P2P Network on Blockchain
Network-level Attacks
Delaying messages
Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun ˇ
CSS'15
Matthew Walck, Ke Wang, Hyong S.Kim (Carnegie Mellon University)
Eclipse Attack
Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg
Attacker controls hundreds of host machines, each with a distinct IP address
... with botnet or Internet Service Provider, etc.
Yuval Marcus, Ethan Heilman, Sharon Goldberg
Attackers need only control two machines, each with only a single IP address
The countermeasure adopted in geth v1.8
Sebastian Henningsen Daniel Teunis Martin Florian (Humboldt University of Berlin)
IEEE S&B'19
False friends attack
Mitigation adopted in geth v1.9
Karl W¨ust, Arthur Gervais (ETH Zurich)
Bugs in block propagation protocol
IEEE S&P'20
https://gyazo.com/4b7c4503a3e3d6112c2e0bfa1ca734df
Routing attack
Ethereum does not suffer from routing attack bacause P2P messages are authenticated
Maria Apostolaki (ETH Zürich), Aviv Zohar (The Hebrew University), Laurent Vanbever (ETH Zürich)
Message Relay
Network Topology
Sergi Delgado-Segura (Universitat AutÚnoma de Barcelona), Surya Bakshi (UIUC), Cristina Pérez-Solà, James Litton, Andrew Pachulski, Andrew Miller, and Bobby Bhattacharjee
Others
Related
Harry C. Li, Allen Clement, Edmund L. Wong, Jeff Napper, Indrajit Roy, Lorenzo Alvisi, Michael Dahlin (The University of Texas at Austin)
First p2p streaming media application in BAR model
Assumption on rational nodes
benefit consists in the ability to play the live stream and the costs are incurred by sending and receiving packets
Mentioned in the Eth2's audit by LeastAuthority