DETER: Denial of Ethereum
Txpool sERvices
Kai Li Yibo Wang Yuzhe Tang
Introduction: Denial of Ethereum Txpool sERvice
2
Introduction: Denial of Ethereum Txpool sERvice
Typical* transaction workflow in Ethereum
* Simplified workflow by discarding block/tx propagation.
3
a.k.a. Mempool
Figures are made with flaticon.com icons.
Introduction: Denial of Ethereum Txpool sERvice
Typical* transaction workflow in Ethereum
Txpool is a critical component in an Ethereum node
* Simplified workflow by discarding block/tx propagation.
4
Introduction: Denial of Ethereum Txpool sERvice
RQ: Whether and how secure is Ethereum under Denial of Txpool Service (DETER)?
5
Introduction: Denial of Ethereum Txpool sERvice
RQ: Whether and how secure is Ethereum under Denial of Txpool Service (DETER)?
Importance: Consequences
6
Introduction: Denial of Ethereum Txpool sERvice
RQ: Whether and how secure is Ethereum under Denial of Txpool Service (DETER)?
Importance: Consequences
7
Related Works: Blockchain DoS
Target blockchain component to attack:
Assumption on attacker capability:
8
Threat Model: Denial of Txpool Service (DETER)
9
Attack Design: Flawed Admission Control in Txpool
10
Design: DETER Attack Template
11
Design: Evicting Pending Tx by Future Tx (DETER-X)
12
Design: Evicting Pending Tx by Future Tx (DETER-X)
13
Design: Evicting Pending Tx by Future Tx (DETER-X)
14
Design: Evicting Pending Tx by Future Tx (DETER-X)
admitting tx3 leads to
15
Design: Evicting Pending Tx by Future Tx (DETER-X)
admitting tx3 leads to
16
Design: Evicting Pending Tx by Invalid Tx (DETER-Z)
17
Evaluation: Attack Success Rates/Costs on Local Nodes
18
Evaluation: Attack Success Rates by Probabilistic Model
19
Evaluation: Real Networks Exploitable under DETER?
Network exploitability can be affected by
We conduct DETER attacks on testnet
We run very lightweight probes on the mainnet
20
Evaluation: Methods for Discovering Nodes
21
Evaluation: Measure Testnet Exploitability
22
Evaluation: Estimate Mainnet Exploitability: Method
affect only the low price txs.
23
Evaluation: Estimate Mainnet Exploitability: Results
24
Mitigation: Proposed Schemes
Baseline mitigation scheme (M0)
More practical mitigation scheme (M1)
25
Mitigation: Evaluation
Implemented both schemes as middleware on Geth clients
Evaluated DETER success rates & miner revenue under normal tx workload.
26
Ethical Consideration
Ethical measurement on mainnet
27
Bug Reporting
28
References
29
30
Q/A
Dr. Yuzhe Tang