BM-PAW: A Profitable Mining Attack in the PoW-based Blockchain System

📅 2024-11-09
🏛️ arXiv.org
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work investigates a novel profitable mining attack in Proof-of-Work (PoW) blockchains, identifying and formalizing BM-PAW—a bribery-driven, two-pool collusive attack that strictly dominates the classical PAW attack in profitability. Departing from conventional zero-sum assumptions, we propose the first non-zero-sum game-theoretic model jointly optimizing incentives for both attackers and bribed pools, and rigorously derive the attack success conditions under Nash equilibrium. Methodologically, we integrate game-theoretic modeling, PoW protocol reverse engineering, and pool-level incentive mechanism design. We further introduce a deployable defense framework combining on-chain protocol hardening with off-chain reputation systems. Our core contributions are threefold: (i) uncovering the intrinsic equilibrium structure of collusive bribery attacks; (ii) overcoming theoretical limitations of prior attack models by relaxing zero-sum constraints; and (iii) establishing a new paradigm for systemic security assurance in decentralized mining ecosystems.

Technology Category

Application Category

📝 Abstract
Mining attacks enable an adversary to procure a disproportionately large portion of mining rewards by deviating from honest mining practices within the PoW-based blockchain system. In this paper, we demonstrate that the security vulnerabilities of PoW-based blockchain extend beyond what these mining attacks initially reveal. We introduce a novel mining strategy, named BM-PAW, which yields superior rewards for both the attacker and the targeted pool compared to the state-of-the-art mining attack, PAW. BM-PAW attackers are incentivized to offer appropriate bribe money to other targets, as they comply with the attacker's directives upon receiving payment. We further find the BM-PAW attacker can circumvent the miner's dilemma through equilibrium analysis in a two-pool BM-PAW game scenario, wherein the outcome is determined by the attacker's mining power. We finally propose practical countermeasures to mitigate these novel pool attacks.
Problem

Research questions and friction points this paper is trying to address.

Novel mining attack BM-PAW exploits PoW vulnerabilities
BM-PAW offers higher rewards than existing attacks
Equilibrium analysis reveals attacker's mining power impact
Innovation

Methods, ideas, or system contributions that make the work stand out.

Introduces BM-PAW mining strategy for higher rewards
Incentivizes bribes to control other miners
Circumvents miner's dilemma via equilibrium analysis
🔎 Similar Papers
No similar papers found.
J
Junjie Hu
Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
X
Xunzhi Chen
Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
Huan Yan
Huan Yan
Tsinghua University
Spatio-temporal data miningrecommender system
N
Na Ruan
Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China