Skip to content

Commit 5e5978b

Browse files
committed
Repository ready for P10 thesis
1 parent 8a89267 commit 5e5978b

15 files changed

+26
-1231
lines changed

report/src/bib/main.bib

Lines changed: 9 additions & 303 deletions
Original file line numberDiff line numberDiff line change
@@ -8,307 +8,13 @@ @book{goossens1993
88
% publisher = "Addison-Wesley",
99
% address = "Reading, Massachusetts"
1010
%}
11-
%
12-
%@article{greenwade1993,
13-
% author = "George D. Greenwade",
14-
% title = "The {C}omprehensive {T}ex {A}rchive {N}etwork ({CTAN})",
15-
% year = "1993",
16-
% journal = "TUGBoat",
17-
% volume = "14",
18-
% number = "3",
19-
% pages = "342--351"
20-
%}
21-
22-
@article{EthereumAttacks2024,
23-
title = {What are zero-knowledge proofs?},
24-
author = {ethereum.org},
25-
year = {2024},
26-
note = {Accessed: 15-10-2024},
27-
url = {https://ethereum.org/en/zero-knowledge-proofs/}
28-
}
29-
30-
@article{MACI2022,
31-
title = {A Technical Introduction to MACI 1.0},
32-
author = {Kyle Charbonnet},
33-
year = {2022},
34-
note = {Accessed: 15-10-2024},
35-
url = {https://maci.pse.dev/blog/maci-1-0-technical-introduction}
36-
}
37-
38-
@article{EthereumScaling2024,
39-
title = {Scaling},
40-
author = {ethereum.org},
41-
year = {2024},
42-
note = {Accessed: 15-10-2024},
43-
url = {https://ethereum.org/en/developers/docs/scaling/}
44-
}
45-
46-
@article{sarenche2024breakingbalancepowercommitment,
47-
title={Breaking the Balance of Power: Commitment Attacks on Ethereum's Reward Mechanism},
48-
author={Roozbeh Sarenche and Ertem Nusret Tas and Barnabe Monnot and Caspar Schwarz-Schilling and Bart Preneel},
49-
year={2024},
50-
eprint={2407.19479},
51-
archivePrefix={arXiv},
52-
primaryClass={cs.CR},
53-
url={https://arxiv.org/abs/2407.19479},
54-
}
55-
56-
57-
58-
@article{10.1145/3391195,
59-
author = {Chen, Huashan and Pendleton, Marcus and Njilla, Laurent and Xu, Shouhuai},
60-
title = {A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses},
61-
year = {2020},
62-
issue_date = {May 2021},
63-
publisher = {Association for Computing Machinery},
64-
address = {New York, NY, USA},
65-
volume = {53},
66-
number = {3},
67-
issn = {0360-0300},
68-
url = {https://doi.org/10.1145/3391195},
69-
doi = {10.1145/3391195},
70-
abstract = {Blockchain technology is believed by many to be a game changer in many application domains. While the first generation of blockchain technology (i.e., Blockchain 1.0) is almost exclusively used for cryptocurrency, the second generation (i.e., Blockchain 2.0), as represented by Ethereum, is an open and decentralized platform enabling a new paradigm of computing—Decentralized Applications (DApps) running on top of blockchains. The rich applications and semantics of DApps inevitably introduce many security vulnerabilities, which have no counterparts in pure cryptocurrency systems like Bitcoin. Since Ethereum is a new, yet complex, system, it is imperative to have a systematic and comprehensive understanding on its security from a holistic perspective, which was previously unavailable in the literature. To the best of our knowledge, the present survey, which can also be used as a tutorial, fills this void. We systematize three aspects of Ethereum systems security: vulnerabilities, attacks, and defenses. We draw insights into vulnerability root causes, attack consequences, and defense capabilities, which shed light on future research directions.},
71-
journal = {ACM Comput. Surv.},
72-
month = jun,
73-
articleno = {67},
74-
numpages = {43},
75-
keywords = {smart contract, security, Ethereum, Blockchain}
76-
}
77-
78-
@ARTICLE{9815256,
79-
author={Kabla, Arkan Hammoodi Hasan and Anbar, Mohammed and Manickam, Selvakumar and Al-Amiedy, Taief Alaa and Cruspe, Peterson Bernabe and Al-Ani, Ahmed K. and Karuppayah, Shankar},
80-
journal={IEEE Access},
81-
title={Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review},
82-
year={2022},
83-
volume={10},
84-
number={},
85-
pages={71632-71655},
86-
keywords={Blockchains;Decentralized applications;Peer-to-peer computing;Smart contracts;Intrusion detection;Bitcoin;Data structures;Anomaly detection;blockchain;cryptocurrency;Ethereum attacks;Ethereum vulnerabilities;intrusion detection system;Kademlia;P2P network;smart contracts;transaction},
87-
doi={10.1109/ACCESS.2022.3188637}}
88-
89-
@article{Opcode-mitigation,
90-
title = {EIP-150: Gas cost changes for IO-heavy operations},
91-
author = {Vitalik Buterin},
92-
journal = {Ethereum Improvement Proposals},
93-
year = {2016},
94-
month = {September},
95-
number = {150},
96-
note = {Accessed: 18-10-2024},
97-
url = {https://eips.ethereum.org/EIPS/eip-150}
98-
}
99-
100-
@article{empty-account-mitigation,
101-
title = {A state clearing FAQ},
102-
author = {Vitalik Buterin},
103-
year = {2016},
104-
month = {November},
105-
note = {Accessed: 18-10-2024},
106-
url = {https://www.reddit.com/r/ethereum/comments/5es5g4/a_state_clearing_faq}
107-
}
108-
109-
@article{empty-account-eip-mitigation,
110-
title = {EIP-161: State trie clearing (invariant-preserving alternative)},
111-
author = {Gavin Wood},
112-
journal = {Ethereum Improvement Proposals},
113-
year = {2016},
114-
month = {October},
115-
number = {161},
116-
note = {Accessed: 18-10-2024},
117-
url = {https://eips.ethereum.org/EIPS/eip-161}
118-
}
119-
120-
@article{EthereumSSLE2024,
121-
title = {Secret leader election},
122-
author = {ethereum.org},
123-
year = {2024},
124-
note = {Accessed: 22-10-2024},
125-
url = {https://ethereum.org/en/roadmap/secret-leader-election/}
126-
}
127-
128-
@article{EthereumAttackDefense2024,
129-
title = {Ethereum proof-of-stake attack and defense},
130-
author = {ethereum.org},
131-
year = {2024},
132-
note = {Accessed: 22-10-2024},
133-
url = {https://ethereum.org/en/developers/docs/consensus-mechanisms/pos/attack-and-defense/}
134-
}
135-
136-
@article{EthereumProof-of-stakePoS,
137-
title = {Proof-of-stake (PoS)},
138-
author = {ethereum.org},
139-
year = {2024},
140-
note = {Accessed: 23-10-2024},
141-
url = {https://ethereum.org/en/developers/docs/consensus-mechanisms/pos/}
142-
}
143-
144-
145-
@article{EthereumResearchSSLE2024,
146-
title = {Secret non-single leader election},
147-
author = {Vitalik Buterin},
148-
year = {2024},
149-
note = {Accessed: 22-10-2024},
150-
url = {https://ethresear.ch/t/secret-non-single-leader-election/11789}
151-
}
152-
153-
154-
@article{Whisk2024,
155-
title = {Whisk: A practical shuffle-based SSLE protocol for Ethereum},
156-
author = {George Kadianakis},
157-
year = {2024},
158-
note = {Accessed: 22-10-2024},
159-
url = {https://ethresear.ch/t/whisk-a-practical-shuffle-based-ssle-protocol-for-ethereum/11763}
160-
}
161-
162-
@inproceedings{10.1145/3560829.3563560,
163-
author = {Neu, Joachim and Tas, Ertem Nusret and Tse, David},
164-
title = {Two More Attacks on Proof-of-Stake GHOST/Ethereum},
165-
year = {2022},
166-
isbn = {9781450398794},
167-
publisher = {Association for Computing Machinery},
168-
address = {New York, NY, USA},
169-
url = {https://doi.org/10.1145/3560829.3563560},
170-
doi = {10.1145/3560829.3563560},
171-
abstract = {Ethereum, the world's second largest cryptocurrency with a market capitalization exceeding 120 billion USD as of this writing, aims to switch from Proof-of-Work (PoW) to Proof-of-Stake (PoS) based consensus later in the year 2022 (`the Merge'). Yet, so far, the proposed PoS consensus protocol lacks in rigorous security analysis. We present two new attack strategies targeting the PoS Ethereum consensus protocol. The first attack suggests a fundamental conceptual incompatibility between PoS and the Greedy Heaviest-Observed Sub-Tree (GHOST) fork choice paradigm employed by PoS Ethereum. In a nutshell, PoS allows an adversary with a vanishing amount of stake to produce an unlimited number of equivocating blocks. While most equivocating blocks will be orphaned, such orphaned 'uncle blocks' still influence fork choice under the GHOST paradigm, bestowing upon the adversary devastating control over the canonical chain. While the Latest Message Driven (LMD) aspect of current PoS Ethereum prevents a straightforward application of this attack, our second attack shows how LMD specifically can be exploited to obtain a new variant of the balancing attack that overcomes 'proposer boosting', a recent protocol addition that was intended to mitigate balancing-type attacks. Thus, in its current form, PoS Ethereum without and with LMD is vulnerable to our first and second attack, respectively.},
172-
booktitle = {Proceedings of the 2022 ACM Workshop on Developments in Consensus},
173-
pages = {43–52},
174-
numpages = {10},
175-
keywords = {proof-of-stake, ghost, ethereum, balancing, avalanche, attack},
176-
location = {Los Angeles, CA, USA},
177-
series = {ConsensusDay '22}
178-
}
179-
180-
@InProceedings{10.1007/978-3-031-18283-9_28,
181-
author="Schwarz-Schilling, Caspar
182-
and Neu, Joachim
183-
and Monnot, Barnab{\'e}
184-
and Asgaonkar, Aditya
185-
and Tas, Ertem Nusret
186-
and Tse, David",
187-
editor="Eyal, Ittay
188-
and Garay, Juan",
189-
title="Three Attacks on Proof-of-Stake Ethereum",
190-
booktitle="Financial Cryptography and Data Security",
191-
year="2022",
192-
publisher="Springer International Publishing",
193-
address="Cham",
194-
pages="560--576",
195-
abstract="Recently, two attacks were presented against Proof-of-Stake (PoS) Ethereum: one where short-range reorganizations of the underlying consensus chain are used to increase individual validators' profits and delay consensus decisions, and one where adversarial network delay is leveraged to stall consensus decisions indefinitely. We provide refined variants of these attacks, considerably relaxing the requirements on adversarial stake and network timing, and thus rendering the attacks more severe. Combining techniques from both refined attacks, we obtain a third attack which allows an adversary with vanishingly small fraction of stake and no control over network message propagation (assuming instead probabilistic message propagation) to cause even long-range consensus chain reorganizations. Honest-but-rational or ideologically motivated validators could use this attack to increase their profits or stall the protocol, threatening incentive alignment and security of PoS Ethereum. The attack can also lead to destabilization of consensus from congestion in vote processing.",
196-
isbn="978-3-031-18283-9"
197-
}
198-
199-
@INPROCEEDINGS{10646904,
200-
author={Pavloff, Ulysse and Amoussou-Guenou, Yackolley and Tucci-Piergiovanni, Sara},
201-
booktitle={2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)},
202-
title={Byzantine Attacks Exploiting Penalties in Ethereum PoS},
203-
year={2024},
204-
volume={},
205-
number={},
206-
pages={53-65},
207-
keywords={Smart contracts;Probabilistic logic;Blockchains;Safety;Cryptocurrency;Open source software;Ethereum;Inactivity Leak;Safety;Liveness;Blockchain},
208-
doi={10.1109/DSN58291.2024.00020}}
209-
210-
@misc{cryptoeprint:2023/1622,
211-
author = {Mingfei Zhang and Rujia Li and Sisi Duan},
212-
title = {Max Attestation Matters: Making Honest Parties Lose Their Incentives in Ethereum {PoS}},
213-
howpublished = {Cryptology {ePrint} Archive, Paper 2023/1622},
214-
year = {2023},
215-
url = {https://eprint.iacr.org/2023/1622}
216-
}
217-
218-
@article{EIP-778:Ethereum-Node-Records,
219-
title = {EIP-778: Ethereum Node Records (ENR)},
220-
author = {Felix Lange},
221-
journal = {Ethereum Improvement Proposals},
222-
year = {2017},
223-
month = {November},
224-
number = {778},
225-
note = {Accessed: 15-11-2024},
226-
url = {https://eips.ethereum.org/EIPS/eip-778}
227-
}
228-
229-
@article{Staking,
230-
title = {Staking},
231-
author = {Ethereum.org},
232-
note = {Accessed: 18-11-2024},
233-
url = {https://ethereum.org/en/staking/}
234-
}
235-
236-
@article{PoSRewAndPen,
237-
title = {Proof-of-Stake Rewards And Penalties},
238-
author = {@corwintines and @mcmoodoo and @aslikaya and @nhsz},
239-
note = {Accessed: 18-11-2024},
240-
url = {https://ethereum.org/en/developers/docs/consensus-mechanisms/pos/rewards-and-penalties/}
241-
}
242-
243-
@article{consensus-spec-phase-0,
244-
title = {Consensus Spec, phase 0},
245-
author = {Ethereum},
246-
note = {Accessed: 18-11-2024},
247-
url = {https://github.com/ethereum/consensus-specs/blob/dev/specs/phase0/beacon-chain.md}
248-
}
249-
250-
@article{prysm,
251-
title = {Prysm},
252-
author = {Prysmatic Labs},
253-
note = {Accessed: 12-01-2024},
254-
url = {https://github.com/prysmaticlabs/prysm}
255-
}
256-
257-
@article{client-diversity,
258-
title = {Client diversity},
259-
author = {Ether Alpha},
260-
note = {Accessed: 12-01-2024},
261-
url = {https://clientdiversity.org/#distribution}
262-
}
263-
https://clientdiversity.org/#distribution
264-
265-
@misc{heimbach2024deanonymizingethereumvalidatorsp2p,
266-
title={Deanonymizing Ethereum Validators: The P2P Network Has a Privacy Issue},
267-
author={Lioba Heimbach and Yann Vonlanthen and Juan Villacis and Lucianna Kiffer and Roger Wattenhofer},
268-
year={2024},
269-
eprint={2409.04366},
270-
archivePrefix={arXiv},
271-
primaryClass={cs.CR},
272-
url={https://arxiv.org/abs/2409.04366},
273-
}
274-
https://github.com/ethereum/consensus-specs/blob/dev/specs/phase0/beacon-chain.md
275-
276-
@article{random-selection,
277-
title = {Random Selection},
278-
author = {@corwintines and @pettinarip and @nhsz and @nalepae},
279-
note = {Accessed: 21-11-2024},
280-
url = {https://ethereum.org/en/developers/docs/consensus-mechanisms/pos/block-proposal/#random-selection}
281-
}
282-
283-
@article{attestations,
284-
title = {Attestations},
285-
author = {@wackerow},
286-
note = {Accessed: 20-12-2024},
287-
url = {https://ethereum.org/en/developers/docs/consensus-mechanisms/pos/attestations/}
288-
}
289-
290-
291-
@inproceedings{upgrading-ethereum-randomness,
292-
author = {Edgington, Ben},
293-
title = {Randomness},
294-
year = {2023},
295-
url = {https://eth2book.info/capella/book.pdf},
296-
booktitle = {Upgrading Ethereum},
297-
pages = {134–149}
298-
}
299-
300-
@misc{cryptoeprint:2023/760,
301-
author = {Anton Wahrstätter and Liyi Zhou and Kaihua Qin and Davor Svetinovic and Arthur Gervais},
302-
title = {Time to Bribe: Measuring Block Construction Market},
303-
howpublished = {Cryptology {ePrint} Archive, Paper 2023/760},
304-
year = {2023},
305-
url = {https://eprint.iacr.org/2023/760}
306-
}
307-
308-
@article{mev,
309-
title = {Maximal Extractable Value},
310-
author = {@corwintines},
311-
note = {Accessed: 21-12-2024},
312-
url = {https://ethereum.org/en/developers/docs/mev/}
313-
}
31411

12+
@article{greenwade1993,
13+
author = "George D. Greenwade",
14+
title = "The {C}omprehensive {T}ex {A}rchive {N}etwork ({CTAN})",
15+
year = "1993",
16+
journal = "TUGBoat",
17+
volume = "14",
18+
number = "3",
19+
pages = "342--351"
20+
}

report/src/main.tex

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@
2222
\input{sections/06-discussion}
2323
\input{sections/07-conclusion}
2424
\input{sections/08-future-works}
25-
\input{sections/09-Acknowledgements}
25+
\input{sections/09-acknowledgements}
2626

2727
\clearpage
2828
%\printglossary[type=\acronymtype]

report/src/sections/00-abstract.tex

Lines changed: 2 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,8 @@
11

22
\begin{abstract}
3-
Ethereum prioritizes keeping the blockchain secure, and this will continue due to the large amount of money invested in the network.
4-
One of the network's most central aspects is the validators, who are responsible for producing the blocks that make up the chain.
5-
However, security and privacy are at risk as Heimbach et al. explore a vulnerability, enabling de-anonymizing validators and linking IP addresses to them.
6-
This paper reproduces the de-anonymization on the Ethereum Holesky testnet, verifying the continued existence of the vulnerability.
7-
The reproduction shows similar results, de-anonymizing close to the same portion of validators found through the experiment.
8-
Differences from de-anonymization on a testnet contrary to the mainnet are discussed, showing, among other things, that nodes generally run more validators on the testnet.
9-
The consequences of the validator de-anonymization are also explored, and a potential denial-of-service attack on block proposers is described.
10-
The Denial-of-Service attack allows an adversary to halt de-anonymized block proposers, resulting in them missing their proposal opportunity and getting penalized.
3+
This is the abstract~\gls{zkp}~\cite{greenwade1993}.
114
\end{abstract}
125

136
\begin{IEEEkeywords}
14-
Ethereum, Blockchain, Distributed Systems, Privacy Attack
7+
Ethereum, Proof of Shuffle, Distributed Systems, Inner Product Arguments, Zero-Knowledge Proof
158
\end{IEEEkeywords}

0 commit comments

Comments
 (0)