Abstract
Bitcoin pool attacks, including withholding block attacks, pose a significant threat to the Bitcoin ecosystem. However, current research on pool attacks is limited to theoretical analysis due to the lack of experimental platforms. This paper presents simuBits, a specialized experimental system designed to analyze the feasibility of mining pool attacks and propose countermeasures. The system simulates a mining pool using a group of miner processes. A new combined attack model of BWH and man-in-the-middle attack is proposed, which is more profitable and stealthy than traditional single attack patterns. A new countermeasure is also proposed that dynamically adjusts the power weight of suspected attackers through putting them into a small sub-pool. Both the combined attacks and the defense strategies were tested in simuBits, and the results confirm that the proposed countermeasure is a feasible way to defend against pool attacks, significantly reducing attackers’ revenues compared to honest mining.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Tech. Rep. (2008)
Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436–454. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45472-5_28
Rosenfeld, M.: Analysis of hashrate-based double spending. arXiv preprint arXiv:1402.2009 (2014)
Rosenfeld, M.: Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980 (2011)
Bag, S., Ruj, S., Sakurai, K.: Bitcoin block withholding attack: analysis and mitigation. IEEE Trans. Inf. Forensics Secur. 12(8), 1967–1978 (2016)
Heilman, E., Kendler, A., Zohar, A., et al.: Eclipse Attacks on {Bitcoin’s}{Peer-to-Peer} Network. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 129–144 (2015)
Luu, L., Saha, R., Parameshwaran, I., et al.: On power splitting games in distributed computation: the case of bitcoin pooled mining. In: 2015 IEEE 28th Computer Security Foundations Symposium. IEEE, pp. 397–411 (2015)
Fujita, K., Zhang, Y., Sasabe, M., et al.: Mining pool selection under block withholding attack. Appl. Sci. 11(4), 1617 (2021)
Kwon, Y., Kim, D., Son, Y., et al.: Be selfish and avoid dilemmas: fork after withholding (faw) attacks on bitcoin. In: Proceedings of the. ACM SIGSAC Conference on Computer and Communications Security, vol. 2017, pp. 195–209 (2017)
Gao, S., Li, Z., Peng, Z., et al.: Power adjusting and bribery racing: Novel mining attacks in the bitcoin system. In: Proceedings of the. ACM SIGSAC Conference on Computer and Communications Security, vol. 2019, pp. 833–850 (2019)
Wang, Y., Yang, G., Li, T., et al.: Optimal mixed block withholding attacks based on reinforcement learning. Int. J. Intell. Syst. 35(12), 2032–2048 (2020)
Ke, J., Szalachowski, P., Zhou, J., Xu, Q., Yang, Z.: Ibwh: an intermittent block withholding attack with optimal mining reward rate. In: Lin, Z., Papamanthou, C., Polychronakis, M. (eds.) ISC 2019. LNCS, vol. 11723, pp. 3–24. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-30215-3_1
Liu, L., Chen, W., Zhang, L., et al.: A type of block withholding delay attack and the countermeasure based on type-2 fuzzy inference. Math. Biosci. Eng. 17(1), 309–327 (2020)
Li, T., Wang, Z., Yang, G., et al.: Semi-selfish mining based on hidden Markov decision process. Int. J. Intell. Syst. 36(7), 3596–3612 (2021)
Eyal, I.: The miner’s dilemma. In: 2015 IEEE Symposium on Security and Privacy. IEEE, pp. 89–103 (2015)
“Eligius”, https://bitcointalk.org/?topic=441465.msg728267
Recabarren, R., Carbunar, B.: Hardening stratum, the bitcoin pool mining protocol. arXiv preprint arXiv:1703.06545, 2017
Tran, M., Choi, I., Moon, G.J, et al.: A stealthier partitioning attack against bitcoin peer-to-peer network. In: 2020 IEEE Symposium on Security and Privacy (SP). IEEE, pp. 894–909 (2020)
Liu, X.: Disappeared Coins: Steal Hashrate in Stratum Secretly. https://www.blackhat.com/asia-21/briefings/schedule/#disappeared-coins-steal-hashrate-in-stratum-secretly-22266 (2021)
Acknowledgement
This work was supported by the National Key Research and Development Program of China (2019QY0800), and the Natural Science Foundation of China (61872255).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Zhou, Z., Chen, W., Li, L., Zhang, Y. (2023). simuBits: Pool Security Verification of Novel Mining Attacks. In: Zhang, M., Au, M.H., Zhang, Y. (eds) Provable and Practical Security. ProvSec 2023. Lecture Notes in Computer Science, vol 14217. Springer, Cham. https://doi.org/10.1007/978-3-031-45513-1_23
Download citation
DOI: https://doi.org/10.1007/978-3-031-45513-1_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-45512-4
Online ISBN: 978-3-031-45513-1
eBook Packages: Computer ScienceComputer Science (R0)