proof-of-stake at stake: predatory, destructive attack on

39
Proof-of-Stake at Stake: Predatory, Destructive Attack on PoS Cryptocurrencies Suhyeon Lee (Speaker) and Seungjoo Kim* 3rd CryBlock @ MobiCom 2020 25th September 2020, Virtual School of Cybersecurity, Korea University {orion-alpha, skim71}@korea.ac.kr * Corresponding author

Upload: others

Post on 13-Apr-2022

9 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Proof-of-Stake at Stake:Predatory, Destructive Attack

on PoS Cryptocurrencies

Suhyeon Lee (Speaker) and Seungjoo Kim*

3rd CryBlock @ MobiCom 202025th September 2020, Virtual

School of Cybersecurity, Korea University{orion-alpha, skim71}@korea.ac.kr* Corresponding author

Page 2: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Index

•Proof-of-Stake

•PoS Philosophy

•Shorting Attack

•Conclusions

Page 3: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Key Questions:

1. What are assumptions of PoS?

2.Isn’t it profitable to be a dishonest player in PoS?

Page 4: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Proof-of-Stake (PoS)

Page 5: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Proof-of-Stake (PoS)

Proof-of-Stake (PoS) is getting a vote power from the behavior “staking” which makes some amount of coins bonded for a while.

Page 6: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Proof-of-Stake (PoS)

Proof-of-Work (PoW) mining of Bitcoin exceeded the electricity usage of Switzerland.On the other thand, staking spends little energy so eco-friendly and intuitive.

Fig. Electricity usage of Bitcoin mining

Page 7: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Proof-of-Stake (PoS)

For security, PoS has two main

penalties to attackers.

1.Depreciation

2.Slashing

We will discuss again later.

Page 8: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Proof-of-Stake Security Issues

•Nothing-at-Stake

•Long Range Attack

•Grinding Attack

•(Shorting Attack) ← today’s topic

Page 9: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Diversity of PoS

Nguyen et al., "Proof-of-Stake Consensus Mechanisms for Future Blockchain Networks: Fundamentals, Applications and opportunities"

Page 10: Proof-of-Stake at Stake: Predatory, Destructive Attack on

PoS Philosophy

Page 11: Proof-of-Stake at Stake: Predatory, Destructive Attack on

PoS Philosophy

•Peercoin is the pioneer of proof of stake

[Advantage of staking]

“A minter’s chances of being selected as the next block producer rely specifically on the number of coins held and time in the form of coin age and some amount of luck.”

peercoin.net

Page 12: Proof-of-Stake at Stake: Predatory, Destructive Attack on

PoS Philosophy

•Peercoin is the pioneer of proof of stake

[Condition of staking]

“Minters are first required to hold coins in their wallet for a total of 30 days before they can become eligible to compete in the process of minting new blocks.”

peercoin.net

Page 13: Proof-of-Stake at Stake: Predatory, Destructive Attack on

PoS Philosophy

•Peercoin is the pioneer of proof of stake

[majority attack]

“A malicious actor would need to purchase enough coins ... the price per peercoin to skyrocket. .. to perform a successful attack

would likely bankrupt the attacker in the process.”peercoin.net

Page 14: Proof-of-Stake at Stake: Predatory, Destructive Attack on

PoS Philosophy

•Ethereum suggested Casper and Slashing

[value-at-loss]

“The one-sentence philosophy of proof of stake is thus not security comes from burning energy, but rather security comes from putting up economic value-at-loss”

Vitalik Buterin. 2016. A Proof of Stake Design Philosophy. https://medium.com/@VitalikButerin/a-proof-of-stake-design-philosophy-506585978d51.

Page 15: Proof-of-Stake at Stake: Predatory, Destructive Attack on

PoS Philosophy

•Ethereum suggested Casper and Slashing

[slashing]

“the evidence of the violation can be included into the blockchain as a transaction, at which point the validator’s entire deposit is taken away with a small “finder’s fee” given to the submitter of the evidence transaction.”

Vitalik Buterin and Virgil Griffith. 2019. Casper the Friendly Finally Gadget

Page 16: Proof-of-Stake at Stake: Predatory, Destructive Attack on

PoS Philosophy

•Ethereum suggested Casper and Slashing

Vitalik Buterin and Virgil Griffith. 2019. Casper the Friendly Finally Gadget

Page 17: Proof-of-Stake at Stake: Predatory, Destructive Attack on

PoS Philosophy

Value-at-loss

Page 18: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Assumptions in PoS Mechanisms

As long as a majority of CPU power is controlled

by nodes that are not cooperating to attack the network,

they’ll generate the longest chain and outpace

attackers.

Bitcoin Whitepaper

Page 19: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Assumptions in PoS Mechanisms

when we say “2/3 of validators”, we are referring to the deposit-weighted fraction; that is, a set of validators whose sum deposit size equals to

2/3 of the total deposit size of the entire set

of validators.

Casper the Friendly Finally Gadget

Page 20: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Assumptions in PoS Mechanisms

… to the permissionless setting as in the original Algorand protocol, where the Adversary can corrupt users adaptively and instantaneously,

but cannot control more than 1/3 of the total stake in the system.

ALGORAND AGREEMENT

Page 21: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Assumptions in PoS Mechanisms

In order for more than 1/3 of dishonest participants not to exist, there must be no economic incentive to be more than one-third dishonest participants.

But can we be sure?

Page 22: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Ethereum PoS FAQ

The figure shows the staking limitation from liquidity.

Page 23: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Real World Stake

• Cosmos Atom (https://www.mintscan.io/validators) – 70%

• Cardano (https://adapools.org/) – 40.9%

Liquid Supply: 31.5BMax Supply: 45B

Page 24: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Real World Stake

• Algorand (https://www.stakingrewards.com/earn/algorand/metrics) – 21%

• EOS (https://eosflare.io/ - 56.48%)

Page 25: Proof-of-Stake at Stake: Predatory, Destructive Attack on

PoS Philosophy

•Wait…. Value-at-Loss ?

Somehow, Benefit > Loss

Attacker

“I think I can hedge the risk”

Page 26: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Shorting Attack

Page 27: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Short Selling

Page 28: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Short Selling

Cryptocurrency exchanges provide short selling and financial derivatives including margin trading to bet investors (or speculators) money.

Page 29: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Shorting Attack in Economics

We independently studied shorting attack in PoScryptocurrencies.

On the other hand, there are researches of shorting attack to financial institutes

Page 30: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Shorting Attack in Economics

The stock price is not everything but partially shows the value of companies.

Thus, aggressive shorting can make financial institutes looked like they do not have enough money to continue their business.

Fig. Interaction between Speculators and Creditors

Page 31: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Assumption in Shorting Attack

No more than 33% stake

No more than 51% resource

We take a different assumption. We takes a majority possession limitation rule, not no more 1/3 of staking.

Page 32: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Assumption in Shorting Attack

Definition 1 (β-depreciation)

In a PoS cryptocurrency, when a player violates a rule, the market

value of the cryptocurrency by β % depreciated.

Definition 2 (γ-slashing)

In a PoS cryptocurrency, when a player violates a rule, γ% of his stake

is slashed.

Page 33: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Shorting Attack: Victim PoS Model

Page 34: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Shorting Attack: Procedure

Page 35: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Shorting Attack: Numerical Analysis

Assuming β-depreciation, and γ-slashing.The cryptocurrency’s total supply → 1The average staking ratio → sAttacker’s amount of short selling →NAmount that the attacker needs to invest → at least s/3The attacker’s seed money →N + s/3

After sabotage,The value of the attacker’s staking → (1- β)(1- γ)s/3The result of the attacker’s short selling → (1+ β)xN

Then the least seed money to reach the break-even point for the shorting attack is s/3(2+(1+ β)γ/β).

Page 36: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Shorting Attack: Numerical Analysis

Slashing limits shorting attack strongly. But if the attacker can ruin the value of a PoS cryptocurrency, it will make a big profit to the attacker.

Page 37: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Conclusions

Page 38: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Conclusions:

1. It can be profitable to be a dishonest player in PoS

2. PoS designers should consider markets as well as functions in PoS cryptocurrency systems

3. Proper incentives in PoS should be studied to discourage dishonest players

Page 39: Proof-of-Stake at Stake: Predatory, Destructive Attack on

Thank youKeep Safe :)

Suhyeon LeePh.D student in Korea University

[email protected]