Completed
Adversary can occupy all connections with shadow IPs in 5 - 6 weeks
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
A Stealthier Partitioning Attack Against Bitcoin Peer-to-Peer Network
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Bitcoin relies on underlying peer-to-peer network
- 3 Partitioning attack is a dangerous threat
- 4 Previous attack: routing manipulation to partition Bitcoin's peer-to-peer network
- 5 Erebus attack: A stealthier partitioning attack against Bitcoin network
- 6 Challenge 1: How many shadow IPs are available?
- 7 Challenge 2: How does Erebus attacker influence Bitcoin node's peer selection?
- 8 How to influence the victim to connect to shadow IPs?
- 9 Attack strategy: send low-rate traffic and patiently wait
- 10 Adversary can occupy all connections with shadow IPs in 5 - 6 weeks
- 11 Why is the Erebus attack stealthy?
- 12 Who can launch the Erebus attack?
- 13 What about other cryptocurrencies?
- 14 Countermeasures against the Erebus attack