Multi-Certificate Attacks Against Proof-of-Elapsed-Time And Their Countermeasures

4Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Proof-of-Elapsed-Time (POET) is a blockchain consensus protocol in which each participating node is required to wait for the passage of a specified time duration before it can participate in the block leader election in each round. It relies on trusted execution environments, such as Intel SGX, to ensure its security, and has been implemented in Hyperledger Sawtooth and used in many real-world settings. This paper examines the security issues including fairness guarantees of the Sawtooth's POET design and implementation, and discovers a new category of security attacks against POET, dubbed Multi-Certificate Attacks, which allows a malicious node to unfairly create multiple Certificates in each round of block leader election and select the one that maximizes her probability of winning. We have systematically analyzed the root causes of these attacks and assisted the Sawtooth community to fix several vulnerabilities in the latest version of POET. To further mitigate the identified threats, we propose a new design of POET in this paper, which we call POETA, that can be used to address the remaining vulnerabilities we have discovered. We have implemented POETA and evaluated its security and performance.

Cite

CITATION STYLE

APA

Wang, H., Chen, G., Zhang, Y., & Lin, Z. (2022). Multi-Certificate Attacks Against Proof-of-Elapsed-Time And Their Countermeasures. In 29th Annual Network and Distributed System Security Symposium, NDSS 2022. The Internet Society. https://doi.org/10.14722/ndss.2022.24158

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free