Paper 2021/299
HashSplit: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality
Muhammad Saad, Afsah Anwar, Srivatsan Ravi, and David Mohaisen
Abstract
The safety of the Bitcoin blockchain relies on strong network synchrony. Therefore, violating the blockchain safety requires strong adversaries who control a mining pool with 51% hash rate. In this paper, we show that the network synchrony does not hold in the real world Bitcoin network, which can be exploited to amortize the cost of various attacks. Towards that, first we construct the Bitcoin ideal world functionality to formally specify its ideal execution model in a synchronous network. We then develop a large-scale data collection system through which we connect with more than 36K IP addresses of the Bitcoin nodes and identify 359 mining nodes. We contrast the Bitcoin ideal functionality against real world measurements to expose network anomalies that can be exploited to optimize the existing attacks. Particularly, we observe high block propagation delay in the Bitcoin network causing weak network synchronization: on average, in 9.97 minutes, only 39% nodes have the up-to-date blockchain. Through a fine-grained analysis, we discover non-uniform block propagation delay among the mining nodes showing that the Bitcoin network is asynchronous. To realize the threat of asynchronous network, we present the HashSplit attack that allows an adversary to orchestrate concurrent mining on multiple branches of the blockchain to violate common prefix and chain quality properties. We also propose the attack countermeasures by releasing a Bitcoin Core version that closely models the Bitcoin ideal functionality. Our measurements, theoretical modeling, pro-posed attack, and countermeasures open new directions in the security evaluation of Bitcoin and similar blockchain systems
Note: Updated revision with a few terminology fixes
Metadata
- Available format(s)
- Category
- Applications
- Publication info
- Preprint. MAJOR revision.
- Keywords
- BlockchainConsensus
- Contact author(s)
- srivatsr @ usc edu
- History
- 2021-10-21: revised
- 2021-03-09: received
- See all versions
- Short URL
- https://ia.cr/2021/299
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2021/299, author = {Muhammad Saad and Afsah Anwar and Srivatsan Ravi and David Mohaisen}, title = {{HashSplit}: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality}, howpublished = {Cryptology {ePrint} Archive, Paper 2021/299}, year = {2021}, url = {https://eprint.iacr.org/2021/299} }