Three Attacks on Proof-of-Stake Ethereum

Recently, two attacks were presented against Proof-of-Stake (PoS) Ethereum: one where short-range reorganizations of the underlying consensus chain are used to increase individual validators' profits and delay consensus decisions, and one where adversarial network delay is leveraged to stall co...

Full description

Saved in:
Bibliographic Details
Published inarXiv.org
Main Authors Schwarz-Schilling, Caspar, Neu, Joachim, Monnot, Barnabé, Asgaonkar, Aditya, Tas, Ertem Nusret, Tse, David
Format Paper
LanguageEnglish
Published Ithaca Cornell University Library, arXiv.org 19.10.2021
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Recently, two attacks were presented against Proof-of-Stake (PoS) Ethereum: one where short-range reorganizations of the underlying consensus chain are used to increase individual validators' profits and delay consensus decisions, and one where adversarial network delay is leveraged to stall consensus decisions indefinitely. We provide refined variants of these attacks, considerably relaxing the requirements on adversarial stake and network timing, and thus rendering the attacks more severe. Combining techniques from both refined attacks, we obtain a third attack which allows an adversary with vanishingly small fraction of stake and no control over network message propagation (assuming instead probabilistic message propagation) to cause even long-range consensus chain reorganizations. Honest-but-rational or ideologically motivated validators could use this attack to increase their profits or stall the protocol, threatening incentive alignment and security of PoS Ethereum. The attack can also lead to destabilization of consensus from congestion in vote processing.
ISSN:2331-8422