Total Eclipse: How To Completely Isolate a Bitcoin Peer

Adja Elloh Yves-Christian, Badis Hammi, A. Serhrouchni, H. Labiod
{"title":"Total Eclipse: How To Completely Isolate a Bitcoin Peer","authors":"Adja Elloh Yves-Christian, Badis Hammi, A. Serhrouchni, H. Labiod","doi":"10.1109/SSIC.2018.8556790","DOIUrl":null,"url":null,"abstract":"In the cryptocurrency world, Bitcoin holds the first place in terms of market cap and currency price, which makes it the first target and victim of attack attempts. Indeed, there are various attacks against cryptocurrencies in general and Bitcoin in particular, e.g., block withholding, transaction malleability and the Eclipse attack. The latter, allows an attacker to completely isolate a peer and to monopolize all permanent connections from/to the victim. However, in this attack, the non permanent connections, remains non monopolized by the attacker, which can disturb the attack success. In this paper, we propose (1) a characterization of the misbehavior mechanism applied by Bitcoin and its weaknesses; and (2) a new method to realize the Eclipse attack which monopolizes all the peer’s connections, even the non permanent ones, with a minimal number of IP addresses. Our characterization and attack realization, were performed on the main Bitcoin network and on a real client.","PeriodicalId":302563,"journal":{"name":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SSIC.2018.8556790","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14

Abstract

In the cryptocurrency world, Bitcoin holds the first place in terms of market cap and currency price, which makes it the first target and victim of attack attempts. Indeed, there are various attacks against cryptocurrencies in general and Bitcoin in particular, e.g., block withholding, transaction malleability and the Eclipse attack. The latter, allows an attacker to completely isolate a peer and to monopolize all permanent connections from/to the victim. However, in this attack, the non permanent connections, remains non monopolized by the attacker, which can disturb the attack success. In this paper, we propose (1) a characterization of the misbehavior mechanism applied by Bitcoin and its weaknesses; and (2) a new method to realize the Eclipse attack which monopolizes all the peer’s connections, even the non permanent ones, with a minimal number of IP addresses. Our characterization and attack realization, were performed on the main Bitcoin network and on a real client.
《日全食:如何完全隔离比特币同行
在加密货币世界中,比特币在市值和货币价格方面占据首位,这使其成为攻击企图的第一个目标和受害者。事实上,针对加密货币,特别是比特币,存在各种各样的攻击,例如区块扣留、交易延展性和Eclipse攻击。后者允许攻击者完全隔离对等体并垄断来自/到受害者的所有永久连接。但是,在这种攻击中,非永久连接没有被攻击者垄断,这可能会影响攻击的成功。在本文中,我们提出(1)比特币应用的不当行为机制及其弱点的表征;(2)提出了一种新的Eclipse攻击方法,该方法可以用最少的IP地址独占对等体的所有连接,甚至是非永久连接。我们的表征和攻击实现是在主要比特币网络和真实客户端上进行的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信