Skip to main content

simuBits: Pool Security Verification of Novel Mining Attacks

  • Conference paper
  • First Online:
Provable and Practical Security (ProvSec 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14217))

Included in the following conference series:

  • 236 Accesses

Abstract

Bitcoin pool attacks, including withholding block attacks, pose a significant threat to the Bitcoin ecosystem. However, current research on pool attacks is limited to theoretical analysis due to the lack of experimental platforms. This paper presents simuBits, a specialized experimental system designed to analyze the feasibility of mining pool attacks and propose countermeasures. The system simulates a mining pool using a group of miner processes. A new combined attack model of BWH and man-in-the-middle attack is proposed, which is more profitable and stealthy than traditional single attack patterns. A new countermeasure is also proposed that dynamically adjusts the power weight of suspected attackers through putting them into a small sub-pool. Both the combined attacks and the defense strategies were tested in simuBits, and the results confirm that the proposed countermeasure is a feasible way to defend against pool attacks, significantly reducing attackers’ revenues compared to honest mining.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://gitee.com/zunlongzhou/bwh.git.

References

  1. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Tech. Rep. (2008)

    Google Scholar 

  2. Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436–454. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45472-5_28

    Chapter  Google Scholar 

  3. Rosenfeld, M.: Analysis of hashrate-based double spending. arXiv preprint arXiv:1402.2009 (2014)

  4. Rosenfeld, M.: Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980 (2011)

  5. Bag, S., Ruj, S., Sakurai, K.: Bitcoin block withholding attack: analysis and mitigation. IEEE Trans. Inf. Forensics Secur. 12(8), 1967–1978 (2016)

    Article  Google Scholar 

  6. Heilman, E., Kendler, A., Zohar, A., et al.: Eclipse Attacks on {Bitcoin’s}{Peer-to-Peer} Network. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 129–144 (2015)

    Google Scholar 

  7. Luu, L., Saha, R., Parameshwaran, I., et al.: On power splitting games in distributed computation: the case of bitcoin pooled mining. In: 2015 IEEE 28th Computer Security Foundations Symposium. IEEE, pp. 397–411 (2015)

    Google Scholar 

  8. Fujita, K., Zhang, Y., Sasabe, M., et al.: Mining pool selection under block withholding attack. Appl. Sci. 11(4), 1617 (2021)

    Article  Google Scholar 

  9. Kwon, Y., Kim, D., Son, Y., et al.: Be selfish and avoid dilemmas: fork after withholding (faw) attacks on bitcoin. In: Proceedings of the. ACM SIGSAC Conference on Computer and Communications Security, vol. 2017, pp. 195–209 (2017)

    Google Scholar 

  10. Gao, S., Li, Z., Peng, Z., et al.: Power adjusting and bribery racing: Novel mining attacks in the bitcoin system. In: Proceedings of the. ACM SIGSAC Conference on Computer and Communications Security, vol. 2019, pp. 833–850 (2019)

    Google Scholar 

  11. Wang, Y., Yang, G., Li, T., et al.: Optimal mixed block withholding attacks based on reinforcement learning. Int. J. Intell. Syst. 35(12), 2032–2048 (2020)

    Article  Google Scholar 

  12. Ke, J., Szalachowski, P., Zhou, J., Xu, Q., Yang, Z.: Ibwh: an intermittent block withholding attack with optimal mining reward rate. In: Lin, Z., Papamanthou, C., Polychronakis, M. (eds.) ISC 2019. LNCS, vol. 11723, pp. 3–24. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-30215-3_1

    Chapter  Google Scholar 

  13. Liu, L., Chen, W., Zhang, L., et al.: A type of block withholding delay attack and the countermeasure based on type-2 fuzzy inference. Math. Biosci. Eng. 17(1), 309–327 (2020)

    Article  MathSciNet  Google Scholar 

  14. Li, T., Wang, Z., Yang, G., et al.: Semi-selfish mining based on hidden Markov decision process. Int. J. Intell. Syst. 36(7), 3596–3612 (2021)

    Article  Google Scholar 

  15. Eyal, I.: The miner’s dilemma. In: 2015 IEEE Symposium on Security and Privacy. IEEE, pp. 89–103 (2015)

    Google Scholar 

  16. “Eligius”, https://bitcointalk.org/?topic=441465.msg728267

  17. Recabarren, R., Carbunar, B.: Hardening stratum, the bitcoin pool mining protocol. arXiv preprint arXiv:1703.06545, 2017

  18. Tran, M., Choi, I., Moon, G.J, et al.: A stealthier partitioning attack against bitcoin peer-to-peer network. In: 2020 IEEE Symposium on Security and Privacy (SP). IEEE, pp. 894–909 (2020)

    Google Scholar 

  19. Liu, X.: Disappeared Coins: Steal Hashrate in Stratum Secretly. https://www.blackhat.com/asia-21/briefings/schedule/#disappeared-coins-steal-hashrate-in-stratum-secretly-22266 (2021)

Download references

Acknowledgement

This work was supported by the National Key Research and Development Program of China (2019QY0800), and the Natural Science Foundation of China (61872255).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wen Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhou, Z., Chen, W., Li, L., Zhang, Y. (2023). simuBits: Pool Security Verification of Novel Mining Attacks. In: Zhang, M., Au, M.H., Zhang, Y. (eds) Provable and Practical Security. ProvSec 2023. Lecture Notes in Computer Science, vol 14217. Springer, Cham. https://doi.org/10.1007/978-3-031-45513-1_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-45513-1_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-45512-4

  • Online ISBN: 978-3-031-45513-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics