Incentive Attacks in BTC: Short-Term Revenue Changes and Long-Term Efficiencies
- URL: http://arxiv.org/abs/2511.11538v1
- Date: Fri, 14 Nov 2025 18:18:17 GMT
- Title: Incentive Attacks in BTC: Short-Term Revenue Changes and Long-Term Efficiencies
- Authors: Mustafa Doger, Sennur Ulukus,
- Abstract summary: Bitcoin's Difficulty Adjustment Algorithm (DAA) has been a source of vulnerability for incentive attacks such as selfish mining, block withholding and coin hopping strategies.<n>We study the short-term revenue change per hashpower of the adversarial and honest miners for these incentive attacks.<n>For block withholding strategies, it turns out, the honest miners outside the pool profit from the attack, usually even more than the attacker both in the short-term and the long-term.
- Score: 45.776687601070705
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Bitcoin's (BTC) Difficulty Adjustment Algorithm (DAA) has been a source of vulnerability for incentive attacks such as selfish mining, block withholding and coin hopping strategies. In this paper, first, we rigorously study the short-term revenue change per hashpower of the adversarial and honest miners for these incentive attacks. To study the long-term effects, we introduce a new efficiency metric defined as the revenue/cost per hashpower per time for the attacker and the honest miners. Our results indicate that the short-term benefits of intermittent mining strategies are negligible compared to the original selfish mining attack, and in the long-term, selfish mining provides better efficiency. We further demonstrate that a coin hopping strategy between BTC and Bitcoin Cash (BCH) relying on BTC DAA benefits the loyal honest miners of BTC in the same way and to the same extent per unit of computational power as it does the hopper in the short-term. For the long-term, we establish a new boundary between the selfish mining and coin hopping attack, identifying the optimal efficient strategy for each parameter. For block withholding strategies, it turns out, the honest miners outside the pool profit from the attack, usually even more than the attacker both in the short-term and the long-term. Moreover, a power adjusting withholding attacker does not necessarily observe a profit lag in the short-term. It has been long thought that the profit lag of selfish mining is among the main reasons why such an attack has not been observed in practice. We show that such a barrier does not apply to power adjusting attacks and relatively small pools are at an immediate threat.
Related papers
- One Token Embedding Is Enough to Deadlock Your Large Reasoning Model [91.48868589442837]
We present the Deadlock Attack, a resource exhaustion method that hijacks an LRM's generative control flow.<n>Our method achieves a 100% attack success rate across four advanced LRMs.
arXiv Detail & Related papers (2025-10-12T07:42:57Z) - Mining Power Destruction Attacks in the Presence of Petty-Compliant Mining Pools [5.721770755917568]
Bitcoin's security relies on its Proof-of-Work consensus, where miners solve puzzles to propose blocks.<n>The puzzle's difficulty is set by the difficulty adjustment mechanism (DAM), based on the network's available mining power.<n>Attacks that destroy some portion of mining power can exploit the DAM to lower difficulty, making such attacks profitable.
arXiv Detail & Related papers (2025-02-11T09:44:41Z) - When Should Selfish Miners Double-Spend? [45.776687601070705]
Selfish mining literature usually ignores the chance of the attacker to double-spend at no-cost in each attack cycle.<n>In this paper, we give a rigorous analysis of an attack where the goal of the adversary is to double-spend while mining selfishly.<n>We show that, at each attack cycle, if the level of stubbornness is higher than $k$, the adversary gets a free shot at double-spending.
arXiv Detail & Related papers (2025-01-06T18:59:26Z) - Bitcoin under Volatile Block Rewards: How Mempool Statistics Can Influence Bitcoin Mining [7.273897301039592]
As Bitcoin experiences more halving events, the protocol reward converges to zero, making transaction fees the primary source of miner rewards.<n>Previous security analyses of Bitcoin have either considered a fixed block reward model or a highly simplified volatile model.<n>This paper presents a reinforcement learning-based tool to develop mining strategies under a more realistic volatile model.
arXiv Detail & Related papers (2024-11-18T16:29:20Z) - BM-PAW: A Profitable Mining Attack in the PoW-based Blockchain System [8.156709861487697]
We introduce a novel mining strategy, named BM-PAW, which yields superior rewards for both the attacker and the targeted pool.<n>We propose practical countermeasures to mitigate these novel pool attacks.
arXiv Detail & Related papers (2024-11-09T13:59:55Z) - Examining Attacks on Consensus and Incentive Systems in Proof-of-Work Blockchains: A Systematic Literature Review [0.0]
Bitcoin's security relies on a decentralized ledger consisting of a consensus and an incentive mechanism.
As Bitcoin's acceptance grows, it faces increasing threats from attacks targeting these mechanisms.
This paper begins by examining individual attacks executed in isolation and their profitability.
It then explores how combining these attacks with each other or with other malicious and non-malicious strategies can enhance their overall effectiveness and profitability.
arXiv Detail & Related papers (2024-11-01T04:18:42Z) - Transaction Capacity, Security and Latency in Blockchains [45.776687601070705]
We analyze how secure a block is after the block becomes $k$-deep, i.e., security-latency, for Nakamoto consensus.<n>We connect the security-latency analysis to sustainable transaction rate of the queue system.
arXiv Detail & Related papers (2024-02-15T17:43:13Z) - Partial Selfish Mining for More Profits [21.636578888742477]
Mining attacks aim to gain an unfair share of extra rewards in the blockchain mining.
In this paper, we propose a new and feasible Partial Selfish Mining (PSM) attack.
We show that PSM attackers can be more profitable than selfish miners under a certain range of mining power and network conditions.
arXiv Detail & Related papers (2022-07-27T11:58:38Z) - Investigating Top-$k$ White-Box and Transferable Black-box Attack [75.13902066331356]
We show that stronger attack actually transfers better for the general top-$k$ ASR indicated by the interest class rank (ICR) after attack.
We propose a new normalized CE loss that guides the logit to be updated in the direction of implicitly maximizing its rank distance from the ground-truth class.
arXiv Detail & Related papers (2022-03-30T15:02:27Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.