Byzantine attacks exploiting penalties in Ethereum PoS - CEA - Université Paris-Saclay Accéder directement au contenu
Pré-Publication, Document De Travail Année : 2024

Byzantine attacks exploiting penalties in Ethereum PoS

Attaques byzantines exploitant les pénalités dans Ethereum PoS

Résumé

In May 2023, the Ethereum blockchain experienced its first inactivity leak, a mechanism designed to reinstate chain finalization amid persistent network disruptions. This mechanism aims to reduce the voting power of validators who are unreachable within the network, reallocating this power to active validators. This paper investigates the implications of the inactivity leak on safety within the Ethereum blockchain. Our theoretical analysis reveals scenarios where actions by Byzantine validators expedite the finalization of two conflicting branches, and instances where Byzantine validators reach a voting power exceeding the critical safety threshold of one-third. Additionally, we revisit the probabilistic bouncing attack, illustrating how the inactivity leak can result in a probabilistic breach of safety, potentially allowing Byzantine validators to exceed the one-third safety threshold. Our findings uncover how penalizing inactive nodes can compromise blockchain properties, particularly in the presence of Byzantine validators capable of coordinating actions.
Fichier principal
Vignette du fichier
Inactivity_Leak_Paper.pdf (745.46 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
licence : CC BY - Paternité

Dates et versions

hal-04559256 , version 1 (02-05-2024)

Licence

Paternité

Identifiants

Citer

Ulysse Pavloff, Yackolley Amoussou-Guenou, Sara Tucci-Piergiovanni. Byzantine attacks exploiting penalties in Ethereum PoS. 2024. ⟨hal-04559256⟩
0 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More