We present eclipse attacks on Ethereum nodes that exploit the peer-to-peer network used for neighbor discovery. Our attacks can be launched using only two hosts, each with a single IP address. Our eclipse attacker monopolizes all of the victim’s incoming and outgoing connections, thus isolating the victim from the rest of its peers in the network. The attacker can then filter the victim’s view of the blockchain, or co-opt the victim’s computing power as part of more sophisticated attacks. We argue that these eclipse-attack vulnerabilities result from Ethereum’s adoption of the Kademlia peer-to-peer protocol, and present countermeasures that both harden the network against eclipse attacks and cause it to behave differently from the tradition...
Large-scale P2P applications (e.g., social networking, online gaming, video streaming) that host mil...
AbstractDistributed Hash Table-based overlays are widely used to support efficient information routi...
Apart from its much-publicised use in crypto-currency, blockchain technology is used in a wide range...
Blockchain security has been drawing a tremendous attention from industry and academic due to its pr...
Peer-to-Peer (P2P) protocols usage is proliferating for a variety of applications including time-and...
Blockchain security is becoming increasingly relevant in today's cyberspace as it extends its influe...
AbstractDue to its distributed nature, the P2P networks are subject to more intricate attacks than c...
Overlay networks are widely used to deploy functionality at edge nodes without changing network rout...
The Peer-to-Peer (P2P) computing model has been applied to many application fields over the last dec...
Peer-to-Peer (P2P) protocols increasingly constitute the foundations for many large-scale applicatio...
International audiencePublic blockchains, like Ethereum, rely on an underlying peer-to-peer (P2P) ne...
Abstract — Overlay networks are widely used to deploy functionality at edge nodes without changing n...
A blockchain system is a distributed ledger that typically maintains ownership of digital assets. It...
Public blockchains, like Ethereum, rely on an underlying peer-to-peer (P2P) network to disseminate t...
Peer-to-Peer (P2P) protocols are susceptible to Localized Eclipse Attacks (LEA), i.e., attacks where...
Large-scale P2P applications (e.g., social networking, online gaming, video streaming) that host mil...
AbstractDistributed Hash Table-based overlays are widely used to support efficient information routi...
Apart from its much-publicised use in crypto-currency, blockchain technology is used in a wide range...
Blockchain security has been drawing a tremendous attention from industry and academic due to its pr...
Peer-to-Peer (P2P) protocols usage is proliferating for a variety of applications including time-and...
Blockchain security is becoming increasingly relevant in today's cyberspace as it extends its influe...
AbstractDue to its distributed nature, the P2P networks are subject to more intricate attacks than c...
Overlay networks are widely used to deploy functionality at edge nodes without changing network rout...
The Peer-to-Peer (P2P) computing model has been applied to many application fields over the last dec...
Peer-to-Peer (P2P) protocols increasingly constitute the foundations for many large-scale applicatio...
International audiencePublic blockchains, like Ethereum, rely on an underlying peer-to-peer (P2P) ne...
Abstract — Overlay networks are widely used to deploy functionality at edge nodes without changing n...
A blockchain system is a distributed ledger that typically maintains ownership of digital assets. It...
Public blockchains, like Ethereum, rely on an underlying peer-to-peer (P2P) network to disseminate t...
Peer-to-Peer (P2P) protocols are susceptible to Localized Eclipse Attacks (LEA), i.e., attacks where...
Large-scale P2P applications (e.g., social networking, online gaming, video streaming) that host mil...
AbstractDistributed Hash Table-based overlays are widely used to support efficient information routi...
Apart from its much-publicised use in crypto-currency, blockchain technology is used in a wide range...