Bribe & Fork: Cheap PCN Bribing Attacks via Forking Threat

Authors Zeta Avarikioti, Paweł Kędzior, Tomasz Lizurej, Tomasz Michalak



PDF
Thumbnail PDF

File

LIPIcs.AFT.2024.11.pdf
  • Filesize: 1.02 MB
  • 22 pages

Document Identifiers

Author Details

Zeta Avarikioti
  • Department of Informatics, TU Wien, Austria
Paweł Kędzior
  • University of Warsaw, Poland
Tomasz Lizurej
  • NASK, Warsaw, Poland
  • University of Warsaw, Poland
Tomasz Michalak
  • IDEAS NCBR, Warsaw, Poland
  • University of Warsaw, Poland

Acknowledgements

We thank Paul Harrenstein for his help in defining the model presented in this work.

Cite AsGet BibTex

Zeta Avarikioti, Paweł Kędzior, Tomasz Lizurej, and Tomasz Michalak. Bribe & Fork: Cheap PCN Bribing Attacks via Forking Threat. In 6th Conference on Advances in Financial Technologies (AFT 2024). Leibniz International Proceedings in Informatics (LIPIcs), Volume 316, pp. 11:1-11:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024)
https://doi.org/10.4230/LIPIcs.AFT.2024.11

Abstract

In this work, we reexamine the vulnerability of Payment Channel Networks (PCNs) to bribing attacks, where an adversary incentivizes blockchain miners to deliberately ignore a specific transaction to undermine the punishment mechanism of PCNs. While previous studies have posited a prohibitive cost for such attacks, we show that this cost can be dramatically reduced (to approximately $125), thereby increasing the likelihood of these attacks. To this end, we introduce Bribe & Fork, a modified bribing attack that leverages the threat of a so-called feather fork which we analyze with a novel formal model for the mining game with forking. We empirically analyze historical data of some real-world blockchain implementations to evaluate the scale of this cost reduction. Our findings shed more light on the potential vulnerability of PCNs and highlight the need for robust solutions.

Subject Classification

ACM Subject Classification
  • Security and privacy → Systems security
Keywords
  • Blockchain
  • Payment Channels Networks
  • Timelock Bribing
  • Feather Forking

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Lukas Aumayr, Ozgur Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostakova, Matteo Maffei, Pedro Moreno-Sanchez, and Sabrina Riahi. Generalized bitcoin-compatible channels. Cryptology ePrint Archive, 2020:476, 2020. URL: https://eprint.iacr.org/2020/476.
  2. Lukas Aumayr, Ozgur Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostakova, Matteo Maffei, Pedro Moreno-Sanchez, and Sabrina Riahi. Bitcoin-compatible virtual channels. In IEEE Symposium on Security and Privacy, 2021. URL: https://eprint.iacr.org/2020/554.pdf.
  3. Lukas Aumayr, Sri AravindaKrishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sanchez, and Matteo Maffei. Sleepy channels: Bi-directional payment channels without watchtowers. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pages 179-192, 2022. Google Scholar
  4. Zeta Avarikioti, Eleftherios Kokoris Kogias, Roger Wattenhofer, and Dionysis Zindros. Brick: Asynchronous incentive-compatible payment channels. In International Conference on Financial Cryptography and Data Security, 2021. URL: https://fc21.ifca.ai/preproceedings/50.pdf.
  5. Zeta Avarikioti, Orestis S. T. Litos, and Roger Wattenhofer. Cerberus channels: Incentivizing watchtowers for bitcoin. In International Conference on Financial Cryptography and Data Security, pages 346-366. Springer, 2020. URL: https://link.springer.com/chapter/10.1007/978-3-030-60276-7_18.
  6. Zeta Avarikioti and Orfeas Stefanos Thyfronitis Litos. Suborn channels: Incentives against timelock bribes. In Financial Cryptography and Data Security - 26th International Conference, FC 2022, Grenada, May 2-6, 2022, Revised Selected Papers, volume 13411 of Lecture Notes in Computer Science, pages 488-511. Springer, 2022. URL: https://doi.org/10.1007/978-3-031-18283-9_24.
  7. Iddo Bentov and Ranjit Kumaresan. How to use bitcoin to design fair protocols. In Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, volume 8617 of Lecture Notes in Computer Science, pages 421-439. Springer, 2014. URL: https://doi.org/10.1007/978-3-662-44381-1_24.
  8. Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, and Edward W. Felten. Sok: Research perspectives and challenges for bitcoin and cryptocurrencies. In 2015 IEEE Symposium on Security and Privacy, pages 104-121, 2015. URL: https://doi.org/10.1109/SP.2015.14.
  9. Hao Chung, Elisaweta Masserova, Elaine Shi, and Sri AravindaKrishnan Thyagarajan. Rapidash: Foundations of side-contract-resilient fair exchange. Cryptology ePrint Archive, Paper 2022/1063, 2022. URL: https://eprint.iacr.org/2022/1063.
  10. Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer, Dawn Song, and Roger Wattenhofer. On scaling decentralized blockchains. In International Conference on Financial Cryptography and Data Security, pages 106-125. Springer, 2016. Google Scholar
  11. Christian Decker, Rusty Russell, and Olaoluwa Osuntokun. eltoo: A simple layer2 protocol for bitcoin. https://blockstream.com/eltoo.pdf, 2019.
  12. Christian Decker and Roger Wattenhofer. A fast and scalable payment network with bitcoin duplex micropayment channels. In Stabilization, Safety, and Security of Distributed Systems, pages 3-18. Springer, 2015. Google Scholar
  13. Stefan Dziembowski, Lisa Eckey, Sebastian Faust, and Daniel Malinowski. Perun: Virtual payment hubs over cryptocurrencies. In 2019 IEEE Symposium on Security and Privacy (SP), pages 344-361. IEEE, 2019. Google Scholar
  14. Stefan Dziembowski, Sebastian Faust, and Kristína Hostáková. General state channel networks. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pages 949-966. ACM, 2018. Google Scholar
  15. Lewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, and Arthur Gervais. Sok: Layer-two blockchain protocols. In Joseph Bonneau and Nadia Heninger, editors, Financial Cryptography and Data Security - 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers, volume 12059 of Lecture Notes in Computer Science, pages 201-226. Springer, 2020. URL: https://doi.org/10.1007/978-3-030-51280-4_12.
  16. Michael Jourenko, Nicolas Larangeira, and Koji Tanaka. Lightweight virtual payment channels. In Cryptology and Network Security, pages 365-384. Springer International Publishing, 2020. Google Scholar
  17. Dimitris Karakostas, Aggelos Kiayias, and Thomas Zacharias. Blockchain bribing attacks and the efficacy of counterincentives, 2024. URL: https://arxiv.org/abs/2402.06352.
  18. Sishan Long, Soumya Basu, and Emin Gün Sirer. Measuring miner decentralization in proof-of-work blockchains. arXiv preprint arXiv:2203.16058, 2022. Google Scholar
  19. Antonio Magnani, Luca Calderoni, and Paolo Palmieri. Feather forking as a positive force: incentivising green energy production in a blockchain-based smart grid. In Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, pages 99-104, 2018. Google Scholar
  20. Andrew Miller. Feather-forks: enforcing a blacklist with sub-50% hash power. URL: https://bitcointalk.org/index.php?topic=312668.0.
  21. Andrew Miller and Iddo Bentov. Zero-collateral lotteries in bitcoin and ethereum, 2017. URL: https://arxiv.org/abs/1612.05390.
  22. Michael Mirkin, Yan Ji, Jonathan Pang, Ariah Klages-Mundt, Ittay Eyal, and Ari Juels. Bdos: Blockchain denial of service, 2020. URL: https://arxiv.org/abs/1912.07497.
  23. Tejaswi Nadahalli, Majid Khabbazian, and Roger Wattenhofer. Timelocked bribing. In Financial Cryptography and Data Security - 25th International Conference, FC, volume 12674 of Lecture Notes in Computer Science, pages 53-72. Springer, 2021. URL: https://doi.org/10.1007/978-3-662-64322-8_3.
  24. Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system, 2008. URL: http://bitcoin.org/bitcoin.pdf.
  25. Joseph Poon and Thaddeus Dryja. The bitcoin lightning network: Scalable off-chain instant payments. https://lightning.network/lightning-network-paper.pdf, January 2016. Google Scholar
  26. Yahya Shahsavari, Kaiwen Zhang, and Chamseddine Talhi. A theoretical model for fork analysis in the bitcoin network. In IEEE International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, July 14-17, 2019, July 2019. URL: https://doi.org/10.1109/Blockchain.2019.00038.
  27. Santhi Shalini and H Santhi. A survey on various attacks in bitcoin and cryptocurrency. In 2019 International Conference on Communication and Signal Processing (ICCSP), pages 0220-0224. IEEE, 2019. Google Scholar
  28. Joseph Spilman. Anti dos for tx replacement. https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2013-April/002433.html, 2013. Accessed: 2020-11-22.
  29. Itay Tsabary, Matan Yechieli, Alex Manuskin, and Ittay Eyal. MAD-HTLC: because HTLC is crazy-cheap to attack. In 42nd IEEE Symposium on Security and Privacy, SP, pages 1230-1248. IEEE, 2021. URL: https://doi.org/10.1109/SP40001.2021.00080.
  30. Sarisht Wadhwa, Jannis Stoeter, Fan Zhang, and Kartik Nayak. He-htlc: Revisiting incentives in HTLC. In 30th Annual Network and Distributed System Security Symposium, NDSS. The Internet Society, 2023. URL: https://www.ndss-symposium.org/ndss-paper/he-htlc-revisiting-incentives-in-htlc/.
  31. Fredrik Winzer, Benjamin Herd, and Sebastian Faust. Temporary censorship attacks in the presence of rational miners. In 2019 IEEE European Symposium on Security and Privacy Workshops, EuroS&P Workshops, pages 357-366. IEEE, 2019. URL: https://doi.org/10.1109/EuroSPW.2019.00046.
  32. Gavin Wood. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 2014. Google Scholar
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail