MoneroResearch.info |
Resource type: Proceedings Article DOI: 10.1007/978-3-030-21548-4_17 ID no. (ISBN etc.): 9783030215477 BibTeX citation key: Wijaya2019 View all bibliographic details |
Categories: Monero-focused Keywords: Denial of Service, Monero, Traceability, Transaction pool Creators: Guo, Jang-Jaccard, Liu, Liu, Steinfeld, Wijaya Publisher: Springer Collection: Information Security and Privacy |
Views: 56/2155
|
Attachments | URLs https://acisp19.ca ... /978-3-030-21548-4 |
Abstract |
In a cryptocurrency system, the protocol incorporated in the node application runs without human intervention. Cryptographic techniques are implemented to determine the ownership of the coins; they enable the owners to transfer the ownership of the coins to other users. Consensus protocols are employed to determine the source of the truth of the information contained in the public ledger called blockchain. When the protocol needs to be updated, all nodes need to replace the application with the newest release. We explore an event where an asynchronous protocol update opens a vulnerability in Monero nodes which have not yet updated to the newest software version. We show that a Denial of Service attack can be launched against the nodes running the outdated protocol, where the attack significantly reduces the system{textquoteright} performance. We also show that an attacker, given a sufficient access to cryptocurrency services, is able to utilise the Denial of Service attack to launch a traceability attack.
Added by: Rucknium |
Notes |
Australasian Conference on Information Security and Privacy 2019, ACISP 2019 ; Conference date: 03-07-2019 Through 05-07-2019
Added by: Rucknium |