Bitcoin News and Finance A New Academic Paper Describes 3 Attack Methods Against an Ethereum PoS Chain Skip to main content

A New Academic Paper Describes 3 Attack Methods Against an Ethereum PoS Chain

Following the Altair upgrade on the Ethereum network, the protocol’s native cryptocurrency reached a new all-time price high. Altair is the next step for the Ethereum’s network’s proof-of-stake (PoS) transition. However, a recently submitted white paper explains that a group of computer scientists from Stanford University and the Ethereum Foundation believe there are three attack vectors “on [a] proof-of-stake Ethereum” blockchain.

The 3 Attacks Against Ethereum Thesis Aims to Describe a Proof-of-Stake Problem Based on Evidence

The Ethereum network currently has a proof-of-work (PoW) consensus mechanism and in time, the protocol plans to fully transition into a proof-of-stake (PoS) network. Recent upgrades like Berlin, London, and Altair have been applied to help smooth the transition toward the PoS goal. Just recently, after Altair was implemented, the price per ether skyrocketed toward a new all-time high (ATH) at $4,467 per unit.

At the same time, network transfer fees have also swelled significantly as high as $50 for the average ether transaction on Saturday morning. Furthermore, on Saturday morning in the U.S. vertical trends from Twitter indicate the term “ETH 2.0” started trending. Some of the individuals discussing the ETH 2.0 upgrade have shared a new white paper written by computer scientists from Stanford University and the Ethereum Foundation.

The BTC proponent Tuur Demeester shared the paper on Saturday and two quotes from the paper that theorize how an adversary can attack the chain. The paper called “Three Attacks on Proof-of-Stake Ethereum” was submitted on October 19.

The white paper was authored by Caspar Schwarz-Schilling, Joachim Neu, Barnabé Monnot, Aditya Asgaonkar, Ertem Nusret Tas, and David Tse. Essentially, the white paper reveals that two Ethereum network attacks were presented in recent times and the paper’s authors refined the techniques.

In addition to the refinement of the first two which theoretically create “short-range reorganizations” and an “adversarial network delay,” the computer scientists came up with a third attack.

“Combining techniques from both refined attacks, we obtain a third attack which allows an adversary with vanishingly small fraction of stake and no control over network message propagation (assuming instead probabilistic message propagation) to cause even long-range consensus chain reorganizations,” the paper’s authors note. The three attacks to ETH PoS paper adds:

Honest-but-rational or ideologically motivated validators could use this attack to increase their profits or stall the protocol, threatening incentive alignment and security of PoS Ethereum. The attack can also lead to destabilization of consensus from congestion in vote processing.

White Paper Says Attacks ‘Also Enable aPriori Malign Actors to Outright Stall Consensus Decisions’

Meanwhile, Ethereum network critics used the paper to highlight the possible vulnerabilities associated with these attacks when the network transitions to a full PoS system. The founder of the Chia project and the creator of Bittorrent, Bram Cohen, also tweeted about the new study on Saturday.

A Chia proponent responded and told Cohen: “Let’s revisit your tweet in a year and see what Chia has accomplished vs ETH. Please consider your attitude is turning away community members like myself.” The Ethereum attacks paper does provide a possible method of attacks against an Ethereum PoS chain, but also offers solutions. The paper’s authors believe the attacks provide incentives to malicious actors.

“Our attacks also enable apriori malign actors, perhaps ideologically motivated, to delay and in some cases outright stall consensus decisions,” the paper’s authors conclude. “The refined attack of Section 4.2 gives the adversary a tool to do just that, even if the adversary cannot control message propagation delays (which instead are assumed to be probabilistic).”

What do you think about the recently published paper on three attacks against an Ethereum PoS system? Let us know what you think about this subject in the comments section below.

Comments

Popular posts from this blog

Custodial Lightning Network Service Attack Discovered by LN ‘Newbie’ — Hacker Strikes 6 LN Custodians

On September 18, a Redditor posted to the r/bitcoin forum and explained how he discovered a way to “attack [the] lightning Network’s custodial services.” The Reddit account dubbed “Reckless Satoshi” wanted to figure out if a “discrepancy between real routing fees and service’s transaction fee can be exploited for a profit.” The researcher disclosed that he wanted to see how large the damage could be and said “it is bad.” 6 Lightning Network Custodial Services Attacked, Researcher Discloses Findings to Offenders Prior to Public Disclosure A Redditor called Reckless Satoshi published a disclosure post on r/bitcoin this past Saturday and disclosed how he had found a vulnerability with routing fees and some of the Lightning Network’s custodial services. The research attack was done in good faith and after it was complete he disclosed the bugs to the offending services before publishing his findings. Reckless Satoshi used the Lightning Network (LN) attack on six different services incl...

Axie Infinity Down 40% Since Last Week’s Price High, Protocol Revenue Outshines Competitors

Last week, the game token leveraged within the Axie Infinity gaming universe skyrocketed to all-time highs, while other crypto markets remained extremely lackluster. During the last seven days, Axie Infinity’s platform token has dropped significantly in value shedding more than 12%. Meanwhile, the game platform’s smooth love potion token has slid over 8% over the last 24 hours. Axie Infinity Down More Than 40% Since All-Time High Not too long ago, the axie infinity (AXS) token was a topical conversation because it reached an all-time high on July 15. At the time, AXS managed to capture $28.93 per unit and since then it has shed 12.8% during the last seven days. The axie infinity (AXS) token is used within the blockchain-based game that involves battles between token-based creatures called “Axies.” AXS is used for the game’s governance system as well as other actions within the game. At the time of writing axie infinity (AXS) is exchanging hands for $16.70 per coin. AXS/USD on Ju...

Play-to-Earn Game From Polker (PKR) Exchange Listing – Endorsed by Akon

The Play-to-Earn NFT based Polker.Game ‘s native token $PKR has been officially listed on the popular centralized exchange BitMart. Polker.game has been in the spotlight recently as Akon, the American R&B superstar and record producer gave his official endorsement of polker stating that the “game is revolutionary” and that Polker is “hands down.. the best play to earn, NFT game in the space.”. With the BitMart listing and celebrity endorsement from Akon, Polker is perfectly positioned to become a major player in the Play-to-Earn league. Watch Akon’s Video Here What is Play-to-Earn? Although not a new concept, play-to-earn has become a trending term due to the popularity of the NFT game AXIE infinity. In the past, previous play-to-earn games have also achieved success – however, thanks to the huge amount of development in the blockchain space in recent years the gaming experience is now massively improved. Play-to-Earn games are essentially free to play and open to anyone and...

China to Crack Down on Copyright Infringement Through NFTs

Authorities in China are going after creators of digital collectibles based on other people’s works of art, the use of which was not authorized. The government offensive is part of a campaign to combat online copyright infringement and piracy with the participation of several departments. Regulators in China Move to Strengthen Copyright Supervision of Online Platforms The National Copyright Administration of China (NCAC) has recently launched a campaign against copyright infringement and piracy on the internet, together with the Ministry of Industry and Information Technology, the Ministry of Public Security, and the State Internet Information Office of the People’s Republic. A major objective of the initiative is to improve copyright supervision of online businesses by investigating cases involving the sale and distribution of infringing products on short video, live broadcast and e-commerce platforms, and promptly dealing with infringing content, the agency announced in a press r...
Blogarama - Blog Directory