Bitcoin. What is Bitcoin? A P2P network for electronic payments Benefits: – Low fees – No middlemen – No central authority – Can be anonymous – Each payment.

Slides:



Advertisements
Similar presentations
Let’s Talk About Cyber Security
Advertisements

Chapter 17: WEB COMPONENTS
Secure Multiparty Computations on Bitcoin
Bitcoin: A New Internet Currency Stephen Clayton Senior Economic Education Specialist Federal Reserve Bank of Dallas The opinions expressed are solely.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
COMS 486 Iowa State University Introduction to Bitcoin A P2P Electronic Cash System.
CS425/CSE424/ECE428 — Distributed Systems — Fall Nikita Borisov - UIUC1.
BITCOIN – 2014 John BlackSpring Digital Currency  Chaum’s ideas in the 1980’s  All ideas required a central bank or single point of trust  Chaum.
Bitcoin Double Spending Attack Karame, Androulaki & Capkun Presented by Subhro Kar CSCE 715, Fall 2013.
Towards a More Democratic Mining in Bitcoins Goutam Paul R. C. Bose Centre for Cryptology & Security, Indian Statistical Institute Pratik Sarkar Indian.
Stefan Dziembowski Why do the cryptographic currencies need a solid theory? Forum Informatyki Teoretycznej, Warsaw
Advanced Computer Communications PROFESSOR:STUDENT: PROF. DR. ING. BRAD REMUS STEFAN FEILMEIER FACULTATEA DE INGINERIE HERRMANN OBERTH MASTER-PROGRAM.
BITCOIN An introduction to a decentralised and anonymous currency. By Andy Brodie.
MSF Testing Introduction Functional Testing Performance Testing.
Page 1 Sandboxing & Signed Software Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
The world’s first decentralized digital currency Meni Rosenfeld Bitcoil 29/11/2012Written by Meni Rosenfeld1.
INTRODUCTION TO WEB DATABASE PROGRAMMING
TESTING STRATEGY Requires a focus because there are many possible test areas and different types of testing available for each one of those areas. Because.
Digital Currency Kody Myers. Definition Currency that does not exist in any physical form, but can be used similarly to physical currency while retaining.
Niels Provos and Panayiotis Mavrommatis Google Google Inc. Moheeb Abu Rajab and Fabian Monrose Johns Hopkins University 17 th USENIX Security Symposium.
Masud Hasan Secue VS Hushmail Project 2.
Bitcoin (what, why and how?)
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
Adrian Crenshaw. Darknets  There are many definitions, but mine is “anonymizing private networks ”  Use of encryption.
Security Update Vincent BRILLAULT HEPiX Spring 2014, Annecy.
Bitcoin Transaction Scripting Andy Ofiesh Senior Software Engineer Armory Technologies, Inc. MIT Bitcoin Expo, May 3rd, 2014 © Armory Technologies, Inc.
Bitcoins and the Digital Economy Presented By: Matt Blackman.
Types of Electronic Infection
Decentralized multi-signature solutions for Bitcoin.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
1 Bitcoin A Digital Currency. Functions of Money.
Bitcoin today (October 2, 2015)
Chapter 11 Working with Credit Card Methods of Processing Credit Cards Preparing for Cyber Cash Authoring a Credit card Transaction.
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Deanonimization methods in Bitcoin Network Marko Marić.
The Silk Road: An Online Marketplace
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Bitcoin as real currency Bitcoin. Phone: | Bitcoin? - decentralized, peer to peer no banks.
Bitcoin Tech Talk Zehady Abdullah Khan (Andy) Graduate Assistant, Computer Science Department, Purdue University.
Bitcoin is a cryptographic currency that has been in continuous operation over the last 3 years. It currently enjoys an exchange rate of $4.80 (as of April.
Section #9: Bitcoins. Digital currency Unique string of bits Use cryptography for security and privacy Not tied to names: hard to trace Finite set of.
Bitcoin Based on “Bitcoin Tutorial” presentation by Joseph Bonneau, Princeton University Bonneau slides marked “JB”
How to Store and Use Bitcoins Tyler Moore, CS 7403, University of Tulsa Slides adapted from Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller,
First… What is Cryptocurrency? A Cryptocurrency is a digital currency that is created through mathematical engineering (algorithm). It is designed to.
Bitcoin Bitcoin is a cryptocurrency. The platform that hosts Bitcoin is a p2p system. Bitcoin can be abstracted as a digital file that records the account.
Block Chain 101 May 2017.
Motivation ✓ ✘ ? Bitcoin/Ideal Credit Card Works on Internet
Cryptocurrencies by.
Virtual currency? Crypto-currency? Internet Money? Property?
Bitcoin - a distributed virtual currency system
Cryptocurrencies By Rui Sakurai and Shane Spears
Bitcoin Explained in 2 Minutes
So what is Blockchain anyway?
Deanonymization of Clients in Bitcoin P2P Network

Zcash Mining – A Guide For Beginners. Zcash (also known as ZEC and seventeenth most valued cryptocurrency with market capitalization of $500 million)
Technical Overview of Bitcoin
Nakamoto Consensus Marco Canini
Bitcoin: A New Internet Currency
Campbell R. Harvey Duke University and NBER
Nonce Making Sense of Nonces.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Kai Bu 04 Blockchain Kai Bu
Wokshop SAIS 2018 Dr. Meg Murray Kennesaw state university
Faculty Seminar Series Blockchain Technology
Campbell R. Harvey Duke University and NBER
Bitcoin and Blockchain
Explore Txs, block, blockchain in Bitcoin
Presentation transcript:

Bitcoin

What is Bitcoin? A P2P network for electronic payments Benefits: – Low fees – No middlemen – No central authority – Can be anonymous – Each payment goes through, no censorship

How Does it Work? Does not rely on real currency but one can buy bitcoins for money – Valuable because they are useful and limited in supply New coins are ”mined” by performing cryptographic operations that take lots of CPU A user can package the new coin together with a block containing new transactions of others – “Verifying a block” brings the user 25 BTC reward – Reward is halved every 4 years

How Does it Work? Each transaction is signed by the sender’s private key – So no one can spend others’ money Transaction = bitcoins, public key of recipient Each transaction is broadcast in the P2P network Recipients collect and verify transactions in a block – On the average 6 blocks per hour are generated

How Does it Work? Blocks are chained together so that latter blocks depend on previous ones If multiple chains appear only the longest and fastest-growing chain is accepted as true – This prevents double-spending Anonymity can be achieved by using a new public/private key pair for each receiving transaction

Transaction Format FieldDescription Version1 In-counterInt>0 List of inputsTxin Out-counterInt>0 List of outputsTxout Lock_timeWhen is the transaction final, only valid if sequence_no < 0xFFFFFFFF

Txin Format FieldDescription Previous Transaction hash Previous Txout-indexWhich output of prev Tx is used Txin-script lengthInt >= 0 Txin-script/scriptSig Sequence_nonormally 0xFFFFFFFF

Txout Format FieldDescription Valuenumber of BTC*10 8 to be transferred Txout-script lengthInt >= 0 Txout-xcript/scriptPubKey

Sample Transaction Input 50 bitcoins from transaction with hash f5d… then send them to a Bitcoin address If the input was greater than the amount you want to spend create another output to yourself with the rest Any part of input not redeemed is the transaction fee and belongs to whoever generates a block

Transaction Verification Use a scripting system – describes how the transaction amount can be redeemed Input’s scriptSig is evaluated first – this leaves some state on the stack Output’s scriptPubKey is evaluated second Through scripting system one can create different sorts of payments with different conditions

Types of Transactions Transfer to IP address Transfer to Bitcoin address Generation

Blocks A block is a record of some or all transactions that have not been recorded so far Each block contains: – A reference to the block immediately before it – chaining (roughly one block is added each 10 min) – A solution to a cryptographic puzzle – A generation transaction so fee can be claimed for generating the block Transactions are broadcast and peers compete in trying to generate new blocks More about block rules

Puzzles A puzzle is finding an input to a hash algorithm that, when combined with the block’s hash results in output with many zeros The difficulty of the puzzle is automatically adjusted so that roughly 6 puzzles per hour can be solved Every two weeks all clients compare how much off target they were and adjust puzzle difficulty Clients accept the chain with the highest combined difficulty of puzzles as valid

Double-Spending Could one spend the same coin twice? – Bitcoin peers verify all transactions they add to the block to ensure that the same coin wasn’t spent elsewhere – There are some race conditions that may lead to double-spending before transactions are verified – As the confirmations increase no double-spending is possible

Some Statistics

Drive-By Downloads

What are Drive-By Downloads

Are These Just Exploits? If my computer is well-protected should I worry? Drive-by downloads occur in two ways: – There’s a pop-up that a user clicks on or sometimes even closes. This is interpreted as permission to download and install malware onto your machine – There’s a script on the page a user visited that initiates file download. Some browsers may run such files automatically, infecting the machine Some browsers will force downloads and warn on downloads of executable software

What If I Visit Well-Known Sites? Even such sites can have vulnerable servers that get infected by attackers Or they may serve ads that distribute malware Exploit kits for Web servers proliferate on black markets – They are also very versatile and customizable

Are There Any Defenses? Lots of research in the area from top security experts BLADEhttp:// hW “all executable files delivered through browser downloads must result from explicit user consent” hW