More Mining David Evans and Samee Zahur CS4501, Fall 2015 University of Virginia.

Slides:



Advertisements
Similar presentations
Cryptocurrency Café UVa cs4501 Spring 2015 David Evans Class 16: Alternate Cryptocurrencies flickr cc: epSos.de.
Advertisements

Cryptocurrency Café UVa cs4501 Spring 2015 David Evans Class 14: Selfish Mining.
Towards a More Democratic Mining in Bitcoins Goutam Paul R. C. Bose Centre for Cryptology & Security, Indian Statistical Institute Pratik Sarkar Indian.
Stefan Dziembowski Why do the cryptographic currencies need a solid theory? Forum Informatyki Teoretycznej, Warsaw
THE MEANING OF STATISTICAL SIGNIFICANCE: STANDARD ERRORS AND CONFIDENCE INTERVALS.
Lesson #22 Inference for Two Independent Means. Two independent samples: Again interested in (  1 –  2 ) n1n1 n2n2 Use to estimate (  1 –  2 )
1 BA 275 Quantitative Business Methods Review Statistical Inference on Two Populations The p-value Approach Practice Problems Office Hours: Monday, 2/27/06:
2006 Fall MATH 100 Lecture 141 MATH 100Class 21 Line Integral independent of path.
Step 1. Locate the interval containing the score that separates the distribution into halves. There are 100 scores in the distribution, so the 50 th score.
Bitcoin 2013, San Jose Meni Rosenfeld Bitcoil 5/19/2013Written by Meni Rosenfeld1.
Spring 2012 MATH 250: Calculus III. Course Topics Review: Parametric Equations and Polar Coordinates Vectors and Three-Dimensional Analytic Geometry.
On Power Splitting Games in Distributed Computation: The case of Bitcoin Pooled Mining Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena & Aquinas.
School: Coolidge School Year: Good Evening and Welcome to Back to School Night. As you may know I am new to the Wyckoff School District and this.
Cryptocurrency Café UVa cs4501 Spring 2015 David Evans Class 11: Mining Pools and Attacks.
Secure Aggregation for Wireless Networks Lingxuan Hu David Evans [lingxuan, Department of Computer.
UNDERSTANDING HOW THE RANKING IS CALCULATED Top-to-Bottom (TTB) Ranking
Relevance of Maths for CS John Barnden School of Computer Science University of Birmingham Intro to Maths for CS 2013/14.
Image from (but I think they stole it from Monsters and Aliens)
Security Update Vincent BRILLAULT HEPiX Spring 2014, Annecy.
Welcome to Mrs. Moore’s Math 6 Class. Block Schedule Monday/Tuesday (Same for Thursday/Friday):  Your child has me one of the two days (either Mon. or.
Next Semester Classes Planning. Previous bioinformatics class  They can give you an idea about the difficulty level and interestingness factor.
Bitcoin and Bitcoin Mining Introduction Lab of Professor Hidetoshi Shimodaira Zehady Abdullah Khan Bachelor 4 th year, Mathematical Science Course, Department.
1 Bitcoin A Digital Currency. Functions of Money.
Fall 2014 MATH 250: Calculus III. Course Topics Review: Parametric Equations and Polar Coordinates Vectors and Three-Dimensional Analytic Geometry.
Antoinette Motley Carpenter KEYBOARDING CRAZE!!. PURPOSE To allow student to practice keying letters Increase student speed while typing Encourage memorization.
4.1 Statistical Measures. When one needs to compare individual values to others in a data set, the following statistical measures are used: Per Capita.
Chapter 15 – Analysis of Variance Math 22 Introductory Statistics.
MATH TEST PREPARATION TIPS MATH SKILLS STUDY TIPS For additional study information go to:
Mehmud Abliz, Taieb Znati, ACSAC (Dec., 2009). Outline Introduction Desired properties Basic scheme Improvements to the basic scheme Analysis Related.
Class 15: Scripting Transactions Cryptocurrency Cabal cs4501 Fall 2015 David Evans and Samee Zahur University of Virginia.
David Evans CS150: Computer Science University of Virginia Computer Science Class 38: Googling.
Class 20: Hidden Services, Zero Knowledge Cryptocurrency Cabal cs4501 Fall 2015 David Evans and Samee Zahur University of Virginia.
The Normal Distribution Lecture 20 Section Fri, Oct 7, 2005.
MM07 Statistics Welcome to the Unit 3 Seminar Dr. Bob.
ETM 607 – Putting It All Together Review for MidTerm II Apply Lessons Learned in a Team Lab - Input Modeling - Absolute Output Analysis - Relative Output.
Subverting Bitcoin David Evans and Samee Zahur. Mining Why do we need miners?
Bitcoin Tech Talk Zehady Abdullah Khan (Andy) Graduate Assistant, Computer Science Department, Purdue University.
Section #9: Bitcoins. Digital currency Unique string of bits Use cryptography for security and privacy Not tied to names: hard to trace Finite set of.
Cryptocurrency Café UVa cs4501 Spring 2015 David Evans Class 18.
Forward Until Near Stop when near a wall.
Hash Function comparison for PSAMP purposes: results and suggestions Maurizio Molina,
Current and Power Calculations Practice Math once again!!!
First… What is Cryptocurrency? A Cryptocurrency is a digital currency that is created through mathematical engineering (algorithm). It is designed to.
“Connecting bitcoiners worldwide”
Bitcoin A Basic Tutorial on Decentralized money
Sampling Distributions
Kermit Lowry, John Whatley, Wesley Cooper, and Matthew Eith
Virtual currency? Crypto-currency? Internet Money? Property?
Math 4030 – 10a Tests for Population Mean(s)
Core i7 micro-processor
Dash Mining - for Dummies. Dash, an altcoin, is best known for two main features – ability to send instantly and highest level of privacy provision. It’s.
Chapter 7 Sampling Distributions.
So what is Blockchain anyway?

The Standard Normal Distribution
Data Structures and Analysis (COMP 410)
NEECOM – May 16, 2018 Todd L. Gould, CEO
Chapter 7 Sampling Distributions.
Week 6 Statistics for comparisons
Chapter 7 Sampling Distributions.
Data Structures and Analysis (COMP 410)
Bitcoin Mining CS1951 L Spring February 2019 Maurice Herlihy
Chapter 7 Sampling Distributions.
Chapter 12 Inference for Proportions
Wokshop SAIS 2018 Dr. Meg Murray Kennesaw state university
11.2 Compare & Order Integers
Chapter 7 Sampling Distributions.
Majority is not Enough: Bitcoin Mining is Vulnerable
Bitcoin and Blockchain
Blockchain Mining Games
Presentation transcript:

More Mining David Evans and Samee Zahur CS4501, Fall 2015 University of Virginia

Selfish mining – back with math!

342

State diagram 231 0

[Ittay Eyal and Emin Gün Sirer, 2013]

State diagram Blocks won = number of forward advances

Expected advances 342

342

342

342

342

231 0 Selfish Others

231 0 Selfish Others

Selfish Others Selfish reward = 0.64 blocks/cycleHonest reward = 0.84 blocks/cycle

Mining cooperatively – in pools!

Mining profit Intel Core i5 2600K Quad core Speed: total 17.3 M hashes per second Power: 75 Watts At last night’s difficulty, we would need over 374,000 years.

Distributed computing:

Engaging small miners … again MH/sec 11 GH/sec

blockchain.info/pools

Calculate at:

Pool manager Worker Hey, I found a block! Yay!

Puzzle “shares” Worker Pool manager Lower difficulty: Hash(B 1 ) = 0x dd43… Hash(B 2 ) = 0x a5… Hash(B 3 ) = 0x f270b… Hash(B 4 ) = 0x f3f5b… Purpose of “shares”: Proof of work Measures hash rate

Proportional rewards When block is found: yourShares = shares you submitted since last block totalShares = shares submitted by the pool since last block yourReward = 25 BTC * yourShares/totalShares

Reward variation You get more reward if this block is found is found early. I.e. early shares are worth more in expectation. Exploit by: Send shares only early in search Hop to a different pool if they found a block recently

Expected share reward

Combating pool hopping Ineffective methods: Detect and punish/ban Delaying pool block statistics De-incentivize by changing scoring system: Reward miners who stay longer Make rewards independent of “block found” time

Encouraging small miners … again Can we use “GPU/ASIC resistant” cryptocurrencies?

Password Databases UsernamePassword Jack.Clough12password Betty.Smith8c2odkw Username“Salt”Scrypt(password+salt) Jack.Clough150FE5Btiq…PaR6mPwHBj… Betty.Smitht1Y1B67ulN…QrUaLRqFvc… Insecure Better

Comparison of cryptocurrencies

Logistics No class on Monday, Oct 5 th Next class on Wednesday, Oct 7 th Problemset 2 is out: due Oct 9 th Midterm: Oct 19 th