Proof-of-Stake at Stake: Predatory, Destructive Attack on PoS - - PowerPoint PPT Presentation

proof of stake at stake
SMART_READER_LITE
LIVE PREVIEW

Proof-of-Stake at Stake: Predatory, Destructive Attack on PoS - - PowerPoint PPT Presentation

Proof-of-Stake at Stake: Predatory, Destructive Attack on PoS Cryptocurrencies 3rd CryBlock @ MobiCom 2020 25th September 2020, Virtual Suhyeon Lee (Speaker) and Seungjoo Kim* School of Cybersecurity, Korea University {orion-alpha,


slide-1
SLIDE 1

Proof-of-Stake at Stake: Predatory, Destructive Attack

  • n PoS Cryptocurrencies

Suhyeon Lee (Speaker) and Seungjoo Kim*

3rd CryBlock @ MobiCom 2020 25th September 2020, Virtual

School of Cybersecurity, Korea University {orion-alpha, skim71}@korea.ac.kr

* Corresponding author

slide-2
SLIDE 2

Index

  • Proof-of-Stake
  • PoS Philosophy
  • Shorting Attack
  • Conclusions
slide-3
SLIDE 3

Key Questions:

  • 1. What are assumptions of PoS?

2.Isn’t it profitable to be a dishonest player in PoS?

slide-4
SLIDE 4

Proof-of-Stake (PoS)

slide-5
SLIDE 5

Proof-of-Stake (PoS)

Proof-of-Stake (PoS) is getting a vote power from the behavior “staking” which makes some amount of coins bonded for a while.

slide-6
SLIDE 6

Proof-of-Stake (PoS)

Proof-of-Work (PoW) mining of Bitcoin exceeded the electricity usage of Switzerland. On the other thand, staking spends little energy so eco-friendly and intuitive.

  • Fig. Electricity usage of Bitcoin mining
slide-7
SLIDE 7

Proof-of-Stake (PoS)

For security, PoS has two main penalties to attackers.

1.Depreciation 2.Slashing

We will discuss again later.

slide-8
SLIDE 8

Proof-of-Stake Security Issues

  • Nothing-at-Stake
  • Long Range Attack
  • Grinding Attack
  • (Shorting Attack) ← today’s topic
slide-9
SLIDE 9

Diversity of PoS

Nguyen et al., "Proof-of-Stake Consensus Mechanisms for Future Blockchain Networks: Fundamentals, Applications and

  • pportunities"
slide-10
SLIDE 10

PoS Philosophy

slide-11
SLIDE 11

PoS Philosophy

  • Peercoin is the pioneer of proof of stake

[Advantage of staking] “A minter’s chances of being selected as the next block producer rely specifically on the number of coins held and time in the form of coin age and some amount of luck.”

peercoin.net

slide-12
SLIDE 12

PoS Philosophy

  • Peercoin is the pioneer of proof of stake

[Condition of staking] “Minters are first required to hold coins in their wallet for a total of 30 days before they can become eligible to compete in the process of minting new blocks.”

peercoin.net

slide-13
SLIDE 13

PoS Philosophy

  • Peercoin is the pioneer of proof of stake

[majority attack] “A malicious actor would need to purchase enough coins ... the price per peercoin to

  • skyrocket. .. to perform a successful attack

would likely bankrupt the attacker in the process.”

peercoin.net

slide-14
SLIDE 14

PoS Philosophy

  • Ethereum suggested Casper and Slashing

[value-at-loss] “The one-sentence philosophy of proof of stake is thus not security comes from burning energy, but rather security comes from putting up economic value-at-loss”

Vitalik Buterin. 2016. A Proof of Stake Design Philosophy. https://medium.com/@VitalikButerin/a-proof-of-stake-design-philosophy-506585978d51.

slide-15
SLIDE 15

PoS Philosophy

  • Ethereum suggested Casper and Slashing

[slashing] “the evidence of the violation can be included into the blockchain as a transaction, at which point the validator’s entire deposit is taken away with a small “finder’s fee” given to the submitter of the evidence transaction.”

Vitalik Buterinand Virgil Griffith. 2019. Casper the Friendly Finally Gadget

slide-16
SLIDE 16

PoS Philosophy

  • Ethereum suggested Casper and Slashing

Vitalik Buterinand Virgil Griffith. 2019. Casper the Friendly Finally Gadget

slide-17
SLIDE 17

PoS Philosophy

Value-at-loss

slide-18
SLIDE 18

Assumptions in PoS Mechanisms

As long asa majority of CPU power is controlled by nodes that are not cooperating to attack the network, they’ll generate the longest chain and outpace attackers. Bitcoin Whitepaper

slide-19
SLIDE 19

Assumptions in PoS Mechanisms

when we say “2/3 of validators”, we are referring to the deposit-weighted fraction; that is, a set of validators whose sum deposit size equals to

2/3 of the total deposit size of the entire set

  • f validators.

Casper the Friendly Finally Gadget

slide-20
SLIDE 20

Assumptions in PoS Mechanisms

… to the permissionless setting as in the original Algorand protocol, where the Adversary can corrupt users adaptively and instantaneously, but cannot control more than 1/3 of the

total stake in the system.

ALGORAND AGREEMENT

slide-21
SLIDE 21

Assumptions in PoS Mechanisms

In order for more than 1/3 of dishonest

participants not to exist, there must be no

economic incentive to be more than one- third dishonest participants. But can we be sure?

slide-22
SLIDE 22

Ethereum PoS FAQ

The figure shows the staking limitation from liquidity.

slide-23
SLIDE 23

Real World Stake

  • Cosmos Atom (https://www.mintscan.io/validators) – 70%
  • Cardano (https://adapools.org/) – 40.9%

Liquid Supply: 31.5B Max Supply: 45B

slide-24
SLIDE 24

Real World Stake

  • Algorand (https://www.stakingrewards.com/earn/algorand/metrics) – 21%
  • EOS (https://eosflare.io/ - 56.48%)
slide-25
SLIDE 25

PoS Philosophy

  • Wait…. Value-at-Loss ?

Somehow, Benefit > Loss

Attacker

“I think I can hedge the risk”

slide-26
SLIDE 26

Shorting Attack

slide-27
SLIDE 27

Short Selling

slide-28
SLIDE 28

Short Selling

Cryptocurrency exchanges provide short selling and financial derivatives including margin trading to bet investors (or speculators) money.

slide-29
SLIDE 29

Shorting Attack in Economics

We independently studied shorting attack in PoS cryptocurrencies. On the other hand, there are researches of shorting attack to financial institutes

slide-30
SLIDE 30

Shorting Attack in Economics

The stock price is not everything but partially shows the value of companies. Thus, aggressive shorting can make financial institutes looked like they do not have enough money to continue their business.

  • Fig. Interaction between Speculators and

Creditors

slide-31
SLIDE 31

Assumption in Shorting Attack

No more than 33% stake No more than 51% resource We take a different assumption. We takes a majority possession limitation rule, not no more 1/3 of staking.

slide-32
SLIDE 32

Assumption in Shorting Attack

Definition 1 (β-depreciation) In a PoS cryptocurrency, when a player violates a rule, the market value of the cryptocurrency by β % depreciated. Definition 2 (γ-slashing) In a PoS cryptocurrency, when a player violates a rule, γ% of his stake is slashed.

slide-33
SLIDE 33

Shorting Attack: Victim PoS Model

slide-34
SLIDE 34

Shorting Attack: Procedure

slide-35
SLIDE 35

Shorting Attack: Numerical Analysis

Assuming β-depreciation, and γ-slashing. The cryptocurrency’s total supply → 1 The average staking ratio → s Attacker’s amount of short selling → N Amount that the attacker needs to invest → at least s/3 The attacker’s seed money → N + s/3 After sabotage, The value of the attacker’s staking → (1- β)(1- γ)s/3 The result of the attacker’s short selling → (1+ β)xN Then the least seed money to reach the break-even point for the shorting attack is s/3(2+(1+ β)γ/β).

slide-36
SLIDE 36

Shorting Attack: Numerical Analysis

Slashing limits shorting attack strongly. But if the attacker can ruin the value of a PoS cryptocurrency, it will make a big profit to the attacker.

slide-37
SLIDE 37

Conclusions

slide-38
SLIDE 38

Conclusions:

  • 1. It can be profitable to be a dishonest player in PoS
  • 2. PoS designers should consider markets as well

as functions in PoS cryptocurrency systems

  • 3. Proper incentives in PoS should be studied to

discourage dishonest players

slide-39
SLIDE 39

Thank you Keep Safe :)

Suhyeon Lee

Ph.D student in Korea University

  • rion-alpha@korea.ac.kr