March 23, 2023, 1:10 a.m. | Diksha Gupta, Jared Saia, Maxwell Young

cs.CR updates on arXiv.org arxiv.org

A Sybil attack occurs when an adversary controls multiple identifiers (IDs)
in a system. Limiting the number of Sybil (bad) IDs to a minority is critical
to the use of well-established tools for tolerating malicious behavior, such as
Byzantine agreement and secure multiparty computation.


A popular technique for enforcing a Sybil minority is resource burning: the
verifiable consumption of a network resource, such as computational power,
bandwidth, or memory. Unfortunately, typical defenses based on resource burning
require non-Sybil (good) IDs …

adversary attack bad bandwidth computation computational controls critical ids malicious malicious behavior memory network popular power secure multiparty computation system tools

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Brand Experience and Development Associate (Libby's Pumpkin)

@ Nestlé | Arlington, VA, US, 22209

Cybersecurity Analyst

@ L&T Technology Services | Milpitas, CA, US

Information Security Analyst

@ Fortinet | Burnaby, BC, Canada