all InfoSec news
Leveraging the Verifier's Dilemma to Double Spend in Bitcoin. (arXiv:2210.14072v1 [cs.CR])
Oct. 26, 2022, 1:24 a.m. | Tong Cao, Jérémie Decouchant, Jiangshan Yu
cs.CR updates on arXiv.org arxiv.org
We describe and analyze perishing mining, a novel block-withholding mining
strategy that lures profit-driven miners away from doing useful work on the
public chain by releasing block headers from a privately maintained chain. We
then introduce the dual private chain (DPC) attack, where an adversary that
aims at double spending increases its success rate by intermittently dedicating
part of its hash power to perishing mining. We detail the DPC attack's Markov
decision process, evaluate its double spending success rate using …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Information Systems Security Officer (ISSO), Junior
@ Dark Wolf Solutions | Remote / Dark Wolf Locations
Cloud Security Engineer
@ ManTech | REMT - Remote Worker Location
SAP Security & GRC Consultant
@ NTT DATA | HYDERABAD, TG, IN
Security Engineer 2 - Adversary Simulation Operations
@ Datadog | New York City, USA