Abstract
This paper discusses a potentially serious attack against public crypto-currency mining pools. By deliberately introducing errors under benign miners’ names, this attack can fool the mining pool administrator into punishing any innocent miner; when the top miners are punished, this attack can significantly slow down the overall production of the mining pool. We show that an attacker needs only a small fraction (e.g., one millionth) of the resources of a victim mining pool, which makes this attack scheme very affordable by a less powerful competing mining pool. We experimentally confirm the effectiveness of this attack scheme against a few well-known mining pools such as Minergate and Slush Pool.
| Original language | English |
|---|---|
| Title of host publication | Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Proceedings |
| Editors | Joaquin Garcia-Alfaro, Jordi Herrera-Joancomartí, Giovanni Livraga, Ruben Rios |
| Publisher | Springer Science and Business Media Deutschland GmbH |
| Pages | 140-154 |
| Number of pages | 15 |
| ISBN (Print) | 9783030003043 |
| DOIs | |
| State | Published - 2018 |
| Externally published | Yes |
| Event | 2nd International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2018 held in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018 - Barcelona, Spain Duration: 6 Sep 2018 → 7 Sep 2018 |
Publication series
| Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
|---|---|
| Volume | 11025 LNCS |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 2nd International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2018 held in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018 |
|---|---|
| Country/Territory | Spain |
| City | Barcelona |
| Period | 6/09/18 → 7/09/18 |
Bibliographical note
Publisher Copyright:© Springer Nature Switzerland AG 2018.
Keywords
- Crypto currency
- DoS attack
- Invalid share
- Mining pool
- Stratum protocol
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science