Langsung ke konten utama

A New Academic Paper Describes 3 Attack Methods Against an Ethereum PoS Chain

Following the Altair upgrade on the Ethereum network, the protocol’s native cryptocurrency reached a new all-time price high. Altair is the next step for the Ethereum’s network’s proof-of-stake (PoS) transition. However, a recently submitted white paper explains that a group of computer scientists from Stanford University and the Ethereum Foundation believe there are three attack vectors “on [a] proof-of-stake Ethereum” blockchain.

The 3 Attacks Against Ethereum Thesis Aims to Describe a Proof-of-Stake Problem Based on Evidence

The Ethereum network currently has a proof-of-work (PoW) consensus mechanism and in time, the protocol plans to fully transition into a proof-of-stake (PoS) network. Recent upgrades like Berlin, London, and Altair have been applied to help smooth the transition toward the PoS goal. Just recently, after Altair was implemented, the price per ether skyrocketed toward a new all-time high (ATH) at $4,467 per unit.

At the same time, network transfer fees have also swelled significantly as high as $50 for the average ether transaction on Saturday morning. Furthermore, on Saturday morning in the U.S. vertical trends from Twitter indicate the term “ETH 2.0” started trending. Some of the individuals discussing the ETH 2.0 upgrade have shared a new white paper written by computer scientists from Stanford University and the Ethereum Foundation.

The BTC proponent Tuur Demeester shared the paper on Saturday and two quotes from the paper that theorize how an adversary can attack the chain. The paper called “Three Attacks on Proof-of-Stake Ethereum” was submitted on October 19.

The white paper was authored by Caspar Schwarz-Schilling, Joachim Neu, Barnabé Monnot, Aditya Asgaonkar, Ertem Nusret Tas, and David Tse. Essentially, the white paper reveals that two Ethereum network attacks were presented in recent times and the paper’s authors refined the techniques.

In addition to the refinement of the first two which theoretically create “short-range reorganizations” and an “adversarial network delay,” the computer scientists came up with a third attack.

“Combining techniques from both refined attacks, we obtain a third attack which allows an adversary with vanishingly small fraction of stake and no control over network message propagation (assuming instead probabilistic message propagation) to cause even long-range consensus chain reorganizations,” the paper’s authors note. The three attacks to ETH PoS paper adds:

Honest-but-rational or ideologically motivated validators could use this attack to increase their profits or stall the protocol, threatening incentive alignment and security of PoS Ethereum. The attack can also lead to destabilization of consensus from congestion in vote processing.

White Paper Says Attacks ‘Also Enable aPriori Malign Actors to Outright Stall Consensus Decisions’

Meanwhile, Ethereum network critics used the paper to highlight the possible vulnerabilities associated with these attacks when the network transitions to a full PoS system. The founder of the Chia project and the creator of Bittorrent, Bram Cohen, also tweeted about the new study on Saturday.

A Chia proponent responded and told Cohen: “Let’s revisit your tweet in a year and see what Chia has accomplished vs ETH. Please consider your attitude is turning away community members like myself.” The Ethereum attacks paper does provide a possible method of attacks against an Ethereum PoS chain, but also offers solutions. The paper’s authors believe the attacks provide incentives to malicious actors.

“Our attacks also enable apriori malign actors, perhaps ideologically motivated, to delay and in some cases outright stall consensus decisions,” the paper’s authors conclude. “The refined attack of Section 4.2 gives the adversary a tool to do just that, even if the adversary cannot control message propagation delays (which instead are assumed to be probabilistic).”

What do you think about the recently published paper on three attacks against an Ethereum PoS system? Let us know what you think about this subject in the comments section below.



source https://news.bitcoin.com/a-new-academic-paper-describes-3-attack-methods-against-an-ethereum-pos-chain/

Komentar

Postingan populer dari blog ini

Massive Crypto ETF Exodus: $742M Vanishes Overnight

Recent data reveals that spot bitcoin (BTC) and ether (ETH) exchange-traded funds (ETFs) experienced collective net outflows amounting to $742.24 million. Blackrock, Valkyrie, and Grayscale Among Crypto ETFs Hit by $742M Reduction On Wednesday, U.S.-based bitcoin and ethereum ETFs faced significant reductions, with bitcoin ETFs losing $582.90 million and ether ETFs seeing $159.34 million in […] source https://news.bitcoin.com/massive-crypto-etf-exodus-742m-vanishes-overnight/

Bitcoin Giant Microstrategy Caught in Biden’s Tax Web

This week, The Wall Street Journal highlighted potential tax complications for the publicly traded company Microstrategy, particularly concerning unrealized gains. According to the report, the Corporate Alternative Minimum Tax (CAMT), introduced under the Biden administration, could impose a notable financial obligation on the firm. Microstrategy’s Billion-Dollar Bitcoin Gamble Hits a Snag: CAMT Tax Law Looms, […] source https://news.bitcoin.com/bitcoin-giant-microstrategy-caught-in-bidens-tax-web/

What Are AI Agent Coins? Utility, Autonomy, and Blockchain Power

Over the past year, the fusion of artificial intelligence (AI) and cryptocurrencies has sparked a significant rise in the prominence of AI-centric digital assets. Now, a fresh subset is emerging from obscurity—AI agent coins—a category of cryptocurrencies linked to initiatives employing autonomous AI agents for tasks within the blockchain realm. AI Agent Coins: The Emerging […] source https://news.bitcoin.com/what-are-ai-agent-coins-utility-autonomy-and-blockchain-power/