ABSTRACT
Fork after withholding (FAW) attack is an easy-to-conduct attack in the Bitcoin system and it is hard to be detected than some attacks like selfish mining and selfholding attacks. The previous studies about FAW attack made some strong assumptions, such as no propagation delay in the network.
This paper aims to quantitatively examine the profitability of FAW attack in Bitcoin system with block propagation delay. We first establish a novel analytic model, which can analyze FAW attack in the Bitcoin system. Then we apply the model to design metric formulas for the Bitcoin system. These formulas can be used to evaluate the miner profitability (in terms of miner reward) and the impact of FAW attack on system throughput (in terms of transactions per second). We make a comparison of FAW attack and other attacks (including selfish mining and selfholding attacks). Experimental results reveal that FAW adversaries can get more rewards in the network with propagation delay than without delay. The results of the comparison of selfish mining and FAW attacks show that adversaries with large computational power can conduct selfish mining or selfholding attack to get more rewards, but they can conduct FAW attack to profit more when their computational power is small. Our work can be used to analyze Bitcoin-like blockchain systems and help design and evaluate security mechanisms.
- Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review. 2008 Oct 31:21260.Google Scholar
- Karame GO, Androulaki E, Capkun S. Double-spending fast payments in bitcoin. In Proceedings of the 2012 ACM conference on Computer and communications security 2012 Oct 16 (pp. 906--917).Google Scholar
- Eyal I, Sirer EG. Majority is not enough: Bitcoin mining is vulnerable. In International conference on financial cryptography and data security 2014 Mar 3 (pp. 436--454). Springer, Berlin, Heidelberg.Google Scholar
- Kwon Y, Kim D, Son Y, Vasserman E, Kim Y. Be selfish and avoid dilemmas: Fork after withholding (faw) attacks on bitcoin. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017 Oct 30 (pp. 195--209).Google Scholar
- Ke J, Jiang H, Song X, Zhao S, Wang H, Xu Q. Analysis on the block reward of fork after withholding (FAW). In International Conference on Network and System Security 2018 Aug 27 (pp. 16--31). Springer, Cham.Google Scholar
- https://tokenview.com/en/minePoolList. Accessed, Aug, 2021.Google Scholar
- Zaghloul E, Li T, Mutka MW, Ren J. Bitcoin and blockchain: Security and privacy. IEEE Internet of Things Journal. 2020 Jun 22;7(10):10288--313.Google Scholar
- Zhu H, Yang R, Mišić J, Mišić VB, Chang X. How Does FAW Attack Impact an Imperfect PoW Blockchain: A Simulation-based Approach. In 2022 IEEE International Conference on Communications (ICC) 2022 May 15 (pp. 1--6). IEEE.Google Scholar
- Saad M, Spaulding J, Njilla L, Kamhoua C, Shetty S, Nyang D, Mohaisen D. Exploring the attack surface of blockchain: A comprehensive survey. IEEE Communications Surveys & Tutorials. 2020 Mar 2;22(3):1977--2008.Google Scholar
- Li X, Jiang P, Chen T, Luo X, Wen Q. A survey on the security of blockchain systems. Future Generation Computer Systems. 2020 Jun 1;107:841--53.Google Scholar
- Rosenfeld M. Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980. 2011 Dec 21.Google Scholar
- Chang SY, Park Y, Wuthier S, Chen CW. Uncle-block attack: Blockchain mining threat beyond block withholding for rational and uncooperative miners. In International Conference on Applied Cryptography and Network Security 2019 Jun 5 (pp. 241--258). Springer, Cham.Google Scholar
- Gao S, Li Z, Peng Z, Xiao B. Power adjusting and bribery racing: Novel mining attacks in the bitcoin system. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security 2019 Nov 6 (pp. 833--850).Google Scholar
- Sarker A, Wuthier S, Chang SY. Anti-withholding reward system to secure blockchain mining pools. In 2019 Crypto Valley Conference on Blockchain Technology (CVCBT) 2019 Jun 24 (pp. 43--46). IEEE.Google Scholar
- Lee S, Kim S. Countering block withholding attack efficiently. In IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2019 Apr 29 (pp. 330--335). IEEE.Google Scholar
- Chang SY, Park Y. Silent timestamping for blockchain mining pool security. In 2019 International Conference on Computing, Networking and Communications (ICNC) 2019 Feb 18 (pp. 1--5). IEEE.Google Scholar
- Göbel J, Keeler HP, Krzesinski AE, Taylor PG. Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay. Performance Evaluation. 2016 Oct 1;104:23--41.Google Scholar
- Carlsten M, Kalodner H, Weinberg SM, Narayanan A. On the instability of bitcoin without the block reward. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016 Oct 24 (pp. 154--167).Google Scholar
- Yang R, Chang X, Mišić J, Mišić V.B., Kang H. Quantitative Comparison of Two Chain-Selection Protocols under Selfish Mining Attack. IEEE Transactions on Network and Service Management. (Early Access).Google Scholar
- Bai Q, Zhou X, Wang X, Xu Y, Wang X, Kong Q. A deep dive into blockchain selfish mining. In 2019 IEEE International Conference on Communications (ICC) 2019 May 20 (pp. 1--6). IEEE.Google Scholar
- Yang R, Chang X, Mišić J, Mišić VB. Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views. Computers & Security. 2020 Oct 1;97:101956.Google Scholar
- Kang H, Chang X, Yang R, Mišić J, Mišić VB. Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks with Extended Forks. IEEE Transactions on Network and Service Management. 2021 Apr 15.Google ScholarCross Ref
- Dong X, Wu F, Faree A, Guo D, Shen Y, Ma J. Selfholding: A combined attack model using selfish mining with block withholding attack. Computers & Security. 2019 Nov 1;87:101584.Google Scholar
- Yang R, Chang X, Misic J, Misic VB, Kang H. On Selfholding Attack Impact on Imperfect PoW Blockchain Networks. IEEE Transactions on Network Science and Engineering. 2021 Aug 10.Google ScholarCross Ref
- Mišić J, Mišić VB, Chang X. On Ledger Inconsistency Time in Bitcoin's Blockchain Delivery Network. In 2019 IEEE Global Communications Conference (GLOBECOM) 2019 Dec 9 (pp. 1--6). IEEE.Google Scholar
- https://www.maplesoft.com/. Assessed, July. 2021.Google Scholar
- https://btc.com/stats/pool?pool_mode=year. Accessed, August 2021.Google Scholar
- https://www.blockchain.com/charts/n-orphaned-blocks. Access: July, 2021.Google Scholar
Index Terms
- Evaluating fork after withholding (FAW) attack in Bitcoin
Recommendations
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications SecurityIn the Bitcoin system, participants are rewarded for solving cryptographic puzzles. In order to receive more consistent rewards over time, some participants organize mining pools and split the rewards from the pool in proportion to each participant's ...
Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityMining attacks allow attackers to gain an unfair share of the mining reward by deviating from the honest mining strategy in the Bitcoin system. Among the most well-known are block withholding (BWH), fork after withholding (FAW), and selfish mining. In ...
Analysis of hybrid attack and defense based on block withholding strategy
AbstractAs the most influential digital cryptocurrency in the world, Bitcoin is widely recognized for its Proof of Work (PoW) consensus mechanism. However, the blockchain system based on PoW has also encountered many attacks and threats. Most of the ...
Highlights- A novel hybrid attack model against PoW based on block withholding strategy.
- Results show that multiple types of attacks with different proportions may have inhibitory effects.
- A hidden target value defense model that can eliminate ...
Comments