Previous attack: routing manipulation to partition Bitcoin's peer-to-peer network
5
Erebus attack: A stealthier partitioning attack against Bitcoin network
6
Challenge 1: How many shadow IPs are available?
7
Challenge 2: How does Erebus attacker influence Bitcoin node's peer selection?
8
How to influence the victim to connect to shadow IPs?
9
Attack strategy: send low-rate traffic and patiently wait
10
Adversary can occupy all connections with shadow IPs in 5 - 6 weeks
11
Why is the Erebus attack stealthy?
12
Who can launch the Erebus attack?
13
What about other cryptocurrencies?
14
Countermeasures against the Erebus attack
Description:
Explore a stealthier partitioning attack against the Bitcoin peer-to-peer network in this 16-minute IEEE conference talk. Delve into the EREBUS attack, which allows network adversaries to partition the Bitcoin network without routing manipulations, making it undetectable to control-plane and data-plane detectors. Learn how the attack exploits the topological advantage of being a network adversary, influencing targeted nodes' peering decisions over time. Understand the attack's feasibility for large autonomous systems (ASes) against public Bitcoin nodes, its potential impact on cryptocurrencies, and the challenges in developing effective countermeasures. Examine proposed modifications to the Bitcoin core and their potential implications for the network's operation. Gain insights into the vulnerabilities of cryptocurrency networks and the sophisticated strategies that nation-state adversaries might employ to compromise them.
A Stealthier Partitioning Attack Against Bitcoin Peer-to-Peer Network