Latest news about Bitcoin and all cryptocurrencies. Your daily crypto news habit.
On Jan. 22, a team of students from the University of Illinois at Urbana Champaign (UIUC) released a unique study concerning the longevity of certain proof of stake (PoS) networks. According to the research, more than 26 PoS blockchains could suffer from vulnerabilities called âFake Stakeâ attacks.
Also read:Â Satoshiâs Bitcoin Whitepaper Is Now Available in Arabic and Hindi
Study Shows Proof of Stake Attacks That Are âSimple in Principleâ
A team of researchers called Decentralized Systems Lab from UIUC has just released a study that identifies significant weaknesses in certain PoS networks. Sanket Kanjalkar, Yunqi Li, Yuguang Chen, Joseph Kuo, and Andrew Miller shared research which explains the issues threatening PoS cryptocurrencies. According to the students, an attacker with very little or no stake at all can wreak havoc on these types of networks. The researchers say one method of attack essentially causes a âvictim node to crash by filling up its disk or RAM with bogus data.â The students are convinced all PoS currencies based on the UTXO of Bitcoin and the longest chain model are vulnerable to these âFake Stakeâ attacks.
âGiven the amount of cross-pollination of ideas and code reuse across cryptocurrencies, we anticipate more vulnerabilities like this in the future â We found there was little uniformity in the security process among these codebases,â explains the latest study on PoS networks. âFor example, there was no dedicated security contact for most of them.â
The students highlight five cryptocurrencies: Emercoin, Particl, Qtum, Htmlcoin, and Navcoin which could all theoretically suffer from a vulnerability called âI Canât Believe itâs not Stake.â Because these coins have adopted Bitcoinâs block propagation method, a bogus message attack can overload a victim nodeâs RAM. The attacker doesnât even need any stake to accomplish this method of attack. However, the studentâs paper notes that RAM version attacks are still âparticularly trivial.â The vulnerability was introduced to these networks when they merged Bitcoinâs âheader-firstâ feature into the PoSv3 codebase. Another issue with PoS is a weakness called the âSpent Stakeâ attack, which can allow malicious actors to abuse the validation of apparent stake with a method called âstake amplification.â
âTo carry out the attack starting from a small amount of stake, the attacker must amplify their amount of apparent stake,â the researchers explain. âFor example, even with 0.01% stake in the system, the attacker only needs 5,000 transactions to mine blocks with 50% apparent stake power.â
The authors continue:
After the attacker has collected a large amount of apparent stake, he then proceeds to mine PoS blocks at a past time using the freshly collected apparent stake outputs. Finally, the attacker fills the disk of the victim peer with invalid blocks.
Proof of Stake Design Not Fully Understood by Developers Creating PoSv3 Networks
The UIUC researchers also note that they decided to responsibly disclose these issues to 15 teams that were most likely to be attacked out of all the PoS coins in the top 200 market capitalizations. The team explained that five teams had acknowledged the attacks, three teams started investigating the vulnerabilities, and three teams rebutted the issues. Four development teams did not respond at all to the responsible disclosure and the researchers also remarked that some programmers were very difficult to contact.
The report concludes that because âFake Stakeâ attacks are so easy, they fundamentally undermine the development teamâs design. âSome ideas that make sense in proof-of-work (PoW) do not translate over securely to proof-of-stake â Given the high degree of code sharing from Bitcoin Core as âupstreamâ among PoSv3 cryptocurrencies, we think this deserves even more scrutiny,â the paper concedes. When they investigated the feebleness tethered to PoS networks they found several projects that were âworks-in-progressâ and were in the midst of attempting to create mitigations for these known weaknesses.
âThis suggests an awareness among PoS developers that the trade-offs and requirements in this design space are not yet fully understood,â the paper concludes.
What do you think about PoS coins that are vulnerable to âFake Stakeâ attacks? Let us know what you think about this subject in the comments section below.
Image credits: Shutterstock, Pixabay, and the study ââFake Stakeâ attacks on chain-based Proof-of-Stake cryptocurrencies.â
Bitcoin is cool, and you know everyone wants in â even the ones who say they donât. Show the world how cutting-edge you are with a bitcoin T-shirt, hoodie, bag, key-ring, even a Trezor hardware wallet. Shipping all over the world, quality merchandise and, of course, a payment system that makes people say âwow!âÂ
Disclaimer
The views and opinions expressed in this article are solely those of the authors and do not reflect the views of Bitcoin Insider. Every investment and trading move involves risk - this is especially true for cryptocurrencies given their volatility. We strongly advise our readers to conduct their own research when making a decision.