Stressing Out: Bitcoin “Stress Testing” Khaled Baqer, Danny Yuxing Huang, Damon McCoy and Nick Weaver (given by Ross Anderson)

Slides:



Advertisements
Similar presentations
Stefan Dziembowski Why do the cryptographic currencies need a solid theory? Forum Informatyki Teoretycznej, Warsaw
Advertisements

Internet Intrusions: Global Characteristics and Prevalence Presented By: Zhichun Li Using slides from Vinod Yegneswaran’s presentation at SIGMETRICS 2003.
Internet Intrusions: Global Characteristics and Prevalence Presented By: Elliot Parsons Using slides from Vinod Yegneswaran’s presentation at SIGMETRICS.
University of WashingtonComputing & Communications Recent Computer Security Incidents Terry Gray Director, Networks & Distributed Computing 03 October.
Chapter 22. Demand for Money
1 Job Search Models. 2 In economics we have a general rule of behavior that says engage in an activity up to the point where the marginal benefit is equal.
Defense Questions # of correlated attacks: under-estimated or over-estimated? Conservative estimation –Average across all the three dataset? Dataset w/
I.1 ii.2 iii.3 iv.4 1+1=. i.1 ii.2 iii.3 iv.4 1+1=
Welcome to CS 450 Internet Security: A Measurement-based Approach.
I.1 ii.2 iii.3 iv.4 1+1=. i.1 ii.2 iii.3 iv.4 1+1=
How to Own the Internet in your spare time Ashish Gupta Network Security April 2004.
BUILDING WINNING OUTCOMES. 1. You 2. The Environment 3. The Opportunity 4. The Plan 5. The Action 6. The Sell CAREER OPTIONS CIRCLE Know Yourself Know.
The world’s first decentralized digital currency Meni Rosenfeld Bitcoil 29/11/2012Written by Meni Rosenfeld1.
Social impacts of the use of it By: Mohamed Abdalla.
Copyright © Cengage Learning. All rights reserved. Exponential Function Modeling and Graphs SECTION 6.2.
Dividing the Pizza An Advanced Traffic Billing System An Advanced Traffic Billing System Christopher Lawrence Burke The University of Queensland.
How CERN reacted to the Blaster and Sobig virus attack Christian Boissat, Alberto Pace, Andreas Wagner.
Dariusz Pęchorzewski, PhD Szczecin Renovation Centre Ltd. Institute of Economic Analyses, Diagnoses and Forecasts The impact of the global financial crisis.
G53SEC 1 Coursework Specification. G53SEC Coursework Option 1: Spam Detection and Categorisation 2.
Национальная процедура одобрения и регистрации проектов (программ) международной технической помощи (исключая представление информации об организации и.
8.1.4 Can it still be factored? Factoring Completely I can factor out a common factor.
Scalable Multi-core Sonar Beamforming with Computational Process Networks Motivation Sonar beamforming requires significant computation and input/output.
Project X Group Y Presenters: (indicate roles). Part I: Project Overview System provides functionality X Motivation for project –Address problem with…
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Presentation Template KwangSoo Yang Florida Atlantic University College of Engineering & Computer Science.
Deanonimization methods in Bitcoin Network Marko Marić.
3.3. Open Ended Matching Grant a) Expenditures on highways will increase because of both a substitution effect and an income effect. The expenditures on.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Intelligent Numerical Computation1 Center:Width:.
Cryptocurrencies: challenges and caveats Khaled Baqer Cambridge University.
Chapter 9 Section 3 Stocks, Bonds, and Futures Bw6FyPf34.
Analysing s Michael Jones. Overview How works Types of crimes associated with Mitigations Countermeasures Michael Jones2Analsysing s.
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
Symposium on Distributed Ledger Technology SDLT'2017
Ted Welcome.
Bitcoin - a distributed virtual currency system
Instability Of Bitcoin Without the Block Reward.
International Labour Office
The Perfect Marriage! Ephesians 5:21-33.
Overview ➔ Cryptocurrency Wallet App - One of the most popular Crypto wallet apps in Europe. Cryptocurrency Wallet App ➔ This Wallet app design and developed.
denote Project Managers explicitly
Group Y Presenters: (indicate roles)
The Economic Impact of Technology-Based Industries in Washington State
More Specific Announcements in BGP
شاخصهای عملکردی بیمارستان
Team Members: Member1, … Spring 2013
مدل زنجیره ای در برنامه های سلامت
فرق بین خوب وعالی فقط اندکی تلاش بیشتر است
KMeans Clustering on Hadoop Fall 2013 Elke A. Rundensteiner
Campbell R. Harvey Duke University and NBER
ОПЕРАТИВНА ПРОГРАМА “ИНОВАЦИИ И КОНКУРЕНТОСПОСОБНОСТ“ „Подобряване на производствения капацитет в МСП“
Blockchain Concepts RISK FORUM 2017 Hash function (e.g. SHA-256)
Bitcoin & Blockchain Bina Ramamurthy 2/22/2019.
Teechain: Scalable Blockchain Payments using Trusted Execution Environments GIZEM AKDENIZ DECEMBER 13 , 2018.
A Conceptual Model for Ethereum Blockchain Analytics
Solving Equations 3x+7 –7 13 –7 =.
Your Name Adolescent Risk Taking (Psych 4900) Weber State University
Research Institute for Future Media Computing
Motifs.
CONTENTS     Enter text Enter text Enter text Enter text
Reducing Forks in the Blockchain via Probabilistic Verification
NS4301 Summer Term 2015 Economic Fundamentals
Campbell R. Harvey Duke University and NBER
Blockchain Tech Big Picture
Blockchain Tech Big Picture
Explore Txs, block, blockchain in Bitcoin
Data Mining CSCI 307, Spring 2019 Lecture 11
U A B II III I IV 94.
Not about digital currencies
Presentation transcript:

Stressing Out: Bitcoin “Stress Testing” Khaled Baqer, Danny Yuxing Huang, Damon McCoy and Nick Weaver (given by Ross Anderson)

Overview Spam attack on Bitcoin (July 2015) Importance: block size debate! At present you can bring down Bitcoin for $50k Goal here: highlight spam motifs, investigate impact, analyse security economics (fee income increase, cost of spam campaign) Used a clustering method to group transactions and find patterns

Bitcoin spam Fan-in: Transactions that absorb a lot of inputs reduce the unspent transaction output (UTXO) set but still occupy substantial space in the blocks Fan-out: Transactions that split a few inputs into many outputs occupy space in blocks and also increase the UTXO set (Mempool impact) Dust output: “Dust” outputs convey a trivial amount of value but occupy the same amount of resources in the Bitcoin network

Spam campaign (July 2015) Someone said, ‘stress testing Bitcoin network’ Motivation (?): show Bitcoin is vulnerable to DoS, and get support to raise the block size DoS: send transactions with higher fees to deplete space in blocks Spam also uses many similar transactions to have a significant impact on the network But what does spam look like?

k-means Clustering

k-means Clustering (II)

Impact on Bitcoin: The number of transactions per day in the blockchain

Impact on Bitcoin (II): The average number of unconfirmed transactions

Impact on Bitcoin (III): The total amount of transaction fees every day

Impact on Bitcoin (IV): Average transaction delay

Impact on Bitcoin (V): Average transaction fees per transaction per day (normalized)

Summary of results (10-day spam campaign) 385,256 (23.41%) out of 1,645,667 total Bitcoin transactions were spam Spam increased average fees by 51% (from 45 to 68 Satoshis/byte) Spam increased processing delay by 7 times (from 0.33 to 2.67 hours) Cost of this attack on Bitcoin: $49K, about half being to pay higher fees

Questions? If skype doesn’t work,. hard questions to (who could not get a visa processed in Further possible discussions for the barbecue: sovereign risk and other emergent problems of governance