Overview
Syllabus
Intro
Bitcoin relies on underlying peer-to-peer network
Partitioning attack is a dangerous threat
Previous attack: routing manipulation to partition Bitcoin's peer-to-peer network
Erebus attack: A stealthier partitioning attack against Bitcoin network
Challenge 1: How many shadow IPs are available?
Challenge 2: How does Erebus attacker influence Bitcoin node's peer selection?
How to influence the victim to connect to shadow IPs?
Attack strategy: send low-rate traffic and patiently wait
Adversary can occupy all connections with shadow IPs in 5 - 6 weeks
Why is the Erebus attack stealthy?
Who can launch the Erebus attack?
What about other cryptocurrencies?
Countermeasures against the Erebus attack
Taught by
IEEE Symposium on Security and Privacy