SquirRL: Automating attack analysis on blockchain incentive mechanisms with deep reinforcement learning

C Hou, M Zhou, Y Ji, P Daian, F Tramer, G Fanti… - arXiv preprint arXiv …, 2019 - arxiv.org
Incentive mechanisms are central to the functionality of permissionless blockchains: they
incentivize participants to run and secure the underlying consensus protocol. Designing …

Bdos: Blockchain denial-of-service

M Mirkin, Y Ji, J Pang, A Klages-Mundt, I Eyal… - Proceedings of the …, 2020 - dl.acm.org
Proof-of-work (PoW) cryptocurrency blockchains like Bitcoin secure vast amounts of money.
Their operators, called miners, expend resources to generate blocks and receive monetary …

IPBSM: An optimal bribery selfish mining in the presence of intelligent and pure attackers

G Yang, Y Wang, Z Wang, Y Tian… - International Journal of …, 2020 - Wiley Online Library
Blockchain is a “decentralized” system, where the security heavily depends on that of the
consensus protocols. For instance, attackers gain illegal revenues by leveraging the …

Countering selfish mining in blockchains

M Saad, L Njilla, C Kamhoua… - 2019 International …, 2019 - ieeexplore.ieee.org
Selfish mining is a well known vulnerability in blockchains exploited by miners to steal block
rewards. In this paper, we explore a new form of selfish mining attack that guarantees high …

MAD-HTLC: because HTLC is crazy-cheap to attack

I Tsabary, M Yechieli, A Manuskin… - 2021 IEEE symposium …, 2021 - ieeexplore.ieee.org
Smart Contracts and transactions allow users to implement elaborate constructions on
cryptocurrency blockchains like Bitcoin and Ethereum. Many of these constructions …

Yoda: Enabling computationally intensive contracts on blockchains with byzantine and selfish nodes

S Das, VJ Ribeiro, A Anand - arXiv preprint arXiv:1811.03265, 2018 - arxiv.org
One major shortcoming of permissionless blockchains such as Bitcoin and Ethereum is that
they are unsuitable for running Computationally Intensive smart Contracts (CICs). This …

[PDF][PDF] Bobtail: Improved Blockchain Security with Low-Variance Mining.

G Bissias, BN Levine - NDSS, 2020 - people.cs.umass.edu
Blockchain systems are designed to produce blocks at a constant average rate. The most
popular systems currently employ a Proof of Work (PoW) algorithm as a means of creating …

[PDF][PDF] Zeroblock: Preventing selfish mining in bitcoin

S Solat, M Potop-Butucaru - arXiv preprint arXiv:1605.02435, 2016 - hal.science
Bitcoin was recently introduced as a peer-to-peer electronic currency in order to facilitate
transactions outside the traditional financial system. The core of Bitcoin, the Blockchain, is …

Incentivizing blockchain forks via whale transactions

K Liao, J Katz - Financial Cryptography and Data Security: FC 2017 …, 2017 - Springer
Bitcoin's core innovation is its solution to double-spending, called Nakamoto consensus.
This provides a probabilistic guarantee that transactions will not be reversed or redirected …

Efficient MDP analysis for selfish-mining in blockchains

RB Zur, I Eyal, A Tamar - Proceedings of the 2nd ACM Conference on …, 2020 - dl.acm.org
A proof of work (PoW) blockchain protocol distributes rewards to its participants, called
miners, according to their share of the total computational power. Sufficiently large miners …