Analysis of security in blockchain: Case study in 51%-attack detecting

Congcong Ye, Guoqiang Li, Hongming Cai, Yonggen Gu, Akira Fukuda

研究成果: 著書/レポートタイプへの貢献会議での発言

6 引用 (Scopus)

抄録

Recently, the global outbreak of a blackmail virus WannaCry, makes the blockchain a hot topic. The security of blockchain is always the focus of people's attention, and it is also the main reason why the blockchain has not been widely used all over the world. Many researches use mathematical derivation method to analyse the 51%-Attacks influence of blockchain, which is very stiff and difficult to understand. In this paper, we propose a method to simulate blockchain's process and discover the rule between attacking method, attacking power and security of blockchain. We take 51%-Attacks as an example and use Java to simulate the running process. By adjusting the value of attacking power, we can get most states of blockchain and analyze the probability that honest state becomes attacking state. We use various forms to analyze and show the experimental result, which verify our method is correct and feasible. This method can also be implemented as a middleware software of blockchain to detect the security of blockchain.

元の言語英語
ホスト出版物のタイトルProceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018
出版者Institute of Electrical and Electronics Engineers Inc.
ページ15-24
ページ数10
ISBN(電子版)9781538692660
DOI
出版物ステータス出版済み - 12 5 2018
イベント5th International Conference on Dependable Systems and Their Applications, DSA 2018 - Dalian, 中国
継続期間: 9 22 20189 23 2018

出版物シリーズ

名前Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018

その他

その他5th International Conference on Dependable Systems and Their Applications, DSA 2018
中国
Dalian
期間9/22/189/23/18

Fingerprint

Middleware
Viruses
attack
viruses
derivation
adjusting
computer programs

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Safety, Risk, Reliability and Quality
  • Instrumentation

これを引用

Ye, C., Li, G., Cai, H., Gu, Y., & Fukuda, A. (2018). Analysis of security in blockchain: Case study in 51%-attack detecting. : Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018 (pp. 15-24). [8563187] (Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/DSA.2018.00015

Analysis of security in blockchain : Case study in 51%-attack detecting. / Ye, Congcong; Li, Guoqiang; Cai, Hongming; Gu, Yonggen; Fukuda, Akira.

Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018. Institute of Electrical and Electronics Engineers Inc., 2018. p. 15-24 8563187 (Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018).

研究成果: 著書/レポートタイプへの貢献会議での発言

Ye, C, Li, G, Cai, H, Gu, Y & Fukuda, A 2018, Analysis of security in blockchain: Case study in 51%-attack detecting. : Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018., 8563187, Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018, Institute of Electrical and Electronics Engineers Inc., pp. 15-24, 5th International Conference on Dependable Systems and Their Applications, DSA 2018, Dalian, 中国, 9/22/18. https://doi.org/10.1109/DSA.2018.00015
Ye C, Li G, Cai H, Gu Y, Fukuda A. Analysis of security in blockchain: Case study in 51%-attack detecting. : Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018. Institute of Electrical and Electronics Engineers Inc. 2018. p. 15-24. 8563187. (Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018). https://doi.org/10.1109/DSA.2018.00015
Ye, Congcong ; Li, Guoqiang ; Cai, Hongming ; Gu, Yonggen ; Fukuda, Akira. / Analysis of security in blockchain : Case study in 51%-attack detecting. Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018. Institute of Electrical and Electronics Engineers Inc., 2018. pp. 15-24 (Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018).
@inproceedings{543e9f81d92b4e34baec40273c37d33b,
title = "Analysis of security in blockchain: Case study in 51{\%}-attack detecting",
abstract = "Recently, the global outbreak of a blackmail virus WannaCry, makes the blockchain a hot topic. The security of blockchain is always the focus of people's attention, and it is also the main reason why the blockchain has not been widely used all over the world. Many researches use mathematical derivation method to analyse the 51{\%}-Attacks influence of blockchain, which is very stiff and difficult to understand. In this paper, we propose a method to simulate blockchain's process and discover the rule between attacking method, attacking power and security of blockchain. We take 51{\%}-Attacks as an example and use Java to simulate the running process. By adjusting the value of attacking power, we can get most states of blockchain and analyze the probability that honest state becomes attacking state. We use various forms to analyze and show the experimental result, which verify our method is correct and feasible. This method can also be implemented as a middleware software of blockchain to detect the security of blockchain.",
author = "Congcong Ye and Guoqiang Li and Hongming Cai and Yonggen Gu and Akira Fukuda",
year = "2018",
month = "12",
day = "5",
doi = "10.1109/DSA.2018.00015",
language = "English",
series = "Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "15--24",
booktitle = "Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018",
address = "United States",

}

TY - GEN

T1 - Analysis of security in blockchain

T2 - Case study in 51%-attack detecting

AU - Ye, Congcong

AU - Li, Guoqiang

AU - Cai, Hongming

AU - Gu, Yonggen

AU - Fukuda, Akira

PY - 2018/12/5

Y1 - 2018/12/5

N2 - Recently, the global outbreak of a blackmail virus WannaCry, makes the blockchain a hot topic. The security of blockchain is always the focus of people's attention, and it is also the main reason why the blockchain has not been widely used all over the world. Many researches use mathematical derivation method to analyse the 51%-Attacks influence of blockchain, which is very stiff and difficult to understand. In this paper, we propose a method to simulate blockchain's process and discover the rule between attacking method, attacking power and security of blockchain. We take 51%-Attacks as an example and use Java to simulate the running process. By adjusting the value of attacking power, we can get most states of blockchain and analyze the probability that honest state becomes attacking state. We use various forms to analyze and show the experimental result, which verify our method is correct and feasible. This method can also be implemented as a middleware software of blockchain to detect the security of blockchain.

AB - Recently, the global outbreak of a blackmail virus WannaCry, makes the blockchain a hot topic. The security of blockchain is always the focus of people's attention, and it is also the main reason why the blockchain has not been widely used all over the world. Many researches use mathematical derivation method to analyse the 51%-Attacks influence of blockchain, which is very stiff and difficult to understand. In this paper, we propose a method to simulate blockchain's process and discover the rule between attacking method, attacking power and security of blockchain. We take 51%-Attacks as an example and use Java to simulate the running process. By adjusting the value of attacking power, we can get most states of blockchain and analyze the probability that honest state becomes attacking state. We use various forms to analyze and show the experimental result, which verify our method is correct and feasible. This method can also be implemented as a middleware software of blockchain to detect the security of blockchain.

UR - http://www.scopus.com/inward/record.url?scp=85060706293&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85060706293&partnerID=8YFLogxK

U2 - 10.1109/DSA.2018.00015

DO - 10.1109/DSA.2018.00015

M3 - Conference contribution

AN - SCOPUS:85060706293

T3 - Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018

SP - 15

EP - 24

BT - Proceedings - 2018 5th International Conference on Dependable Systems and Their Applications, DSA 2018

PB - Institute of Electrical and Electronics Engineers Inc.

ER -