1
Asymmetric Mempool DoS Security:
Formal Definitions & Provable Secure Designs
Wanning Ding Yuzhe Tang Yibo Wang
Presentation at IEEE S&P, May 13, 2025
2
Outline
3
Outline
Transaction Lifecycle
4
Introduction: What is Blockchain?
TX
Client
Propagate
Transaction Lifecycle
5
Introduction: What is Blockchain?
TX
Client
Propagate
Mempool
Validator
TX
TX
Transaction Lifecycle
6
Introduction: What is Blockchain?
Block
TX
TX
Client
Propagate
Mempool
Validator
TX
TX
Mempool - critical subsystem in blockchain
7
Introduction: What is Blockchain?
Block
TX
TX
Client
Propagate
Mempool
Validator
TX
TX
Mempool - critical subsystem in blockchain
8
Introduction: What is Blockchain?
Block
TX
TX
Client
Propagate
Mempool
Validator
TX
TX
9
Introduction: Previous Works
USENIX 24a, 24b
FC 16
ICBC 19
CCS 21
IMC 21
K. Baqer, D. Y. Huang, D. McCoy, and N. Weaver. Stressing out: Bitcoin "stress testing". In FC Workshops, 2016.
M. Saad, L. Njilla, C. A. Kamhoua, J. Kim, D. Nyang, and A. Mohaisen. Mempool optimization for defending against DDoS attacks in PoW-based blockchain systems. In IEEE ICBC, 2019.
K. Li, Y. Wang, and Y. Tang. DETER: Denial of Ethereum txpool services. In ACM CCS, 2021.
K. Li, Y. Tang, J. Chen, Y. Wang, and X. Liu. Toposhot: Uncovering Ethereum’s network topology leveraging replacement transactions. In ACM IMC, 2021.
Y. Wang, Y. Tang, K. Li, W. Ding, and Z. Yang. Understanding Ethereum mempool security under asymmetric DoS by symbolized stateful fuzzing. In USENIX Security, 2024.
A. Yaish, K. Qin, L. Zhou, A. Zohar, and A. Gervais. Speculative denial-of-service attacks in Ethereum. In USENIX Security, 2024.
Arms race on mempool attacks:
How to end this arms race?
10
Introduction: Previous Works
USENIX 24a, 24b
FC 16
ICBC 19
CCS 21
IMC 21
K. Baqer, D. Y. Huang, D. McCoy, and N. Weaver. Stressing out: Bitcoin "stress testing". In FC Workshops, 2016.
M. Saad, L. Njilla, C. A. Kamhoua, J. Kim, D. Nyang, and A. Mohaisen. Mempool optimization for defending against DDoS attacks in PoW-based blockchain systems. In IEEE ICBC, 2019.
K. Li, Y. Wang, and Y. Tang. DETER: Denial of Ethereum txpool services. In ACM CCS, 2021.
K. Li, Y. Tang, J. Chen, Y. Wang, and X. Liu. Toposhot: Uncovering Ethereum’s network topology leveraging replacement transactions. In ACM IMC, 2021.
Y. Wang, Y. Tang, K. Li, W. Ding, and Z. Yang. Understanding Ethereum mempool security under asymmetric DoS by symbolized stateful fuzzing. In USENIX Security, 2024.
A. Yaish, K. Qin, L. Zhou, A. Zohar, and A. Gervais. Speculative denial-of-service attacks in Ethereum. In USENIX Security, 2024.
Arms race on mempool attacks:
How to end this arms race? Provable defense.
11
Outline
12
Eviction Attack: A benign tx is removed due to adversarial tx.
Security Definition: Attacks
Mempool
Benign tx0
Validator
Sender
tx0
13
Eviction Attack: A benign tx is removed due to adversarial tx.
Security Definition: Attacks
Mempool
Validator
Sender
Adversarial
tx1
Attacker
tx0
14
Eviction Attack: A benign tx is removed due to adversarial tx.
Security Definition: Attacks
Mempool
Validator
Sender
tx1
Attacker
tx0
15
tx1
tx2
S1 |
S12 |
Security Definition: An Eviction Attack (of Two Tx)
S: tx0 |
16
tx1
tx2
S1 |
S12 |
Security Definition: An Eviction Attack (of Two Tx)
S: tx0 |
17
tx1
tx2
tx1
tx2
S1 |
S12 |
S2 |
S21 |
Security Definition: All Eviction Attacks (of Two Tx)
S: tx0 |
18
tx1
tx2
tx1
tx2
S1 |
S12 |
S2 |
S21 |
Security Definition: Mitigating All Eviction Attacks (of Two Tx)
∀ S’ ∈ {S12, S21}, fees(S’) ≥ g(S)
Lower-bound tx fees in reachable mempool states
S: tx0 |
19
tx1
tx2
tx1
tx2
S1 |
S12 |
S2 |
S21 |
∀ S’ ∈ {S12, S21}, 21000*price(S’) ≥ g(S)
Security Definition: Mitigating All Eviction Attacks (of Two Tx)
S |
20
Outline
21
Secure Design: Admit Tx
tx1 |
tx2 |
tx3
22
Secure Design: Admit Tx
tx1 |
tx2 |
tx3
23
Secure Design: Admit Tx by Price Only (PO)
tx1 |
tx2 |
tx3
tx3 |
tx2 |
∑price: 101
10
24
Secure Design: Admit Tx by Price + Dependency (AP)
tx1 |
tx2 |
tx3
25
Secure Design: Admit Tx by Price + Dependency (AP)
tx1 |
tx2 |
tx3
tx1 |
tx3 |
∑score: 2
11
26
tx1 |
tx2 |
tx3
tx4
tx3
tx3 |
tx4 |
tx1 |
tx4 |
tx4
tx3 |
tx4 |
tx1 |
tx3 |
∑score: 2
30
21
11
30
∑price: 30
Secure Design: Admit Tx by Price + Dependency (AP)
27
Outline
28
Evaluation: Security & Revenue Preservation
Security of AP: Validator revenue not decreased under attacks.
Utility preservation of AP: No change of revenue under normal txs.
Insecurity of Geth: Revenue decreases to 0 ETH under attacks.
Implement AP:
Experiments:
29
Conclusion