ABSTRACT
We present a novel way for cryptocurrency miners to manipulate the effective interest-rate on loans or deposits they make on decentralized finance (DeFi) platforms by manipulating difficulty-adjustment algorithms (DAAs) and changing the block-rate. This presents a new class of strategic manipulations available to miners.
These manipulations allow miners to stretch and squeeze the time between consecutive blocks. We analyze these manipulations both analytically and empirically, and show that a 25% miner can stretch the time between consecutive blocks by up to 54% in Ethereum and 33% in Bitcoin, and squeeze it by up to 9% in Ethereum. Ethereum is particularly vulnerable, and even relatively small miners can seriously affect the block-rate.
An interesting application of these manipulations is to create an artificial interest-rate gap between loans taken from one DeFi platform which accrues interest according to block height (such as Compound [66]) and deposited in some other platform that does so according to elapsed time (like a bank, or other DeFi platforms such as Aave [99]). Hence, stretching and squeezing the block-rate can decrease the interest paid on DeFi loans relative to external financial platforms.
The profit made from this interest-rate gap provides a large incentive for miners to deviate. For example, a 25% Ethereum miner using our manipulations can increase mining profits by up to 35%, even after taking potential losses into consideration, such as less block-rewards.
Our analysis of these manipulations and their mitigations has broad implications with regards to commonly-used cryptocurrency mechanisms and paradigms, such as Ethereum's difficulty-adjustment algorithm and reward schemes, with Ethereum's handling of uncle blocks being particularly manipulable. Interestingly, Bitcoin's mechanism is more resistant Ethereum's, owing to its larger incentives and a more resilient DAA.
- Aave. 2020. Interest model. https://git.io/JLQVxGoogle Scholar
- Aave. 2022. Historical SUSD rates. https://app-v1.aave.com/reserve-overview/SUSD?pool=AaveGoogle Scholar
- AaveWatch. 2022. Historical SUSD rates. https://v2.aavewatch.com/market/aave/susdGoogle Scholar
- AaveWatch. 2022. Historical USDT rates. https://v2.aavewatch.com/market/aave/usdtGoogle Scholar
- Aydin Abadi, Michele Ciampi, Aggelos Kiayias, and Vassilis Zikas. 2020. Timed Signatures and Zero-Knowledge Proofs-Timestamping in the Blockchain Era-. In International Conference on Applied Cryptography and Network Security (2020). Springer, Springer International Publishing, 335--354. https://doi.org/10.1007/978--3-030--57808--4_17Google Scholar
- Sarah Azouvi and Alexander Hicks. 2020. SoK: Tools for Game Theoretic Models of Security for Cryptocurrencies. https://doi.org/10.21428/58320208.8e7f4fab arXiv:cs.CR/1905.08595Google Scholar
- Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, and Vassilis Zikas. 2019. Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake. IACR Cryptol. ePrint Arch. 2019 (2019), 838. https://eprint.iacr.org/2019/838Google Scholar
- Matthew Bernhard, Andrea Bracciali, Lewis Gudgeon, Thomas Haines, Ariah Klages-Mundt, Shiníchiro Matsuo, Daniel Perez, Massimiliano Sala, and Sam Werner. 2021. SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies. In Financial Cryptography and Data Security. FC 2021 International Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers (Lecture Notes in Computer Science), Vol. 12676. Springer, 507--532. https://doi.org/10.1007/978--3--662--63958-0Google ScholarCross Ref
- George Bissias and Brian N Levine. 2020. Bobtail: Improved Blockchain Security with Low-Variance Mining. In ISOC Network and Distributed System Security Symposium (2020). Internet Society. https://doi.org/10.14722/ndss.2020.23095Google Scholar
- George Bissias, David Thibodeau, and Brian N Levine. 2019. Bonded mining: Difficulty adjustment by miner commitment. In Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer, 372--390. https://doi.org/10.1007/978--3-030--31500--9_24 arXiv:cs.CR/1907.00302Google Scholar
- BitInfoCharts. 2022. Bitcoin, Ethereum, Dogecoin, XRP, Ethereum Classic, Litecoin, Monero, Bitcoin Cash, Zcash, Bitcoin Gold Hashrate historical chart. https://web.archive.org/web/20220522122528/https://bitinfocharts.com/comparison/hashrate-btc-eth-doge-xrp-etc-ltc-xmr-bch-zec-btg.html#3yGoogle Scholar
- Olivier Boireau. 2018. Securing the blockchain against hackers. Network Security 2018, 1 (2018), 8--11. https://doi.org/10.1016/S1353--4858(18)30006-0 arXiv:https://doi.org/10.1016/S1353--4858(18)30006-0Google ScholarCross Ref
- Joseph Bonneau. 2016. Why buy when you can rent?. In International Conference on Financial Cryptography and Data Security. Springer, Springer Berlin Heidelberg, 19--26. https://doi.org/10.1007/978--3--662--53357--4_2Google ScholarCross Ref
- Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A Kroll, and Edward W Felten. 2015. Sok: Research perspectives and challenges for bitcoin and cryptocurrencies. In 2015 IEEE symposium on security and privacy. IEEE, IEEE, 104--121. https://doi.org/10.1109/SP.2015.14Google ScholarDigital Library
- R. Bowden, H. P. Keeler, A. E. Krzesinski, and P. G. Taylor. 2018. Block arrivals in the Bitcoin blockchain. ArXiv e-prints (Jan. 2018). arXiv:cs.CR/1801.07447Google Scholar
- Eric Budish. 2018. The Economic Limits of Bitcoin and the Blockchain. Working Paper 24717. National Bureau of Economic Research. https://doi.org/10.3386/w24717Google Scholar
- Huashan Chen, Marcus Pendleton, Laurent Njilla, and Shouhuai Xu. 2019. A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and Defenses. https://doi.org/10.1145/3391195 arXiv:cs.CR/1908.04507Google ScholarDigital Library
- Tarun Chitra. 2021. Competitive Equilibria Between Staking and On-chain Lending. Cryptoeconomic Systems 0, 1 (5 4 2021). https://doi.org/10.21428/58320208.9ce1cd26 https://cryptoeconomicsystems.pubpub.org/pub/chitra-staking-lending-equilibria.Google Scholar
- Tarun Chitra and Alex Evans. 2020. Why Stake When You Can Borrow? https://doi.org/10.2139/ssrn.3629988 arXiv:q-fin.GN/2006.11156Google Scholar
- John H Cochrane. 2009. Asset pricing: Revised edition. Princeton university press.Google Scholar
- Compound. 2020. Interface of interest model. https://git.io/JLQVFGoogle Scholar
- Compound. 2021. Interest accrual function. https://git.io/JP5AoGoogle Scholar
- Lin William Cong, Zhiguo He, and Jiasun Li. 2021. Decentralized mining in centralized pools. The Review of Financial Studies 34, 3 (2021), 1191--1235.Google ScholarCross Ref
- Simon Cousaert, Jiahua Xu, and Toshiko Matsui. 2021. SoK: Yield Aggregators in DeFi. arXiv:q-fin.PM/2105.13891Google Scholar
- Philip Daian, Steven Goldfeder, Tyler Kell, Yunqi Li, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, and Ari Juels. 2020. Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability. In 2020 IEEE Symposium on Security and Privacy, SP 2020, San Francisco, CA, USA, May 18--21, 2020. IEEE, 910--927. https://doi.org/10.1109/SP40000.2020.00040Google ScholarCross Ref
- Michael Davidson, Tyler Diamond, et al. 2020. On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms. IACR Cryptol. ePrint Arch. 2020 (2020), 94.Google Scholar
- Evangelos Deirmentzoglou, Georgios Papakyriakopoulos, and Constantinos Patsakis. 2019. A survey on long-range attacks for proof of stake protocols. IEEE Access 7 (2019), 28712--28725. https://doi.org/10.1109/access.2019.2901858Google ScholarCross Ref
- Freddy Delbaen and Walter Schachermayer. 1994. A General Version of the Fundamental Theorem of Asset Pricing (1994). Math. Ann. 300 (09 1994), 463--520. https://doi.org/10.1007/BF01450498Google ScholarCross Ref
- Avinash K. Dixit and Robert S. Pindyck. 1994. Investment under Uncertainty. Number 5474 in Economics Books. Princeton University Press. https://doi.org/10.2307/j.ctt7sncvGoogle Scholar
- dYdX. 2020. Interest model. https://git.io/JLQVAGoogle Scholar
- Shayan Eskandari, Seyedehmahsa Moosavi, and Jeremy Clark. 2019. SoK: Transparent Dishonesty: front-running attacks on Blockchain. https://doi.org/10.1007/978--3-030--43725--1_13 arXiv:cs.CR/1902.05164Google Scholar
- Shayan Eskandari, Mehdi Salehi, Wanyun Catherine Gu, and Jeremy Clark. 2021. SoK: Oracles from the Ground Truth to Market Manipulation. Association for Computing Machinery, New York, NY, USA, 127--141. https://doi.org/10.1145/3479722.3480994Google ScholarDigital Library
- Ethereum. 2020. Block timestamps. https://git.io/JLQVdGoogle Scholar
- Ethereum. 2020. Miners sleep when receiving blocks with future timestamps. https://git.io/JEbTUGoogle Scholar
- Ethereum. 2021. Geth's difficulty adjustment code. https://git.io/JXuhAGoogle Scholar
- Ethereum. 2021. Uncle timestamps are not verified. https://git.io/JEbUbGoogle Scholar
- Ethernodes. 2021. The popularity of Ethereum clients. ethernodes.org.Google Scholar
- Etherscan. 2021. A single entity borrowed 10 million USDC from Aave in trasnaction 0x66e803346833be1c4ebfe4546831815b542135d2ed2ebdff1cb099617ffc3025. https://etherscan.io/tx/0x66e803346833be1c4ebfe4546831815b542135d2ed2ebdff1cb099617ffc3025Google Scholar
- Etherscan. 2021. A single entity borrowed 10 million USDC from Aave in trasnaction 0xf2b492d3c0e867e20797bf324f8872a3ab859a78912526d043c68bc66a1df607. https://etherscan.io/tx/0xf2b492d3c0e867e20797bf324f8872a3ab859a78912526d043c68bc66a1df607Google Scholar
- Etherscan. 2021. A single entity borrowed 22 million USDC from Aave in trasnaction 0x6184d396660b62a55cf32c901a87ae9c3b35f4c7b06c7b1cb4dd91e124f5d1b9. https://etherscan.io/tx/0x6184d396660b62a55cf32c901a87ae9c3b35f4c7b06c7b1cb4dd91e124f5d1b9Google Scholar
- Etherscan. 2021. A single entity borrowed 30 million USDC from Aave in transaction 0xe49deb4938e6e05bd93f2e8a75f2377a7ea22d1fff00191e1f5cb61b853e418f. https://etherscan.io/tx/0xe49deb4938e6e05bd93f2e8a75f2377a7ea22d1fff00191e1f5cb61b853e418fGoogle Scholar
- Etherscan. 2021. A single entity borrowed 50 million USDC from Aave in trasnaction 0xd8c70b8e0af06a8f81af7c4c8178c61a0d04ba1efeb539fb528f069d0f814484. https://etherscan.io/tx/0xd8c70b8e0af06a8f81af7c4c8178c61a0d04ba1efeb539fb528f069d0f814484Google Scholar
- Etherscan. 2021. A single entity borrowed 50 million USDT from Aave in transaction 0x162eaf5159ef453699750bc1dedc3b2e2100237db40bfd836cd7274aef35dfde. https://etherscan.io/tx/0x162eaf5159ef453699750bc1dedc3b2e2100237db40bfd836cd7274aef35dfdeGoogle Scholar
- Ittay Eyal and Emin Gün Sirer. 2014. Majority is not enough: Bitcoin mining is vulnerable, In International conference on financial cryptography and data security. Commun. ACM 61, 7, 436--454. https://doi.org/10.1145/3212998Google ScholarDigital Library
- Ed Felten. 2020. Fighting censorship attacks on smart contracts. https://medium.com/offchainlabs/fighting-censorship-attacks-on-smart-contracts-c026a7c0ff02Google Scholar
- Amos Fiat, Anna Karlin, Elias Koutsoupias, and Christos Papadimitriou. 2019. Energy Equilibria in Proof-of-Work Mining. In Proceedings of the 2019 ACM Conference on Economics and Computation (EC '19). Association for Computing Machinery, New York, NY, USA, 489--502. https://doi.org/10.1145/3328526.3329630Google ScholarDigital Library
- C.R.E.A.M. Finance. 2020. Interest model. https://git.io/JRugVGoogle Scholar
- Yearn Finance. 2020. Adjusted APR Oracle bug. https://git.io/JM1BOGoogle Scholar
- Yearn Finance. 2020. APR Oracle bug. https://git.io/JM14QGoogle Scholar
- Yearn Finance. 2021. Yearn Finance. https://yearn.financeGoogle Scholar
- Ethereum Foundation. 2022. Blocks. https://github.com/ethereum/ethereum-org-website/blob/e98c23119c1514f46b2bcdcc8b2ea59154069bbd/src/content/developers/docs/blocks/index.md?plain=1#L57Google Scholar
- Emilio Frangella. 2020. Crypto Black Thursday: The Good, the Bad, and the Ugly. https://medium.com/aave/crypto-black-thursday-the-good-the-bad-and-the-ugly-7f2acebf2b83Google Scholar
- Juan Garay, Aggelos Kiayias, and Nikos Leonardos. 2015. The Bitcoin Backbone Protocol: Analysis and Applications. In Advances in Cryptology - EUROCRYPT 2015, Elisabeth Oswald and Marc Fischlin (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 281--310.Google ScholarCross Ref
- Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the Security and Performance of Proof of Work Blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16). Association for Computing Machinery, New York, NY, USA, 3--16. https://doi.org/10.1145/2976749.2978341Google ScholarDigital Library
- Guy Goren and Alexander Spiegelman. 2019. Mind the mining. In Proceedings of the 2019 ACM Conference on Economics and Computation. ACM, 475--487. https://doi.org/10.1145/3328526.3329566 arXiv:1902.03899Google ScholarDigital Library
- Lewis Gudgeon, Daniel Perez, Dominik Harz, Benjamin Livshits, and Arthur Gervais. 2020. The Decentralized Financial Crisis. In Crypto Valley Conference on Blockchain Technology, CVCBT 2020, Rotkreuz, Switzerland, June 11--12, 2020. IEEE, 1--15. https://doi.org/10.1109/CVCBT50464.2020.00005Google Scholar
- Lewis Gudgeon, Sam Werner, Daniel Perez, and William J. Knottenbelt. 2020. DeFi Protocols for Loanable Funds: Interest Rates, Liquidity and Market Efficiency. In AFT '20: 2nd ACM Conference on Advances in Financial Technologies, New York, NY, USA, October 21--23, 2020. ACM, 92--112. https://doi.org/10.1145/3419614.3423254Google ScholarDigital Library
- Samuel Haig. 2020. BTC hash rate slumps amid seasonal miner migration in China. https://cointelegraph.com/news/btc-hash-rate-slumps-amid-seasonal-miner-migration-in-chinaGoogle Scholar
- Jona Harris and Aviv Zohar. 2020. Flood & Loot: A Systemic Attack On The Lightning Network. In Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. ACM, 202--213. https://doi.org/10.1145/3419614.3423248 arXiv:cs.CR/2006.08513Google ScholarDigital Library
- Charlie Hou, Mingxun Zhou, Yan Ji, Phil Daian, Florian Tramer, Giulia Fanti, and Ari Juels. 2021. SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021, virtually, February 21--25, 2021. The Internet Society. https://doi.org/10.14722/ndss.2021.24188Google Scholar
- Gur Huberman, Jacob D Leshno, and Ciamac Moallemi. 2021. Monopoly without a Monopolist: An Economic Analysis of the Bitcoin Payment System. The Review of Economic Studies 88, 6 (03 2021), 3011--3040. https://doi.org/10.1093/restud/rdab014 arXiv:https://academic.oup.com/restud/article-pdf/88/6/3011/41901340/rdab014.pdfGoogle ScholarCross Ref
- Harold Jeffreys. 1998. The theory of probability. OUP Oxford.Google Scholar
- Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios G. Voyiatzis, and Edgar R. Weippl. 2017. Merged Mining: Curse or Cure?. In Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14--15, 2017, Proceedings (Lecture Notes in Computer Science), Joaquín García-Alfaro, Guillermo Navarro-Arribas, Hannes Hartenstein, and Jordi Herrera-Joancomartí (Eds.), Vol. 10436. Springer, 316--333. https://doi.org/10.1007/978--3--319--67816-0_18Google Scholar
- Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. 2017. Ouroboros: A provably secure proof-of-stake blockchain protocol. In Annual International Cryptology Conference. Springer, 357--388. https://doi.org/10.1007/978--3--319--63688--7_12Google ScholarCross Ref
- Esteban Landerreche, Marc Stevens, and Christian Schaffner. 2020. Non-interactive cryptographic timestamping based on verifiable delay functions. In International Conference on Financial Cryptography and Data Security. Springer, Springer International Publishing, 541--558. https://doi.org/10.1007/978--3-030--51280--4_29Google ScholarCross Ref
- Robert Leshner and Geoffrey Hayes. 2019. Compound: The money market protocol.Google Scholar
- Yoad Lewenberg, Yonatan Sompolinsky, and Aviv Zohar. 2015. Inclusive Block Chain Protocols. In Financial Cryptography and Data Security, Rainer Bohme and Tatsuaki Okamoto (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 528--547. https://doi.org/10.1007/978--3--662--47854--7_33 arXiv:https://doi.org/10.1007/978--3--662--47854--7_33Google Scholar
- Satterand Lynch and Cohen. 2022. US accuses couple of laundering $4.5 bln in bitcoin tied to 2016 hack. https://www.reuters.com/technology/us-arrests-couple-allegedly-laundering-45-bln-crypto-tied-bitfinex-hack-2022-02-08/Google Scholar
- Maker. 2020. Interest model. https://git.io/JLQVNGoogle Scholar
- Dmitry Meshkov, Alexander Chepurnoy, and Marc Jansen. 2017. Short paper: Revisiting difficulty control for blockchain systems. In Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer, 429--436. https://doi.org/10.1007/978--3--319--67816-0_25Google Scholar
- Du Mingxiao, Ma Xiaofeng, Zhang Zhe, Wang Xiangwei, and Chen Qijun. 2017. A review on consensus algorithm of blockchain. In 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, IEEE, 2567--2572. https://doi.org/10.1109/smc.2017.8123011Google ScholarDigital Library
- Miningpoolstats. 2022. Ethereum Mining Pools. https://miningpoolstats.stream/ethereumGoogle Scholar
- Ayelet Mizrahi and Aviv Zohar. 2021. Congestion Attacks in Payment Channel Networks. arXiv:cs.CR/2002.06564Google Scholar
- Amani Moin, Kevin Sekniqi, and Emin Gun Sirer. 2020. SoK: A classification framework for stablecoin designs. In International Conference on Financial Cryptography and Data Security. Springer, Springer International Publishing, 174--197. https://doi.org/10.1007/978--3-030--51280--4_11Google ScholarCross Ref
- Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system.Google Scholar
- Bloomberg News. 2021. Bitcoin 'Hash Crash' Rebound Points to Miners Plugging Back In. https://www.bloomberg.com/news/articles/2021-09-03/bitcoin-hash-crash-rebound-points-to-miners-plugging-back-inGoogle Scholar
- Julien Prat and Benjamin Walter. 2021. An Equilibrium Model of the Market for Bitcoin Mining. Journal of Political Economy 129, 8 (2021), 2415--2452. https://doi.org/10.1086/714445 arXiv:https://doi.org/10.1086/714445Google ScholarCross Ref
- DeFi Pulse. 2021. Historical Data. https://defipulse.com.Google Scholar
- Kaihua Qin, Liyi Zhou, Yaroslav Afonin, Ludovico Lazzaretti, and Arthur Gervais. 2021. CeFi vs. DeFi - Comparing Centralized to Decentralized Finance. CoRR abs/2106.08157 (2021). arXiv:2106.08157 https://arxiv.org/abs/2106.08157Google Scholar
- Kaihua Qin, Liyi Zhou, and Arthur Gervais. 2021. Quantifying Blockchain Extractable Value: How dark is the forest? arXiv:cs.CR/2101.05511Google Scholar
- Kaihua Qin, Liyi Zhou, Benjamin Livshits, and Arthur Gervais. 2020. Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit. https://doi.org/10.1007/978--3--662--64322--8_1 arXiv:cs.CR/2003.03810Google Scholar
- Michel Rauchs and Garrick Hileman. 2017. Global Cryptocurrency Benchmarking Study. Cambridge Centre for Alternative Finance, Cambridge Judge Business School, University of Cambridge. https://EconPapers.repec.org/RePEc:jbs:altfin:201704-gcbsGoogle Scholar
- Fabian Schär. 2021. Decentralized Finance: On Blockchain-and Smart Contract-based Financial Markets. Available at SSRN 3571335 103, 2 (April 2021), 153--174. https://doi.org/10.20955/r.103.153--74Google Scholar
- Linda Schilling and Harald Uhlig. 2019. Some simple bitcoin economics. Journal of Monetary Economics 106 (2019), 16--26. https://doi.org/10.1016/j.jmoneco.2019.07.002 SPECIAL CONFERENCE ISSUE: 'Money Creation and Currency Competition" October 19--20, 2018 Sponsored by the Study Center Gerzensee and Swiss National Bank.Google ScholarCross Ref
- Ning Shi. 2016. A new proof-of-work mechanism for bitcoin. Financial Innovation 2, 1 (2016), 31. https://doi.org/10.1186/s40854-016-0045--6Google ScholarCross Ref
- Paulo Silva, David Vavricka, João Barreto, and Miguel Matos. 2020. Impact of Geo-Distribution and Mining Pools on Blockchains: A Study of Ethereum. In 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). 245--252. https://doi.org/10.1109/DSN48063.2020.00041Google Scholar
- Michael Sockin and Wei Xiong. 2020. A Model of Cryptocurrencies. Working Paper 26816. https://doi.org/10.3386/w26816Google Scholar
- Yonatan Sompolinsky and Aviv Zohar. 2016. Bitcoin's Security Model Revisited. arXiv:cs.CR/1605.09193Google Scholar
- Sovryn. 2020. Interest model. https://git.io/JtUlTGoogle Scholar
- Douglas R Stinson. 2005. Cryptography: theory and practice. Chapman and Hall/CRC.Google Scholar
- Pawel Szalachowski. 2018. (Short Paper) Towards More Reliable Bitcoin Timestamps. In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). IEEE, IEEE, 101--104. https://doi.org/10.1109/cvcbt.2018.00018Google ScholarCross Ref
- Natkamon Tovanich, Nicolas Soulié, and Petra Isenberg. 2021. Visual Analytics of Bitcoin Mining Pool Evolution: On the Road Toward Stability?. In 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS). 1--5. https://doi.org/10.1109/NTMS49979.2021.9432675Google ScholarCross Ref
- Itay Tsabary and Ittay Eyal. 2018. The Gap Game. arXiv e-prints, Article arXiv:1805.05288 (May 2018), arXiv:1805.05288 pages. https://doi.org/10.1145/3211890.3211905 arXiv:cs.CR/1805.05288Google ScholarDigital Library
- Itay Tsabary, Alexander Spiegelman, and Ittay Eyal. 2021. Tuning PoW with Hybrid Expenditure. arXiv:cs.CR/1911.04124Google Scholar
- Hai Wang, Yong Wang, Zigang Cao, Zhen Li, and Gang Xiong. 2018. An Overview of Blockchain Security Analysis. In China Cyber Security Annual Conference. Springer, Springer Singapore, 55--72. https://doi.org/10.1007/978--981--13--6621--5_5Google Scholar
- Wenbo Wang, Dinh Thai Hoang, Peizhao Hu, Zehui Xiong, Dusit Niyato, Ping Wang, Yonggang Wen, and Dong In Kim. 2019. A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE 7 (2019), 22328--22370. https://doi.org/10.1109/ACCESS.2019.2896108 arXiv:1805.02707Google Scholar
- Sam M. Werner, Dragos I. Ilie, Iain Stewart, and William J. Knottenbelt. 2020. Unstable Throughput: When the Difficulty Algorithm Breaks. https://doi.org/10.1109/icbc51069.2021.9461086 arXiv:cs.CR/2006.03044Google Scholar
- Gavin Wood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151, 2014 (2014), 1--32.Google Scholar
- wow. 2020. AAVE Protocol Whitepaper V2.0. arXiv:https://git.io/JLQVx https://git.io/JLQVxGoogle Scholar
- Aviv Yaish and Aviv Zohar. 2020. Pricing ASICs for Cryptocurrency Mining. arXiv:2002.11064Google Scholar
- Ren Zhang and Bart Preneel. 2019. Lay down the common metrics: Evaluating proof-of-work consensus protocols' security. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, IEEE, 175--192. https://doi.org/10.1109/sp.2019.00086Google ScholarCross Ref
- Liyi Zhou, Kaihua Qin, Antoine Cully, Benjamin Livshits, and Arthur Gervais. 2021. On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols. CoRR abs/2103.02228 (2021). arXiv:2103.02228 https://arxiv.org/abs/2103.02228Google Scholar
Index Terms
- Blockchain Stretching & Squeezing: Manipulating Time for Your Best Interest
Recommendations
Uncle Maker: (Time)Stamping Out The Competition in Ethereum
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityWe present and analyze an attack on Ethereum 1's consensus mechanism, which allows miners to obtain higher mining rewards compared to their honest peers. This attack is novel in that it relies on manipulating block timestamps and the difficulty-...
How to make a digital currency on a blockchain stable
AbstractBitcoin and other similar digital currencies on blockchains are not ideal means for payment, because their prices tend to go up in the long term (thus people are incentivized to hoard those currencies), and to fluctuate widely in the ...
Highlights- Market prices of cryptocurrency are automatically stabilized by absorbing demand shocks.
A Flexible Instant Payment System Based on Blockchain
Information Security and PrivacyAbstractImproving the throughput of blockchain systems such as Bitcoin and Ethereum has been an important research problem. Off-chain payments are one of the most promising technologies to tackle this challenge. Once a payment channel, however, is ...
Comments