Eclipse Attacks on Bitcoin’s Peer-to-Peer Network

Eclipse Attacks on Bitcoin’s Peer-to-Peer Network

USENIX via YouTube Direct link

Countermeasures: Random Selection

9 of 13

9 of 13

Countermeasures: Random Selection

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Eclipse Attacks on Bitcoin’s Peer-to-Peer Network

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Bitcoin's Peer-to-Peer Network
  3. 3 Example 1: 51% attack with 40% mining power
  4. 4 Example 2: N-Confirmation Double Spending
  5. 5 How easy are restartsy
  6. 6 How to eclipse with a limited number of Ps?
  7. 7 Exploiting Bucket Eviction by investing Time
  8. 8 Results: Live experiment
  9. 9 Countermeasures: Random Selection
  10. 10 Countermeasures: Deterministic Random Eviction
  11. 11 Countermeasures: Deployment
  12. 12 Countermeasures: How effective?
  13. 13 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.