7 research outputs found
Pricing ASICs for Cryptocurrency Mining
Cryptocurrencies that are based on Proof-of-Work often rely on special
purpose hardware (ASICs) to perform mining operations that secure the system.
We argue that ASICs have been mispriced by miners and sellers that only
consider their expected returns, and that in fact mining hardware should be
treated as a bundle of \emph{financial options}, that when exercised, convert
electricity to virtual coins.
We provide a method of pricing ASICs based on this insight, and compare the
prices we derive to actual market prices. Contrary to the widespread belief
that ASICs are worth less if the cryptocurrency is highly volatile, we show the
opposite effect: volatility significantly increases value. Thus, if a coin's
volatility decreases, some miners may leave, affecting security. To prevent
this, we suggest a new reward mechanism.
Finally we construct a portfolio of coins and bonds that provides returns
imitating an ASIC, and evaluate its behavior: historically, realized revenues
of such portfolios have significantly outperformed ASICs, showing that indeed
there is a mispricing of hardware, and offering an alternative investment route
for would-be miners.Comment: 13 pages, 10 figures, 3 table
The Vulnerable Nature of Decentralized Governance in DeFi
Decentralized Finance (DeFi) platforms are often governed by Decentralized
Autonomous Organizations (DAOs) which are implemented via governance protocols.
Governance tokens are distributed to users of the platform, granting them
voting rights in the platform's governance protocol. Many DeFi platforms have
already been subject to attacks resulting in the loss of millions of dollars in
user funds.
In this paper we show that governance tokens are often not used as intended
and may be harmful to the security of DeFi platforms. We show that (1) users
often do not use governance tokens to vote, (2) that voting rates are
negatively correlated to gas prices, (3) voting is very centralized.
We explore vulnerabilities in the design of DeFi platform's governance
protocols and analyze different governance attacks, focusing on the
transferable nature of voting rights via governance tokens. Following the
movement and holdings of governance tokens, we show they are often used to
perform a single action and then sold off. We present evidence of DeFi
platforms using other platforms' governance protocols to promote their own
agenda at the expense of the host platform
Uncle Maker: (Time)Stamping Out The Competition in Ethereum
We present an attack on Ethereum\u27s consensus mechanism which can be used by miners to obtain consistently higher mining rewards compared to the honest protocol. This attack is novel in that it does not entail withholding blocks or any behavior which has a non-zero probability of earning less than mining honestly, in contrast with the existing literature.
This risk-less attack relies instead on manipulating block timestamps, and carefully choosing whether and when to do so. We present this attack as an algorithm, which we then analyze to evaluate the revenue a miner obtains from it, and its effect on a miner\u27s absolute and relative share of the main-chain blocks.
The attack allows an attacker to replace competitors\u27 main-chain blocks after the fact with a block of its own, thus causing the replaced block\u27s miner to lose all transactions fees for the transactions contained within the block, which will be demoted from the main-chain. This block, although ``kicked-out\u27\u27 of the main-chain, will still be eligible to be referred to by other main-chain blocks, thus becoming what is commonly called in Ethereum an uncle.
We proceed by defining multiple variants of this attack, and assessing whether any of these attacks has been performed in the wild. Surprisingly, we find that this is indeed true, making this the first case of a confirmed consensus-level manipulation performed on a major cryptocurrency.
Additionally, we implement a variant of this attack as a patch for geth, Ethereum\u27s most popular client, making it the first consensus-level attack on Ethereum which is implemented as a patch.
Finally, we suggest concrete fixes for Ethereum\u27s protocol and implemented them as a patch for geth which can be adopted quickly and mitigate the attack and its variants
Speculative Denial-of-Service Attacks in Ethereum
The expressiveness of Turing-complete blockchains implies that verifying a transaction\u27s validity requires executing it on the current blockchain state.
Transaction fees are designed to compensate actors for resources expended on transactions, but can only be charged from transactions included in blocks.
In this work, we show that adversaries can craft malicious transactions that decouple the work imposed on blockchain actors from the compensation offered in return.
We introduce three attacks:
(i) ConditionalExhaust, the first conditional Resource Exhaustion Attack (REA) against blockchain actors.
(ii) MemPurge, an attack for evicting transactions from victims\u27 mempools.
(iii) These attack are augmented by GhostTX, the first attack on the reputation system used in Ethereum\u27s Proposer-Builder Separation ecosystem.
We empirically evaluate the attacks on an Ethereum testnet.
The worst-case result we find is that by combining ConditionalExhaust and MemPurge, an adversary can simultaneously burden victims\u27 computational resources and clog their mempools, to the point where victims are unable to include transactions in their blocks.
Thus, victims create empty blocks, thereby hurting the system\u27s liveness.
The expected cost of a one-shot combined attack is $376, but becomes much cheaper if the adversary is a validator.
For other attackers, costs decrease if censorship is prevalent in the network.
ConditionalExhaust and MemPurge are made possible by inherent features of Turing-complete blockchains.
Potential mitigations may result in reducing a ledger\u27s scalability, an undesirable outcome likely harming its competitiveness
Suboptimality in DeFi
The Decentralized Finance (DeFi) ecosystem has proven to be immensely popular in facilitating financial operations such as lending and exchanging assets, with Ethereum-based platforms holding a combined amount of more than 30 billion USD. The public availability of these platforms\u27 code together with real-time data on all user interactions and platform liquidity has given rise to sophisticated automatic tools that recognize profit opportunities on behalf of users and seize them.
In this work, we formalize three core DeFi primitives which together are responsible for a daily volume of over 100 million USD in Ethereum-based platforms alone: (1) lending and borrowing funds, (2) liquidation of insolvent loans, and (3) using flash-swaps to close arbitrage opportunities between cryptocurrency exchanges. The profit which can be made from each primitive is then cast as an optimization problem that can be readily solved.
We use our formalization to analyze several case studies for each primitive, showing that popular platforms and tools which promise to automatically optimize profits for users, actually fall short. In specific instances, the profits can be increased by more than 100%, with highest amount of ``missed\u27\u27 revenue by a single suboptimal action equal to 428.14 ETH, or roughly 517K USD.
Finally, we show that many missed opportunities to make a profit do not go unnoticed by other users. Indeed, suboptimal transactions are sometimes immediately followed by ``trailing\u27\u27 back-running transactions which extract additional profits using similar actions. By analyzing a subset of such events, we uncover that some users who frequently create such trailing transactions are heavily tied to specific miners, meaning that all of their transactions appear only in blocks mined by one miner in particular. As some of the backrun non-optimal transactions are private, we hypothesize that the users who create them are, in fact, miners (or users collaborating with miners) who use inside information known only to them to make a profit, thus gaining an unfair advantage
Greedy Transaction Fee Mechanisms for (Non-)myopic Miners
Decentralized cryptocurrencies are payment systems that rely on aligning the
incentives of users and miners to operate correctly and offer a high quality of
service to users. Recent literature studies the mechanism design problem of the
auction serving as a cryptocurrency's transaction fee mechanism (TFM). We
present a general framework that captures both myopic and non-myopic settings,
as well as different possible strategic models for users. Within this general
framework, when restricted to the myopic case, we show that while the mechanism
that requires a user to "pay-as-bid", and greedily chooses among available
transactions based on their fees, is not dominant strategy incentive-compatible
for users, it has a Bayesian-Nash equilibrium where bids are slightly shaded.
Relaxing this incentive compatibility requirement circumvents the impossibility
results proven by previous works, and allows for an approximately revenue and
welfare optimal, myopic miner incentive-compatible (MMIC), and
off-chain-agreement (OCA)-proof mechanism. We prove these guarantees using
different benchmarks, and show that the pay-as-bid greedy auction is the
revenue optimal Bayesian incentive-compatible, MMIC and 1-OCA-proof mechanism
among a large class of mechanisms. We move beyond the myopic setting explored
in the literature, to one where users offer transaction fees for their
transaction to be accepted, as well as report their urgency level by specifying
the time to live of the transaction, after which it expires. We analyze
pay-as-bid mechanisms in this setting, and show the competitive ratio
guarantees provided by the greedy allocation rule. We then present a
better-performing non-myopic rule, and analyze its competitive ratio. The above
analysis is stated in terms of a cryptocurrency TFM, but applies to other
settings, such as cloud computing and decentralized "gig" economy, as well.Comment: 38 pages, 3 figure