{"title":"[Copyright notice]","authors":"","doi":"10.1109/blockchain53845.2021.00003","DOIUrl":"https://doi.org/10.1109/blockchain53845.2021.00003","url":null,"abstract":"","PeriodicalId":372721,"journal":{"name":"2021 IEEE International Conference on Blockchain (Blockchain)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121857876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eranga Bandara, Deepak K. Tosh, S. Shetty, Bheshaj Krishnappa
{"title":"CySCPro - Cyber Supply Chain Provenance Framework for Risk Management of Energy Delivery Systems","authors":"Eranga Bandara, Deepak K. Tosh, S. Shetty, Bheshaj Krishnappa","doi":"10.1109/Blockchain53845.2021.00020","DOIUrl":"https://doi.org/10.1109/Blockchain53845.2021.00020","url":null,"abstract":"For operational efficiency, enterprise-level Energy Delivery Systems (EDS) rely on a number of software or hardware providers. Overseas suppliers generally manufacture and integrate critical EDS components, increasing the attack surface for adversaries looking to enter EDS (e.g., the recent SolarWinds supply chain attack). The EDS supply chain requires cyber risk management that can track cyber vulnerabilities, establish quantifiable mechanisms to understand the severity and exploitability of EDS applications while providing a remediation plan to effectively mitigate such risks. In this work, we propose a Cyber Supply Chain Provenance platform for EDS by leveraging distributed ledger technology for enabling cyber risk management capability to defend and respond to cyber supply-chain attacks (e.g., SolarWinds) and establish data provenance in a cyber supply chain ecosystem.","PeriodicalId":372721,"journal":{"name":"2021 IEEE International Conference on Blockchain (Blockchain)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123621900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SEVA: A Smart Electronic Voting Application Using Blockchain Technology","authors":"J. Abegunde, Joseph Spring, Hannan Xiao","doi":"10.1109/Blockchain53845.2021.00056","DOIUrl":"https://doi.org/10.1109/Blockchain53845.2021.00056","url":null,"abstract":"The development of electronic voting applications remains an active area of research and this has led to the proposal and implementation of many models based on blockchains. However, most of the proposed models are partially decentralized solutions, in which the blockchain is used as a storage media for votes while the application is written in programming tools such as HTML, CSS, and JavaScript. This makes them vulnerable to attacks such as Denial of Service (DoS) attacks, Single Point of Failure (SPF), and fraudulent record modification. In this paper, we propose a fully decentralized electronic voting application, SEVA, in which we placed the whole application (code and data) in Ethereum to protect the application from vulnerabilities. Additionally, we propose a new consensus algorithm, Proof of Smart Vote (PoSV) for SEVA, as a viable energy-saving alternative to the energy-intensive Proof of Work (PoW). We implemented and evaluated SEVA with PoSV and compared it with a partially decentralized model of the application.","PeriodicalId":372721,"journal":{"name":"2021 IEEE International Conference on Blockchain (Blockchain)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121757937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PUPoW: A Framework for Designing Blockchains with Practically-Useful-Proof-of-Work & VanityCoin","authors":"Yash Chaurasia, Visvesh Subramanian, Sujit Gujar","doi":"10.1109/Blockchain53845.2021.00026","DOIUrl":"https://doi.org/10.1109/Blockchain53845.2021.00026","url":null,"abstract":"Bitcoin is the first of its kind, a truly decentralized and anonymous cryptocurrency. To realize it, it has developed a blockchain technology using the concept of ‘Proof of Work’ (PoW). The miners, nodes responsible for writing transaction database, solve a cryptographic puzzle to claim the right to write to the database. Though bitcoin and many other relevant cryptocurrencies such as ether use revolutionary ideas, the main criticism involves the computing resource and energy consumption to solve the puzzles that have otherwise no use. There are attempts to use the PoW to do something useful, commonly referred to as Proof-of-Useful-Work (PoUW). In this paper, we attempt to (i) make PoUW more usable - describe how a central problem setter can crowdsource their work as PoUW and (ii) in the true spirit of blockchains, decentralize the role of problem setter, whom we call puzzlers. We propose a formal framework to do so, namely PUPow. PUPoW has an inbuilt provision of payments from puzzler to the miner who solves its puzzle. Additionally, miners have the option to not rely on continuous feed of the puzzles and instead use original PoW puzzles. We also propose a way to use PUPoW for solving TOR vanity URL generation and bitcoin vanity address generation problems. We call this PUPoW blockchain solving vanity address generation problems as VanityCoin. Both the problems need to generate public keys from private keys such that resultant addresses are of interest. Such key pairs are found only by a brute force search. However, there are privacy concerns that miners would know the private keys of the puzzlers. We resolve this by splitting the private keys, and the miners would know only one part of it. In summary, we are proposing how PoW can be made practically useful, and we believe such an approach is needed for PoW blockchains to survive.","PeriodicalId":372721,"journal":{"name":"2021 IEEE International Conference on Blockchain (Blockchain)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121956562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Taming Propagation Delay and Fork Rate in Bitcoin Mining Network","authors":"Suhan Jiang, Jie Wu","doi":"10.1109/Blockchain53845.2021.00050","DOIUrl":"https://doi.org/10.1109/Blockchain53845.2021.00050","url":null,"abstract":"Bitcoin builds upon an unstructured peer-to-peer overlay network to disseminate transactions and blocks. Broadcast in such a network is slow and brings inconsistencies, i.e., peers have different views of the system state. Due to the delayed block propagation and the competition of mining, forking, i.e., the blockchain temporarily diverges into two or more branches, occurs frequently, which wastes computation power and causes security issues. This paper proposes an autonomous and distributed topology optimization mechanism to reduce block propagation delay and hence reduce the occurrence of blockchain forks. In the proposed mechanism, a node can autonomously update his neighbor set using the information provided by his current neighbors, since each neighbor will recommend a peer from his own neighbor set, i.e., a neighbor's neighbor, to this node. Each recommendation is based on a peer's propagation ability, which is characterized as a criteria function obtained through a combination of empirical analysis and machine learning. We further propose some metrics to evaluate a Bitcoin network topology. Experiment results reflect the effectiveness of the proposed mechanism and also indicate the correlation between block propagation time and fork rate.","PeriodicalId":372721,"journal":{"name":"2021 IEEE International Conference on Blockchain (Blockchain)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114261563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alessandro Brighente, M. Conti, Gulshan Kumar, Reza Ghanbari, R. Saha
{"title":"Knocking on Tangle's Doors: Security Analysis of IOTA Ports","authors":"Alessandro Brighente, M. Conti, Gulshan Kumar, Reza Ghanbari, R. Saha","doi":"10.1109/Blockchain53845.2021.00067","DOIUrl":"https://doi.org/10.1109/Blockchain53845.2021.00067","url":null,"abstract":"Blockchains are currently deployed in a large number of different scenarios, such as cryptocurrencies, communications, factory automation, and vehicular networks. Both academia's and industry's interest in this technology is motivated by its distributed nature and its inherent security in managing information. However, traditional blockchains are limited in terms of the transaction rate they can approve. To overcome this limitation, IOTA proposed a novel blockchain based on a Directed Acyclic Graph (DAG) structure (the Tangle). It handles a larger number of transactions to target high-traffic scenarios such as Internet of Things (IoT). However, the security of the IOTA's blockchain depends on the design of its underlying communication protocols. In this paper, we analyze the security of the IOTA Tangle from a transport layer perspective. In particular, we show that well-known port-based attacks can jeopardize the integrity and availability of the IOTA services. We focus on the IOTA's TCP-based ports, and provide a discussion of all the possible attacks and their effects. We assess their validity via experimental evaluation showing their effect on the network operations. Results show that SYN flooding affects the gossip protocol by fully disrupting the service. We also find that 16% of the nodes are unable to create a neighbours list, leading to a disruption of the information exchange process. On the other side, we also show that some components are not affected by these attacks. To the best of our knowledge, we are the first to identify and validate these vulnerabilities in IOTA. Lastly, we discuss some possible countermeasures.","PeriodicalId":372721,"journal":{"name":"2021 IEEE International Conference on Blockchain (Blockchain)","volume":"260 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115875033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Message from the 2021 Blockchain & the Circular Supply Chain Workshop Organizers","authors":"","doi":"10.1109/blockchain53845.2021.00012","DOIUrl":"https://doi.org/10.1109/blockchain53845.2021.00012","url":null,"abstract":"","PeriodicalId":372721,"journal":{"name":"2021 IEEE International Conference on Blockchain (Blockchain)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125002313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Message from the 2021 Symposium on Fintech and Blockchain Systems (FBS) Chairs","authors":"","doi":"10.1109/blockchain53845.2021.00011","DOIUrl":"https://doi.org/10.1109/blockchain53845.2021.00011","url":null,"abstract":"","PeriodicalId":372721,"journal":{"name":"2021 IEEE International Conference on Blockchain (Blockchain)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127624215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scalable Blockchain Anomaly Detection with Sketches","authors":"Tomer Voronov, D. Raz, Ori Rottenstreich","doi":"10.1109/Blockchain53845.2021.00013","DOIUrl":"https://doi.org/10.1109/Blockchain53845.2021.00013","url":null,"abstract":"The growing popularity of Blockchain networks attracts also malicious and hacking users. Effectively detecting inappropriate and malicious activity should thus be a top priority for safeguarding blockchain networks and services. Blockchain behavior analysis can be used to detect unusual account activities or time periods with network-wide irregular properties. Thus, optimized anomaly detection based on historical data is an essential task for securing transactions and services. However, processing the complete blockchain history can be slow and costly due to its large size and rapid growth. In this paper we suggest addressing this challenge by analyzing summarized blocks data structures, called sketches, rather than the entire blockchain. Sketches are common data structures used in computer systems and blockchain networks, to allow compact data representation while supporting efficient executions of particular queries. We study how sketches can be used to detect suspicious accounts or time periods without the need to maintain or go through the entire blockchain data. We design solutions for the major known attacks and conduct experiments to evaluate them based on real Ethereum data. We compare the accuracy, run-time and memory usage of our algorithms with traditional detection algorithms relying on the complete blockchain data. Our results indicate that sketch-based anomaly detection methods can provide a practical scalable solution for detecting anomalies in blockchain networks.","PeriodicalId":372721,"journal":{"name":"2021 IEEE International Conference on Blockchain (Blockchain)","volume":"438 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126678643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Justin S. Gazsi, Sajia Zafreen, Gaby G. Dagher, Min Long
{"title":"VAULT: A Scalable Blockchain-Based Protocol for Secure Data Access and Collaboration","authors":"Justin S. Gazsi, Sajia Zafreen, Gaby G. Dagher, Min Long","doi":"10.1109/Blockchain53845.2021.00059","DOIUrl":"https://doi.org/10.1109/Blockchain53845.2021.00059","url":null,"abstract":"Data sharing is as vital as data storage. Existing centralized data sharing and access systems provide less transparency and traceability as the users have to trust a centralized authority and its decision making for the entire system. There is a need for decentralized distributed data storage and access without a central authority. Blockchain provides promising solutions to such needs. However, the existing decentralized blockchain-based solutions are complex and involve financial incentives, which limits their applications. We propose a secure permissioned blockchain-based decentralized system, VAULT, with a novel quorum-based consensus. We store encrypted files using Interplanetary File System (IPFS) and the references to the files in the blockchain. VAULT is designed for applications involving collaboration from multiple permissioned parties, and users can store, access, and share data as well as manage projects through blockchain. Our experimental results show that our quorum selection is fair, and the VAULT protocol is scalable.","PeriodicalId":372721,"journal":{"name":"2021 IEEE International Conference on Blockchain (Blockchain)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131372914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}