We outline two dishonest strategies that can be cheaply executed on the Ethereum 2.0 beacon chain, even by validators holding less than one-third of the total stake: malicious chain reorganizations ("reorgs") and finality delays. In a malicious reorg, an attacker withholds their blocks and attestations before releasing them at an opportune time in order to force a chain reorganization, which they can take advantage of by double-spending or front-running transactions. To execute a finality delay an attacker uses delayed block releases and withholding of attestations to increase the mean and variance of the time it takes blocks to become finalized. This impacts the efficiency and predictability of the system. We provide a probabilistic and cost analysis for each of these attacks, considering a validator with 30% of the total stake.
翻译:我们概述了在Etheum2.0信标链上可以廉价执行的两种不诚实战略,即使是持有不到总股份三分之一的验证人也可以这样做:恶意链条重组(“reorgs ” ) 和终结性延迟。 在恶意重生中,攻击者在及时释放他们之前扣留他们的区块和证明,以便迫使他们进行链条重组,他们可以通过双重支出或前期交易加以利用。为了执行终结性拖延,攻击者使用延迟的区块释放和不提供证明来增加最终确定该区块所需的时间的平均值和差异。这影响了系统的效率和可预测性。考虑到占总股份30%的验证人,我们对这些袭击的每一次都进行了概率和成本分析。