impossible.
?
A
p < ⇒
( )
( )
0
1 0.5
1 1 .
! 1 0.5
BC H
BC
N k
A
N k
AS
k A A A
if p
e
k p p if p
λ
λ −
−
=
 
≥
 
 
 
=
− −  
 
− <
 
 
 
∑

• The probability that double-spending attack will ever succeed:
15
Our results (Main)
Even though 𝑝𝑝𝐴𝐴 is less than 50% ,
Mary can expect a profitable DS attack.
Definition. A DS attack is profitable if and only if the expected
revenue is greater than the expected cost.
Theorem. For all attacker’s fractions of computing power 𝑝𝑝𝐴𝐴
(1%~99%), DS attacks are profitable if the value 𝑉𝑉 of target
transaction is greater than
𝑉𝑉Suf. 𝑝𝑝𝐴𝐴; 𝑁𝑁𝐵𝐵𝐵𝐵 = 𝛾𝛾′ 𝑝𝑝𝐴𝐴
𝜆𝜆𝐻𝐻𝑝𝑝𝐴𝐴E 𝑇𝑇𝐴𝐴𝐴𝐴
(1 − 𝑝𝑝𝐴𝐴)ℙ𝐴𝐴𝐴𝐴 𝑝𝑝𝐴𝐴, 𝑡𝑡𝑐𝑐𝑐𝑐𝑐𝑐; 𝑁𝑁𝐵𝐵𝐵𝐵
.
16
※ Revenue: cheating value of target transaction
※ Cost: operating expense for computing hash functions
Our results (2)

• Example)
:Mary’s chain
Theorem. A DS attack using 𝑝𝑝𝐴𝐴 less than 50% are profitable
only if a finite cut time 𝑡𝑡𝑐𝑐𝑐𝑐𝑐𝑐 < ∞ is given.
17
 The probability that Mary’s chain NEVER catch up the public chain is nonzero.
 If there is no time limit and Mary’s chain never catch up the public chain, the
operating expense increases infinitely.
 Thus, Mary should stop the attack at a cut time to cut loss.
Our results (3)
We provide the probability density function of
attack success time.
 DS attack is modeled as a competition of two Poisson processes.
 There are infinitely many combinations of the two Poisson processes which
implies the success of a DS attack.
 We count the probabilities of such infinite combinations using combinatorics
and generating functions.
Time
Mary’s chain
Public chain
Lengths
of chains
Double-spending
Attack Success!
Infinitely many
combinations
Attack success time is
a random variable
18
Our results (3)
19
Our results (3)
20
Example of Profitable DS Attack
in BitcoinCash network
Mary’s Info.
 Average block generation time: 1143secs (𝑝𝑝𝐴𝐴 =35%)
 Attack cut time (𝑡𝑡𝑐𝑐𝑐𝑐𝑐𝑐): 3hours 36mins
 Operating cost per time: 𝛾𝛾
BitcoinCash Info.
 The amount of TXs over 24 hours is about 10 billion dollars.
 Miners’ average block generation time (𝜆𝜆𝐻𝐻
−1
) is fixed to 600secs.
Attack Info.
 Value of target transaction: 𝑉𝑉
 Block confirmation number (𝑁𝑁) of target transaction: 5
 Attack success probability within the cut time: 22%
 Expected attack success time(𝑇𝑇𝐴𝐴𝐴𝐴)(if attack succeeded): 1hour 42mins
Profit Info.
 Expected revenue: 0.22 ∗ 𝑉𝑉
 Expected cost: 0.22*(1hour 42mins)*𝛾𝛾+0.78*(3hours 36mins)*𝛾𝛾
 Profit=(expected revenue)-(expected cost) 21
Example of Profitable DS Attack
in BitcoinCash network
• How to make attack profitable?
Make target value 𝑉𝑉 so that Profit>0.
 The operating expense per time (𝛾𝛾) is given in internet.
 For example, nicehash.com provides a rental service of computing power.
 According to nicehash.com, the expected cost is 2.909 BTC.
If 𝑉𝑉 > 13.225 BTC, this attack is profitable.
Profit Info.
 Expected revenue: 0.22 ∗ 𝑉𝑉
 Expected cost: 0.22*(1hour 42mins)*𝛾𝛾+0.78*(3hours 36mins)*𝛾𝛾
 Profit=(expected revenue)-(expected cost)
22
(when attack power is 0.35 and confirmation number is 5)
Mathematical Tool to Check
Risk of Double-Spending Attack
23
Algorithm
(𝑉𝑉 < 𝑉𝑉𝑆𝑆𝑆𝑆𝑆𝑆.? )
Your TX info.:
• TX value (𝑉𝑉),
• Confirmation number
“Your TX is SAFE (or) NOT SAFE.”
Network info.:
• Average block mining period
• Block mining cost
• Block mining reward
• Average block mining period: 600 Seconds
• Total hash: 2.48 [EHashes/second]
• Block mining reward: 0.68 [BTC/block mining]
• Block mining hash: 1488 [EHashes/block mining]
• SHA256 cost: 0.0402 [BTC/(PHashes/sec)/day]
= 4.6527*10^-7 [BTC/PHashes]
= 4.6527*10^-22 [BTC/Hash]
• Block mining cost: 4.6527*10^-22 [BTC/Hash]
*1488*10^18 [Hashes/Block mining]
= 0.6923 [BTC/block mining]
Example) The BitcoinCash Network Parameters
(ref: BTC.com, nicehash.com as of Apr. 2019)
Evaluate the safety!
25
Comparison of guidelines
26
Nakamoto’s Ours
Input Attacker’s computing power • Attacker’s computing power
• Transaction information
• Network information
Output Attack success probability Binary decisions (safe or not)
Math.
Tools
Attack success probability • Attack success probability
• Attack cost
• Attack success time
Remark Against attacks with computing
power more than 51%, every
transaction is always vulnerable.
Even for attacks with computing
power more than 51%, it is possible
to make transactions safe.
Summary
We provide new analyses on DS attacks such as
1. probabilistic behaviors of attack success time and
2. conditions for profitable DS attacks.
They enabled our new results such as
1. riskiness of DS attacks even with less than 50%
of computing power and
2. a clearer guideline on confirmations.
27
Thank you
contact: jjh2014@gist.ac.kr
heungno@gist.ac.kr
28

Weitere ähnliche Inhalte

Was ist angesagt?

ITNW 2164 ResearchPaper
ITNW 2164 ResearchPaperITNW 2164 ResearchPaper
ITNW 2164 ResearchPaper
Manuel Garza
 
Privacy preserving secure data exchange in mobile P2P
Privacy preserving secure data exchange in mobile P2PPrivacy preserving secure data exchange in mobile P2P
Privacy preserving secure data exchange in mobile P2P
www.pixelsolutionbd.com
 

Was ist angesagt? (15)

ITNW 2164 ResearchPaper
ITNW 2164 ResearchPaperITNW 2164 ResearchPaper
ITNW 2164 ResearchPaper
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
IRJET- Blockchain-A Secure Mode for Transaction
IRJET- Blockchain-A Secure Mode for TransactionIRJET- Blockchain-A Secure Mode for Transaction
IRJET- Blockchain-A Secure Mode for Transaction
 
"Towards True Decentralization: A Blockchain Consensus Protocol Based on Game...
"Towards True Decentralization: A Blockchain Consensus Protocol Based on Game..."Towards True Decentralization: A Blockchain Consensus Protocol Based on Game...
"Towards True Decentralization: A Blockchain Consensus Protocol Based on Game...
 
Intro to Blockchain and Dapps
Intro to Blockchain and DappsIntro to Blockchain and Dapps
Intro to Blockchain and Dapps
 
Blockchain, cryptography and tokens — NYC Bar presentation
Blockchain, cryptography and tokens — NYC Bar presentationBlockchain, cryptography and tokens — NYC Bar presentation
Blockchain, cryptography and tokens — NYC Bar presentation
 
Cryptography and security
Cryptography and securityCryptography and security
Cryptography and security
 
527
527527
527
 
Deniable Encryption Key
Deniable Encryption KeyDeniable Encryption Key
Deniable Encryption Key
 
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
 
Blockchain, DLT, Tokens and ICO Introduction Course
Blockchain, DLT, Tokens and ICO Introduction CourseBlockchain, DLT, Tokens and ICO Introduction Course
Blockchain, DLT, Tokens and ICO Introduction Course
 
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
 
Elliptic Curve Based Server Authentication System for Multi-Server Infrastruc...
Elliptic Curve Based Server Authentication System for Multi-Server Infrastruc...Elliptic Curve Based Server Authentication System for Multi-Server Infrastruc...
Elliptic Curve Based Server Authentication System for Multi-Server Infrastruc...
 
SpaceChain - Blockchain in Space
SpaceChain - Blockchain in SpaceSpaceChain - Blockchain in Space
SpaceChain - Blockchain in Space
 
Privacy preserving secure data exchange in mobile P2P
Privacy preserving secure data exchange in mobile P2PPrivacy preserving secure data exchange in mobile P2P
Privacy preserving secure data exchange in mobile P2P
 

Ähnlich wie Jehyuk jang and heung no lee double spend

AktaionPPTv5_JZedits
AktaionPPTv5_JZeditsAktaionPPTv5_JZedits
AktaionPPTv5_JZedits
Rod Soto
 

Ähnlich wie Jehyuk jang and heung no lee double spend (20)

Jehyuk jang and heung no lee ieee
Jehyuk jang and heung no lee ieeeJehyuk jang and heung no lee ieee
Jehyuk jang and heung no lee ieee
 
Blockchain
BlockchainBlockchain
Blockchain
 
Security in the blockchain
Security in the blockchainSecurity in the blockchain
Security in the blockchain
 
AktaionPPTv5_JZedits
AktaionPPTv5_JZeditsAktaionPPTv5_JZedits
AktaionPPTv5_JZedits
 
01 what is blockchain
01 what is blockchain01 what is blockchain
01 what is blockchain
 
create your own cryptocurrency
create your own cryptocurrencycreate your own cryptocurrency
create your own cryptocurrency
 
Towards a Practice of Token Engineering
Towards a Practice of Token EngineeringTowards a Practice of Token Engineering
Towards a Practice of Token Engineering
 
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsUnderstanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
 
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018
 
BlockChain for the Banker
BlockChain for the BankerBlockChain for the Banker
BlockChain for the Banker
 
Rate Limiting at Scale, from SANS AppSec Las Vegas 2012
Rate Limiting at Scale, from SANS AppSec Las Vegas 2012Rate Limiting at Scale, from SANS AppSec Las Vegas 2012
Rate Limiting at Scale, from SANS AppSec Las Vegas 2012
 
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and BitcoinCrypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
 
CloudFlare DDoS attacks 101: what are they and how to protect your site?
CloudFlare DDoS attacks 101: what are they and how to protect your site?CloudFlare DDoS attacks 101: what are they and how to protect your site?
CloudFlare DDoS attacks 101: what are they and how to protect your site?
 
Famous C&C servers from inside to outside.
Famous C&C servers from inside to outside.Famous C&C servers from inside to outside.
Famous C&C servers from inside to outside.
 
Ethereum Mining How To
Ethereum Mining How ToEthereum Mining How To
Ethereum Mining How To
 
3. Cryptographic Security
3. Cryptographic Security3. Cryptographic Security
3. Cryptographic Security
 
Brief Introduction to Blockchain Security
Brief Introduction to Blockchain SecurityBrief Introduction to Blockchain Security
Brief Introduction to Blockchain Security
 
Decipher openseminar (1)
Decipher openseminar (1)Decipher openseminar (1)
Decipher openseminar (1)
 
Blockchain general presentation nov 2017 v eng
Blockchain general presentation nov 2017 v engBlockchain general presentation nov 2017 v eng
Blockchain general presentation nov 2017 v eng
 
How to verify computation in the blink of an eye
How to verify computation in the blink of an eyeHow to verify computation in the blink of an eye
How to verify computation in the blink of an eye
 

Mehr von IT Strategy Group

Mehr von IT Strategy Group (20)

11 pp-cybersecurity-revised2 a
11 pp-cybersecurity-revised2 a11 pp-cybersecurity-revised2 a
11 pp-cybersecurity-revised2 a
 
Spc cyber security strategy
Spc cyber security strategySpc cyber security strategy
Spc cyber security strategy
 
Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-
 
Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015Cybersecurity strategy-brief-to-itc final-17_apr2015
Cybersecurity strategy-brief-to-itc final-17_apr2015
 
Todcouncil proposed pi_gppt
Todcouncil proposed pi_gpptTodcouncil proposed pi_gppt
Todcouncil proposed pi_gppt
 
David sm14 inppt01
David  sm14 inppt01David  sm14 inppt01
David sm14 inppt01
 
Strategic information systems planning
Strategic information systems planningStrategic information systems planning
Strategic information systems planning
 
Kirksey kirk
Kirksey kirkKirksey kirk
Kirksey kirk
 
Management summary presentation
Management summary presentationManagement summary presentation
Management summary presentation
 
Jae hyung lee mit
Jae hyung lee mitJae hyung lee mit
Jae hyung lee mit
 
Huashan chen, marcus pendleton, laurent njilla, and shouhuai xu
Huashan chen, marcus pendleton, laurent njilla, and shouhuai xuHuashan chen, marcus pendleton, laurent njilla, and shouhuai xu
Huashan chen, marcus pendleton, laurent njilla, and shouhuai xu
 
Emily rutland blockchain
Emily rutland blockchainEmily rutland blockchain
Emily rutland blockchain
 
Donn felker etehreum
Donn felker etehreumDonn felker etehreum
Donn felker etehreum
 
Delloite custodian whitepaper
Delloite custodian whitepaperDelloite custodian whitepaper
Delloite custodian whitepaper
 
David shrier, weige wu, alex pentland mit blockchain
David shrier, weige wu, alex pentland mit blockchainDavid shrier, weige wu, alex pentland mit blockchain
David shrier, weige wu, alex pentland mit blockchain
 
Rui zhang and rui xue, georgia tech
Rui zhang and rui xue, georgia techRui zhang and rui xue, georgia tech
Rui zhang and rui xue, georgia tech
 
Sarwar sayeed , hector marco gisbert, tom caira ieee
Sarwar sayeed , hector marco gisbert, tom caira ieeeSarwar sayeed , hector marco gisbert, tom caira ieee
Sarwar sayeed , hector marco gisbert, tom caira ieee
 
Nist.ir.8202
Nist.ir.8202Nist.ir.8202
Nist.ir.8202
 
Jun dai blockchain
Jun dai blockchainJun dai blockchain
Jun dai blockchain
 
Vikram Andem Big Data Strategy @ IATA Technology Roadmap
Vikram Andem Big Data Strategy @ IATA Technology Roadmap Vikram Andem Big Data Strategy @ IATA Technology Roadmap
Vikram Andem Big Data Strategy @ IATA Technology Roadmap
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Jehyuk jang and heung no lee double spend

  • 1. Profitable Double-Spending Attacks & Prevention Jehyuk Jang and Heung-No Lee Department of electrical engineering and computer science, GIST 1
  • 2. 2 • 1995년 대학원 개원 • 2010년 학부 개설 • 학생 10 : 교수 1 • 학부 총원 718명 • 대학원 총원 1282명 • 박사과정 졸업생 SCI급 저널 5.93편
  • 3. 3
  • 4. Goal • In Bitcoin white paper, “more confirmations implies less probability of DS attack success,” Satoshi Nakamoto. 4 Q) For safe blockchain transaction, how many block confirmations are required? 0 10 20 30 40 50 60 Confirmation number 10 -5 10 -4 10 -3 10 -2 10 -1 10 0 Probability of DS attack success q=0.35 q=0.4 q=0.45 • However, it’s still unclear that how many confirmations are required to ensure my transaction SAFE?
  • 5. A recent (2019) guideline on Bitcoin confirmations 5 https://www.buybitcoinworldwide.com/confirmations/ Are you sure? Do you agree with this?
  • 6. Other similar guidelines • https://www.ethos.io/what-are-blockchain-confirmations/ • https://coincentral.com/blockchain-confirmations/ • https://blog.monetha.io/confirmation/ • https://support.coinjar.com/hc/en-us/articles/115005712843- Reasons-for-a-pending-Bitcoin-transfer 6 • Blockchain communities agree with the importance confirmations. • Yet, they all have suggested abstract confirm. numbers. • No one has suggested reasonable confirm. numbers.
  • 7. Why do we need a clearer guideline on confirmations? 7 Safe transaction Fast transaction Confirmation number A good confirmation number: 1. ensures safe transaction, and 2. keeps fast transaction
  • 8. Presentation Outline • Review of – Blockchain (Bitcoin) – Double-Spending (DS) Attack • New Analysis Results: Profitable DS Attacks • Algorithm to Prevent Profitable DS Attacks 8
  • 9. 9
  • 10. Blockchain Block #1 TX #1 TX #2 TX #3 Hash of Block #0  Block #2 TX #4 TX #5 Hash of Block #1 Block #3 TX #6 Hash of Block #2  Blockchain is a chain of blocks. 10 • Data immutability?  By the chain of PoW • Double-spending?  By directed graph of TX in/out • Consensus?  Longest-chain rule (Bitcoin)  A variant of GHOST (Ethereum)
  • 11. Double-Spending Attack Mary can cheat John. But how? 11 1. Target transaction: “Mary sends 10 BTC to John,” put in Block #153. 2. Miners build the public chain (gray). 3. Mary builds her own chain underground (red). 4. Mary’s chain contains a fake transaction that nullifies the target transaction. 5. Mary divulges her fake chain to the public if 1) John has completed shipping the product to Mary, AND 2) Mary’s fake chain has been built longer than the public’s chain. 6. The public adopts Mary’s chain, since it is longer than their own chain.
  • 12. 12
  • 13. Paper Goal • To analyze the profitability of double-spending (DS) • Satoshi Nakamoto, • We show “DS attack is difficult since its success requires 51% of total computing power.” DS attacks are threatening even with less than 50%. 13
  • 14. Definitions Definition. A DS attack succeeds if • target transaction has got confirmed by 𝑁𝑁𝐵𝐵𝐵𝐵 blocks, • Mary’s chain has grown longer than the public chain, and • the above two conditions have been satisfied within a cut time 𝑡𝑡cut. Notation Description 𝑝𝑝𝐴𝐴 Attacker’s portion of computing power (0~100%) 𝑁𝑁𝐵𝐵𝐵𝐵 Block confirmation number of target transaction 𝑡𝑡cut Attack cut time for cut loss 14
  • 15. Nakamoto’s result If Mary has 𝑝𝑝𝐴𝐴 greater than 50% and no cut time 𝑡𝑡𝑐𝑐𝑐𝑐𝑐𝑐 = ∞, then double-spending attack succeeds. • According to this result, double-spending attack seems very difficult. • However, Nakamoto’s result does not say Profitable DS Attack 50% is impossible. ? A p < ⇒ ( ) ( ) 0 1 0.5 1 1 . ! 1 0.5 BC H BC N k A N k AS k A A A if p e k p p if p λ λ − − =   ≥       = − −     − <       ∑  • The probability that double-spending attack will ever succeed: 15
  • 16. Our results (Main) Even though 𝑝𝑝𝐴𝐴 is less than 50% , Mary can expect a profitable DS attack. Definition. A DS attack is profitable if and only if the expected revenue is greater than the expected cost. Theorem. For all attacker’s fractions of computing power 𝑝𝑝𝐴𝐴 (1%~99%), DS attacks are profitable if the value 𝑉𝑉 of target transaction is greater than 𝑉𝑉Suf. 𝑝𝑝𝐴𝐴; 𝑁𝑁𝐵𝐵𝐵𝐵 = 𝛾𝛾′ 𝑝𝑝𝐴𝐴 𝜆𝜆𝐻𝐻𝑝𝑝𝐴𝐴E 𝑇𝑇𝐴𝐴𝐴𝐴 (1 − 𝑝𝑝𝐴𝐴)ℙ𝐴𝐴𝐴𝐴 𝑝𝑝𝐴𝐴, 𝑡𝑡𝑐𝑐𝑐𝑐𝑐𝑐; 𝑁𝑁𝐵𝐵𝐵𝐵 . 16 ※ Revenue: cheating value of target transaction ※ Cost: operating expense for computing hash functions
  • 17. Our results (2)  • Example) :Mary’s chain Theorem. A DS attack using 𝑝𝑝𝐴𝐴 less than 50% are profitable only if a finite cut time 𝑡𝑡𝑐𝑐𝑐𝑐𝑐𝑐 < ∞ is given. 17  The probability that Mary’s chain NEVER catch up the public chain is nonzero.  If there is no time limit and Mary’s chain never catch up the public chain, the operating expense increases infinitely.  Thus, Mary should stop the attack at a cut time to cut loss.
  • 18. Our results (3) We provide the probability density function of attack success time.  DS attack is modeled as a competition of two Poisson processes.  There are infinitely many combinations of the two Poisson processes which implies the success of a DS attack.  We count the probabilities of such infinite combinations using combinatorics and generating functions. Time Mary’s chain Public chain Lengths of chains Double-spending Attack Success! Infinitely many combinations Attack success time is a random variable 18
  • 21. Example of Profitable DS Attack in BitcoinCash network Mary’s Info.  Average block generation time: 1143secs (𝑝𝑝𝐴𝐴 =35%)  Attack cut time (𝑡𝑡𝑐𝑐𝑐𝑐𝑐𝑐): 3hours 36mins  Operating cost per time: 𝛾𝛾 BitcoinCash Info.  The amount of TXs over 24 hours is about 10 billion dollars.  Miners’ average block generation time (𝜆𝜆𝐻𝐻 −1 ) is fixed to 600secs. Attack Info.  Value of target transaction: 𝑉𝑉  Block confirmation number (𝑁𝑁) of target transaction: 5  Attack success probability within the cut time: 22%  Expected attack success time(𝑇𝑇𝐴𝐴𝐴𝐴)(if attack succeeded): 1hour 42mins Profit Info.  Expected revenue: 0.22 ∗ 𝑉𝑉  Expected cost: 0.22*(1hour 42mins)*𝛾𝛾+0.78*(3hours 36mins)*𝛾𝛾  Profit=(expected revenue)-(expected cost) 21
  • 22. Example of Profitable DS Attack in BitcoinCash network • How to make attack profitable? Make target value 𝑉𝑉 so that Profit>0.  The operating expense per time (𝛾𝛾) is given in internet.  For example, nicehash.com provides a rental service of computing power.  According to nicehash.com, the expected cost is 2.909 BTC. If 𝑉𝑉 > 13.225 BTC, this attack is profitable. Profit Info.  Expected revenue: 0.22 ∗ 𝑉𝑉  Expected cost: 0.22*(1hour 42mins)*𝛾𝛾+0.78*(3hours 36mins)*𝛾𝛾  Profit=(expected revenue)-(expected cost) 22 (when attack power is 0.35 and confirmation number is 5)
  • 23. Mathematical Tool to Check Risk of Double-Spending Attack 23 Algorithm (𝑉𝑉 < 𝑉𝑉𝑆𝑆𝑆𝑆𝑆𝑆.? ) Your TX info.: • TX value (𝑉𝑉), • Confirmation number “Your TX is SAFE (or) NOT SAFE.” Network info.: • Average block mining period • Block mining cost • Block mining reward
  • 24. • Average block mining period: 600 Seconds • Total hash: 2.48 [EHashes/second] • Block mining reward: 0.68 [BTC/block mining] • Block mining hash: 1488 [EHashes/block mining] • SHA256 cost: 0.0402 [BTC/(PHashes/sec)/day] = 4.6527*10^-7 [BTC/PHashes] = 4.6527*10^-22 [BTC/Hash] • Block mining cost: 4.6527*10^-22 [BTC/Hash] *1488*10^18 [Hashes/Block mining] = 0.6923 [BTC/block mining] Example) The BitcoinCash Network Parameters (ref: BTC.com, nicehash.com as of Apr. 2019)
  • 26. Comparison of guidelines 26 Nakamoto’s Ours Input Attacker’s computing power • Attacker’s computing power • Transaction information • Network information Output Attack success probability Binary decisions (safe or not) Math. Tools Attack success probability • Attack success probability • Attack cost • Attack success time Remark Against attacks with computing power more than 51%, every transaction is always vulnerable. Even for attacks with computing power more than 51%, it is possible to make transactions safe.
  • 27. Summary We provide new analyses on DS attacks such as 1. probabilistic behaviors of attack success time and 2. conditions for profitable DS attacks. They enabled our new results such as 1. riskiness of DS attacks even with less than 50% of computing power and 2. a clearer guideline on confirmations. 27