Public Blockchains Proof-of-Work Consortium & Private - - PowerPoint PPT Presentation

public blockchains proof of work
SMART_READER_LITE
LIVE PREVIEW

Public Blockchains Proof-of-Work Consortium & Private - - PowerPoint PPT Presentation

1200 700 The Attack of the Clones against Proof-of-Authority Parinya Ekparinya Vincent Gramoli Guillaume Jourjon Ekparinya et al, "The Attack of the Clones against PoA" Page 1 Public Blockchains Proof-of-Work Consortium &


slide-1
SLIDE 1

Ekparinya et al, "The Attack of the Clones against PoA" Page 1

The Attack of the Clones against Proof-of-Authority

Parinya Ekparinya Vincent Gramoli Guillaume Jourjon

1200 × 700

slide-2
SLIDE 2

Ekparinya et al, "The Attack of the Clones against PoA" Page 2

Public Blockchains Proof-of-Work Consortium & Private Blockchains

slide-3
SLIDE 3

Ekparinya et al, "The Attack of the Clones against PoA" Page 3

Public Blockchains Proof-of-Work Consortium & Private Blockchains Proof-of-Authority

slide-4
SLIDE 4

Ekparinya et al, "The Attack of the Clones against PoA" Page 4

slide-5
SLIDE 5

Ekparinya et al, "The Attack of the Clones against PoA" Page 5

slide-6
SLIDE 6

Ekparinya et al, "The Attack of the Clones against PoA" Page 6

Why Proof-of-Authority (PoA)?

slide-7
SLIDE 7

Ekparinya et al, "The Attack of the Clones against PoA" Page 7

Why Proof-of-Authority (PoA)?

slide-8
SLIDE 8

Ekparinya et al, "The Attack of the Clones against PoA" Page 8

Why Proof-of-Authority (PoA)?

slide-9
SLIDE 9

Ekparinya et al, "The Attack of the Clones against PoA" Page 9

Why Proof-of-Authority (PoA)? BFT

slide-10
SLIDE 10

Ekparinya et al, "The Attack of the Clones against PoA" Page 10

Why Proof-of-Authority (PoA)? BFT

slide-11
SLIDE 11

Ekparinya et al, "The Attack of the Clones against PoA" Page 11

The Cloning Attack => Double-spending

$ 10 $ 10

slide-12
SLIDE 12

Ekparinya et al, "The Attack of the Clones against PoA" Page 12

The Cloning Attack => Double-spending

$ 10 $ 10

SAME TOKENS!!

slide-13
SLIDE 13

Ekparinya et al, "The Attack of the Clones against PoA" Page 13

Q: How is it possible to double spend on PoA/Ethereum?

slide-14
SLIDE 14

Ekparinya et al, "The Attack of the Clones against PoA" Page 14

N1 N2 N3 N4 N5 Sealers

The Modus Operandi of AuRa

slide-15
SLIDE 15

Ekparinya et al, "The Attack of the Clones against PoA" Page 15

N1 N2 N3 N4 N5 Sealers

The Modus Operandi of AuRa

slide-16
SLIDE 16

Ekparinya et al, "The Attack of the Clones against PoA" Page 16

1

N1 N2 N3 N4 N5 Sealers Blocks

The Modus Operandi of AuRa

slide-17
SLIDE 17

Ekparinya et al, "The Attack of the Clones against PoA" Page 17

1 2

N1 N2 N3 N4 N5 Sealers Blocks

The Modus Operandi of AuRa

slide-18
SLIDE 18

Ekparinya et al, "The Attack of the Clones against PoA" Page 18

1 2

N1 N2 N3 N4 N5 Sealers Blocks Time (s) 5 10 15 20 25 30 35 40

The Modus Operandi of AuRa

slide-19
SLIDE 19

Ekparinya et al, "The Attack of the Clones against PoA" Page 19

1 2 3

N1 N2 N3 N4 N5 Sealers Blocks Time (s) 5 10 15 20 25 30 35 40

The Modus Operandi of AuRa

slide-20
SLIDE 20

Ekparinya et al, "The Attack of the Clones against PoA" Page 20

1 2 3

N1 N2 N3 N4 N5 Sealers Blocks Time (s) 5 10 15 20 25 30 35 40 Decided

The Modus Operandi of AuRa

slide-21
SLIDE 21

Ekparinya et al, "The Attack of the Clones against PoA" Page 21

1 2 3 4

N1 N2 N3 N4 N5 Sealers Blocks Time (s) 5 10 15 20 25 30 35 40

The Modus Operandi of AuRa

slide-22
SLIDE 22

Ekparinya et al, "The Attack of the Clones against PoA" Page 22

1 2 3 4 5

N1 N2 N3 N4 N5 Sealers Blocks Time (s) 5 10 15 20 25 30 35 40

The Modus Operandi of AuRa

slide-23
SLIDE 23

Ekparinya et al, "The Attack of the Clones against PoA" Page 23

1 2 3 4 5 6

N2 N3 N4 N5 N1 Sealers Blocks Time (s) 5 10 15 20 25 30 35 40

The Modus Operandi of AuRa

slide-24
SLIDE 24

Ekparinya et al, "The Attack of the Clones against PoA" Page 24

1 2 3 4 5 6

N3 N4 N5 N1 N2 Sealers Blocks Time (s) 5 10 15 20 25 30 35 40

ZZz

The Modus Operandi of AuRa

slide-25
SLIDE 25

Ekparinya et al, "The Attack of the Clones against PoA" Page 25

1 2 3 4 5 6 7

N4 N5 N1

N2 N3 Sealers Blocks Time (s) 5 10 15 20 25 30 35 40

ZZz

Decided

The Modus Operandi of AuRa

slide-26
SLIDE 26

Ekparinya et al, "The Attack of the Clones against PoA" Page 26

7

N3

Time (s) 40 45 50 55 60 65 70 75

slide-27
SLIDE 27

Ekparinya et al, "The Attack of the Clones against PoA" Page 27

N5 N2 Group B Sealers Group B Blocks

7

N4 N1

N3 Group A Sealers Group A Blocks Time (s) 40 45 50 55 60 65 70 75

slide-28
SLIDE 28

Ekparinya et al, "The Attack of the Clones against PoA" Page 28

N5 N2 Group B Sealers Group B Blocks

7 8

N4 N1

N3 Group A Sealers Group A Blocks Time (s) 40 45 50 55 60 65 70 75

slide-29
SLIDE 29

Ekparinya et al, "The Attack of the Clones against PoA" Page 29

8

N5 N2 Group B Sealers Group B Blocks

7 8

N4 N1

N3 Group A Sealers Group A Blocks Time (s) 40 45 50 55 60 65 70 75

slide-30
SLIDE 30

Ekparinya et al, "The Attack of the Clones against PoA" Page 30

8

N5 N2 Group B Sealers Group B Blocks

7 8 9

N4 N1

N3 Group A Sealers Group A Blocks Time (s) 40 45 50 55 60 65 70 75

slide-31
SLIDE 31

Ekparinya et al, "The Attack of the Clones against PoA" Page 31

8 9

N5 N2 Group B Sealers Group B Blocks

7 8 9

N4 N1

N3 Group A Sealers Group A Blocks Time (s) 40 45 50 55 60 65 70 75

slide-32
SLIDE 32

Ekparinya et al, "The Attack of the Clones against PoA" Page 32

8 9

N5 N2 Group B Sealers Group B Blocks

7 8 9 10

N4 N1

N3 Group A Sealers Group A Blocks Time (s) 40 45 50 55 60 65 70 75

slide-33
SLIDE 33

Ekparinya et al, "The Attack of the Clones against PoA" Page 33

8 9

N5 N2 Group B Sealers Group B Blocks

7 8 9 10 11

N1

N3 Group A Sealers Group A Blocks Time (s) 40 45 50 55 60 65 70 75 N4

slide-34
SLIDE 34

Ekparinya et al, "The Attack of the Clones against PoA" Page 34

8 9 10

N2 Group B Sealers Group B Blocks

7 8 9 10 11

N1

N3 Group A Sealers Group A Blocks Time (s) 40 45 50 55 60 65 70 75 N4 N5

slide-35
SLIDE 35

Ekparinya et al, "The Attack of the Clones against PoA" Page 35

8 9 10

N2 Group B Sealers Group B Blocks

7 8 9 10 11

N1

N3 Group A Sealers Group A Blocks Time (s) 40 45 50 55 60 65 70 75 N4 N5

slide-36
SLIDE 36

Ekparinya et al, "The Attack of the Clones against PoA" Page 36

N2 Group B Sealers Group B Blocks

7 8 9 10 11

N3 Group A Sealers Group A Blocks Time (s) 40 45 50 55 60 65 70 75 N4 N5

12

N1

slide-37
SLIDE 37

Ekparinya et al, "The Attack of the Clones against PoA" Page 37

Block decision duration network partition

– Since decision requires strictly more than half, only one partition may decide blocks Can decide a block

slide-38
SLIDE 38

Ekparinya et al, "The Attack of the Clones against PoA" Page 38

Block decision duration network partition

– Since decision requires strictly more than half, only one partition may decide blocks Can decide a block

slide-39
SLIDE 39

Ekparinya et al, "The Attack of the Clones against PoA" Page 39

slide-40
SLIDE 40

Ekparinya et al, "The Attack of the Clones against PoA" Page 40

If one sealer become malicious

– A malicious sealer creates a clone to participate in both partitions!! – If n = 9, both partitions contain 5 sealers, therefore both may decide a block!! Can decide a block Can decide a block Malicious sealer Clone sealer

slide-41
SLIDE 41

Ekparinya et al, "The Attack of the Clones against PoA" Page 41

The Cloning Attack

slide-42
SLIDE 42

Ekparinya et al, "The Attack of the Clones against PoA" Page 42

The Cloning Attack

slide-43
SLIDE 43

Ekparinya et al, "The Attack of the Clones against PoA" Page 43

The Cloning Attack

slide-44
SLIDE 44

Ekparinya et al, "The Attack of the Clones against PoA" Page 44

The Cloning Attack

slide-45
SLIDE 45

Ekparinya et al, "The Attack of the Clones against PoA" Page 45

The Cloning Attack

slide-46
SLIDE 46

Ekparinya et al, "The Attack of the Clones against PoA" Page 46

slide-47
SLIDE 47

Ekparinya et al, "The Attack of the Clones against PoA" Page 47

slide-48
SLIDE 48

Ekparinya et al, "The Attack of the Clones against PoA" Page 48

slide-49
SLIDE 49

Ekparinya et al, "The Attack of the Clones against PoA" Page 49

slide-50
SLIDE 50

Ekparinya et al, "The Attack of the Clones against PoA" Page 50

slide-51
SLIDE 51

Ekparinya et al, "The Attack of the Clones against PoA" Page 51

slide-52
SLIDE 52

Ekparinya et al, "The Attack of the Clones against PoA" Page 52

Countermeasure

– The algorithm will be more resistant to the attack if it requires strictly more than two- thirds to decide a block as shown in the illustration below with n = 9 sealers. Cannot decide a block Cannot decide a block

slide-53
SLIDE 53

Ekparinya et al, "The Attack of the Clones against PoA" Page 53

Key takeaways

– With the attack of the Clones, it is possible to double spend in PoA/Ethereum. – Provided sufficient network partition duration, the attacker can double spend with 100% success rate. – To promote safety property in PoA/Ethereum: the higher number of required sealers, the higher resistance against the attack. – The attack applies as well to Clique. The details can be found in paper. – We exchanged with the security experts of geth and parity. The developers of xDai have already took this attack into account in their POSDAO consensus algorithm.