New Academic Paper Describes 3 Ways to Attack the Ethereum POS Chain – Bitcoin News – News Couple

New Academic Paper Describes 3 Ways to Attack the Ethereum POS Chain – Bitcoin News

After the upgrade of Altair on the Ethereum network, the protocol’s original cryptocurrency reached a new all-time high. Altair is the next step in the Proof of Stake (PoS) transition for the Ethereum network. However, a recently submitted white paper shows that a group of computer scientists from Stanford University and the Ethereum Foundation believe that there are three attack vectors “on the [a] Proof of Ethereum “blockchain” ownership.

The three attacks against the Ethereum thesis aim to describe the proof-of-stake problem.

The Ethereum network currently has a Proof of Work (PoW) consensus mechanism and in due course, the protocol is planning to move completely to the PoS network. Recent upgrades such as Berlin, London and Altair have been implemented to help ease the transition towards the goal of PoS. Recently, after the implementation of Altair, the price of ether rose to a new all-time high (ATH) at $4,467 per unit.

Meanwhile, network transmission fees have ballooned dramatically, reaching $50 for an average ether transaction on Saturday morning. Moreover, on Saturday morning in the US vertical trends from Twitter refer to the term ETH 2.0 is starting to trend. Some people discussing the ETH 2.0 upgrade shared a new white paper written by computer scientists from Stanford University and the Ethereum Foundation.

Bitcoin supporter Tor Demaster Share the paper Saturday and two quotes from the newspaper theorize how the enemy can attack the chain. The paper called “Three Proof-of-Stake Attacks on Ethereum” was presented on October 19.

The white book was authored by Caspar Schwartz-Schilling, Joachim Neu, Barnaby Mono, Aditya Asgaonkar, Artem Nusrat Tass, and David Tse. Essentially, the white paper reveals that two attacks were made on the Ethereum network recently and that the authors of the paper revised the techniques.

In addition to refining the first two that theoretically create “short-term reorganizations” and “adversarial network delays”, computer scientists have come up with a third attack.

“Combining techniques from both optimized attacks, we obtain a third attack that allows the adversary to have a fraction of the vanishing quota and does not control the propagation of network messages (assuming instead the propagation of probabilistic messages) to cause a long-range consensus chain reorganization,” it notes. The three attacks on the ETH PoS paper add:

Honest and rational or ideologically motivated validators could use this attack to increase their profits or shut down the protocol, jeopardizing incentive alignment and the security of PoS Ethereum. The attack can also destabilize the consensus caused by congestion in voting processing.

White paper says attacks ‘also enable malicious actors to stop consensus decisions completely’

Meanwhile, critics of the Ethereum network used the paper to highlight potential vulnerabilities associated with these attacks when the network transitions to a full PoS system. Chia Project founder and Bittorrent founder, Bram Cohen too chirp About the new study on Saturday.

A supporter of Xia and Tell Cohen: “Let’s revisit your tweet in a year and see what Chia has accomplished for ETH. Please consider your position is to alienate community members like me.” The Ethereum Attack Sheet provides a potential attack method against the Ethereum PoS chain, but also offers solutions. The paper’s authors believe that attacks provide incentives for malicious actors.

The paper’s authors concluded that “our attacks also enable malicious actors, possibly ideologically motivated, to delay, and in some cases stop, consensus decisions.” “The repeated attack in Section 4.2 gives the adversary a tool to do so, even if the adversary cannot control the message propagation delays (which is instead assumed to be a possibility).”

What do you think of the recently published paper about three attacks against the Ethereum PoS system? Tell us what you think about it in the comments section below.

Tags in this story

3 Attacks, Academic Paper, Aditya Asgaonkar, Attack Vectors, Barnabé Monnot, Bram Cohen, Caspar Schwarz-Schilling, founder of Chia, Computer Scientists, David Tse, Ertem Nusret Tas, ETH, ETH 2.0, ETH Network, ETH Protocol, Ethereum, Ethereum (ETH), The Ethereum Foundation, Ethereum Network, Joachim Neu, PoS, PoW, Proof-of-Stake, Stanford, tuur demeester, White Paper

photo credits: Shutterstock, Pixabay, Wikicommons

Source link

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button