论文标题

闪电网络上的时间稀释攻击

Time-Dilation Attacks on the Lightning Network

论文作者

Riard, Antoine, Naumenko, Gleb

论文摘要

Lightning Network(LN)是一个广泛使用的支付渠道网络,可更快,更便宜的比特币交易。在本文中,我们概述了攻击者可以从诚实的LN用户那里窃取资金的三种方式。攻击需要扩张受害者通过从网络中黯然失色(隔离)受害者并延迟交付的时间来意识到新障碍的时间。虽然我们的重点是LN,但时间稀释攻击可能与依赖及时反应的任何第二层协议有关。 根据我们的测量值,目前可以通过将节点黯然失色短短2个小时来窃取总渠道容量。由于当前信任最小的比特币光线客户端可以连接到非常有限的随机节点,因此仅运行500个Sybil节点,允许攻击者将47 \%的新部署的轻度客户端蚀(因此,攻击)。至于运行完整节点的受害者,由于大型枢纽或服务提供商通常使用它们,因此攻击者可以通过窃取所有可用的流动性来证明更高的日食攻击成本是合理的。 此外,时间稀释攻击既不需要访问哈希拉特,也不需要从受害者那里购买。因此,这类攻击是通过日食攻击窃取资金比以前预期的双重支出更实用的方法。 我们认为,仅基于慢速到达的简单检测技术是无效的,而实施更复杂的检测并不是微不足道的。我们建议,反消灭/反隔离措施的结合对于缓解时间浸泡攻击至关重要。

Lightning Network (LN) is a widely-used network of payment channels enabling faster and cheaper Bitcoin transactions. In this paper, we outline three ways an attacker can steal funds from honest LN users. The attacks require dilating the time for victims to become aware of new blocks by eclipsing (isolating) victims from the network and delaying block delivery. While our focus is on the LN, time-dilation attacks may be relevant to any second-layer protocol that relies on a timely reaction. According to our measurements, it is currently possible to steal the total channel capacity by keeping a node eclipsed for as little as 2 hours. Since trust-minimized Bitcoin light clients currently connect to a very limited number of random nodes, running just 500 Sybil nodes allows an attacker to Eclipse 47\% of newly deployed light clients (and hence prime them for an attack). As for the victims running a full node, since they are often used by large hubs or service providers, an attacker may justify the higher Eclipse attack cost by stealing all their available liquidity. In addition, time-dilation attacks neither require access to hashrate nor purchasing from a victim. Thus, this class of attacks is a more practical way of stealing funds via Eclipse attacks than previously anticipated double-spending. We argue that simple detection techniques based on the slow block arrival alone are not effective, and implementing more sophisticated detection is not trivial. We suggest that a combination of anti-Eclipse/anti-Sybil measures are crucial for mitigating time-dilation attacks.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源