MoneroResearch.info

WIKINDX Resources

Wijaya, D. A., Liu, J. K., Steinfeld, R., & Liu, D. 2019, Risk of asynchronous protocol update: attacks to Monero protocols. Paper presented at Information Security and Privacy. 
Added by: Rucknium (25/02/2022, 18:31)   
Resource type: Proceedings Article
DOI: 10.1007/978-3-030-21548-4_17
ID no. (ISBN etc.): 9783030215477
BibTeX citation key: Wijaya2019
View all bibliographic details
Categories: Monero-focused
Keywords: Denial of Service, Monero, Traceability, Transaction pool
Creators: Guo, Jang-Jaccard, Liu, Liu, Steinfeld, Wijaya
Publisher: Springer
Collection: Information Security and Privacy
Views: 65/2164
Attachments   URLs   https://acisp19.ca ... /978-3-030-21548-4
Abstract
In a cryptocurrency system, the protocol incorporated in the node application runs without human intervention. Cryptographic techniques are implemented to determine the ownership of the coins; they enable the owners to transfer the ownership of the coins to other users. Consensus protocols are employed to determine the source of the truth of the information contained in the public ledger called blockchain. When the protocol needs to be updated, all nodes need to replace the application with the newest release. We explore an event where an asynchronous protocol update opens a vulnerability in Monero nodes which have not yet updated to the newest software version. We show that a Denial of Service attack can be launched against the nodes running the outdated protocol, where the attack significantly reduces the system{textquoteright} performance. We also show that an attacker, given a sufficient access to cryptocurrency services, is able to utilise the Denial of Service attack to launch a traceability attack.
Added by: Rucknium  
Notes
Australasian Conference on Information Security and Privacy 2019, ACISP 2019 ; Conference date: 03-07-2019 Through 05-07-2019
Added by: Rucknium  
WIKINDX 6.10.2 | Total resources: 233 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: APA Enhanced