TALK: Wednesday 09-30-2015 Eclipse Attacks on Bitcoin’s Peer-to-Peer Network

Eclipse Attacks on Bitcoin’s Peer-to-Peer Network Seminar Series: CSAIL Security Seminar 2015/2016 Speaker: Ethan Heilman Speaker Affiliation: Boston University Host: CSAIL Security Seminar Date: Wednesday, September 30, 2015 Time: 4:00 PM to 5:00 PM Location: 32-G882 Abstract We present eclipse attacks on bitcoin's peer-to-peer network. Our attack allows an adversary controlling a sufficient number of IP addresses to monopolize all connections to and from a victim bitcoin node. The attacker can then exploit the victim for attacks on bitcoin's mining and consensus system, including N-confirmation double spending, selfish mining, and adversarial forks in the blockchain. We take a detailed look at bitcoin’s peer-to-peer network, and quantify the resources involved in our attack via probabilistic analysis, Monte Carlo simulations, measurements and experiments with live bitcoin nodes. Finally, we present countermeasures, inspired by botnet architectures, that are designed to raise the bar for eclipse attacks while preserving the openness and decentralization of bitcoin’s current network architecture. Bio Ethan is a PhD student in the Boston University Security Group (BUSec) of the Computer Science Dept. His research interests are: network security, crypto currencies, hash function cryptanalysis and side channel attacks. His most recent projects have been related to internet routing and Bitcoin. Relevant URL: For more information please contact: Frank Wang, <a href="mailto:frankw at csail.mit.edu">frankw at csail.mit.edu</a> -------------- next part -------------- Eclipse Attacks on Bitcoin’s Peer-to-Peer Network Seminar Series: CSAIL Security Seminar 2015/2016 Speaker: Ethan Heilman Speaker Affiliation: Boston University Host: CSAIL Security Seminar Date: Wednesday, September 30, 2015 Time: 4:00 PM to 5:00 PM Location: 32-G882 Abstract We present eclipse attacks on bitcoin's peer-to-peer network. Our attack allows an adversary controlling a sufficient number of IP addresses to monopolize all connections to and from a victim bitcoin node. The attacker can then exploit the victim for attacks on bitcoin's mining and consensus system, including N-confirmation double spending, selfish mining, and adversarial forks in the blockchain. We take a detailed look at bitcoin’s peer-to-peer network, and quantify the resources involved in our attack via probabilistic analysis, Monte Carlo simulations, measurements and experiments with live bitcoin nodes. Finally, we present countermeasures, inspired by botnet architectures, that are designed to raise the bar for eclipse attacks while preserving the openness and decentralization of bitcoin’s current network architecture. Bio Ethan is a PhD student in the Boston University Security Group (BUSec) of the Computer Science Dept. His research interests are: network security, crypto currencies, hash function cryptanalysis and side channel attacks. His most recent projects have been related to internet routing and Bitcoin. Relevant URL: For more information please contact: Frank Wang, <a href="mailto:frankw at csail.mit.edu">frankw at csail.mit.edu</a>