Advertisement

Exploiting Transaction Accumulation and Double Spends for Topology Inference in Bitcoin

  • Matthias GrundmannEmail author
  • Till Neudecker
  • Hannes Hartenstein
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10958)

Abstract

Bitcoin relies on a peer-to-peer network for communication between participants. Knowledge of the network topology is of scientific interest but can also facilitate attacks on the users’ anonymity and the system’s availability. We present two approaches for inferring the network topology and evaluate them in simulations and in real-world experiments in the Bitcoin testnet. The first approach exploits the accumulation of multiple transactions before their announcement to other peers. Despite the general feasibility of the approach, simulation and experimental results indicate a low inference quality. The second approach exploits the fact that double spending transactions are dropped by clients. Experimental results show that inferring the neighbors of a specific peer is possible with a precision of 71% and a recall of 87% at low cost.

Notes

Acknowledgements

This work was supported by the German Federal Ministry of Education and Research (BMBF) within the project KASTEL_IoE in the Competence Center for Applied Security Technology (KASTEL). The authors would like to thank the anonymous reviewers for their valuable comments and suggestions.

References

  1. 1.
    Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in Bitcoin P2P network. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM (2014)Google Scholar
  2. 2.
    Decker, C., Wattenhofer, R.: Information propagation in the Bitcoin network. In: 2013 IEEE Thirteenth International Conference on Peer-to-Peer Computing (P2P), pp. 1–10. IEEE (2013)Google Scholar
  3. 3.
    Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436–454. Springer, Heidelberg (2014).  https://doi.org/10.1007/978-3-662-45472-5_28CrossRefGoogle Scholar
  4. 4.
    Fanti, G., Viswanath, P.: Anonymity properties of the Bitcoin P2P network. arXiv preprint arXiv:1703.08761 (2017)
  5. 5.
    Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on Bitcoin’s peer-to-peer network. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 129–144 (2015)Google Scholar
  6. 6.
    Karame, G.O., Androulaki, E., Capkun, S.: Double-spending fast payments in Bitcoin. In: Proceedings of the 2012 ACM conference on Computer and communications security, pp. 906–917. ACM (2012)Google Scholar
  7. 7.
    Koshy, P., Koshy, D., McDaniel, P.: An analysis of anonymity in bitcoin using P2P network traffic. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 469–485. Springer, Heidelberg (2014).  https://doi.org/10.1007/978-3-662-45472-5_30CrossRefGoogle Scholar
  8. 8.
    Miller, A., et al.: Discovering Bitcoin’s public topology and influential nodes (2015)Google Scholar
  9. 9.
    Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)Google Scholar
  10. 10.
    Nayak, K., Kumar, S., Miller, A., Shi, E.: Stubborn mining: generalizing selfish mining and combining with an eclipse attack. In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 305–320. IEEE (2016)Google Scholar
  11. 11.
    Neudecker, T., Andelfinger, P., Hartenstein, H.: Timing analysis for inferring the topology of the Bitcoin peer-to-peer network. In: 2016 International IEEE Conference on Advanced and Trusted Computing (ATC), pp. 358–367, July 2016Google Scholar

Copyright information

© International Financial Cryptography Association 2019

Authors and Affiliations

  • Matthias Grundmann
    • 1
    Email author
  • Till Neudecker
    • 1
  • Hannes Hartenstein
    • 1
  1. 1.Institute of TelematicsKarlsruhe Institute of TechnologyKarlsruheGermany

Personalised recommendations