Bitcoin is a cryptographic currency that has been in continuous operation over the last 3 years. It currently enjoys an exchange rate of $4.80 (as of April.

Slides:



Advertisements
Similar presentations
Bitcoin: A New Internet Currency Stephen Clayton Senior Economic Education Specialist Federal Reserve Bank of Dallas The opinions expressed are solely.
Advertisements

COMS 486 Iowa State University Introduction to Bitcoin A P2P Electronic Cash System.
CS425/CSE424/ECE428 — Distributed Systems — Fall Nikita Borisov - UIUC1.
Bitcoin. What is Bitcoin? A P2P network for electronic payments Benefits: – Low fees – No middlemen – No central authority – Can be anonymous – Each payment.
File Management Chapter 12. File Management A file is a named entity used to save results from a program or provide data to a program. Access control.
Bitcoin Double Spending Attack Karame, Androulaki & Capkun Presented by Subhro Kar CSCE 715, Fall 2013.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
BITCOIN An introduction to a decentralised and anonymous currency. By Andy Brodie.
Maintaining and Updating Windows Server 2008
Team CMD Distributed Systems Team Report 2 1/17/07 C:\>members Corey Andalora Mike Adams Darren Stanley.
The world’s first decentralized digital currency Meni Rosenfeld Bitcoil 29/11/2012Written by Meni Rosenfeld1.
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
14 Publishing a Web Site Section 14.1 Identify the technical needs of a Web server Evaluate Web hosts Compare and contrast internal and external Web hosting.
Bitcoin (what, why and how?)
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Bitcoins and the Digital Economy Presented By: Matt Blackman.
1 Bitcoin A Digital Currency. Functions of Money.
1 DNSSEC Transforming a protocol bug into an admin tool Lutz Donnerhacke db089309: 1c1c 6311 ef09 d819 e029 65be bfb6 c9cb.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Bitcoin Jeff Chase Duke University.
Deanonimization methods in Bitcoin Network Marko Marić.
SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains Loi Luu, Viswesh Narayanan, Kunal Baweja, Chaodong Zheng, Seth Gilbert, Prateek.
Bit Coins And Anonymity Karan Mirani. Do bitcoins provide complete anonymity ? If yes, then how is it achieved? If no, then are there any methods which.
Bitcoin Tech Talk Zehady Abdullah Khan (Andy) Graduate Assistant, Computer Science Department, Purdue University.
Section #9: Bitcoins. Digital currency Unique string of bits Use cryptography for security and privacy Not tied to names: hard to trace Finite set of.
Fall 2006CS 395: Computer Security1 Key Management.
Cryptocurrencies: challenges and caveats Khaled Baqer Cambridge University.
How Bitcoin Achieves Decentralization
BITCOIN IS LEGAL IN THE WHOLE WORLD. What are the concerns about bitcoin? Government agencies are increasingly worried about the implications of bitcoin,
© 2016 consensys.net Intro to The Blockchain. © 2016 consensys.net.
Bitcoin Bitcoin is a cryptocurrency. The platform that hosts Bitcoin is a p2p system. Bitcoin can be abstracted as a digital file that records the account.
Block Chain 101 May 2017.
Motivation ✓ ✘ ? Bitcoin/Ideal Credit Card Works on Internet
CSE 4095 Lecture 22 – BlockChain Slides adapted from Claudio Orlandi.
Passion for building stronger business
Cryptocurrencies by.
Virtual currency? Crypto-currency? Internet Money? Property?
Bitcoin - a distributed virtual currency system
The Changing Face of Digital Identity
Peer-to-peer networking
Bitcoin Created By: CoinSecure.in.
Blockchains and Cryptocurrencies: What Financial Planners Need to Know
Blockchain beyond cryptocurrencies
BY GAWARE S.R. DEPT.OF COMP.SCI
Blockchain Adrian Zaragoza.
Deanonymization of Clients in Bitcoin P2P Network
Zcash Mining – A Guide For Beginners. Zcash (also known as ZEC and seventeenth most valued cryptocurrency with market capitalization of $500 million)
{ BLOCKCHAIN Technology. BSEtecBSEtec is a digital solution provider company which offers the best service with the implement of the latest technologies.
Data Structures and Analysis (COMP 410)
Life skill presentation
Nakamoto Consensus Marco Canini
Focus Group 3: Blockchain and digitalisation
Bitcoin and Cryptocurrency
BLOCKCHAIN BASICS & LEGAL ISSUES
Bitcoin: A New Internet Currency
Blockchains (2) slides have been taken from:
Distributed Ledger Technology (DLT) and Blockchain
GRIF DEX is an international decentralized exchange, a trading platform where you can buy and sell coins, tokens and fiat currency. An exchange will conform.
Kai Bu 04 Blockchain Kai Bu
Presentation On Bit-Coins.
Faculty Seminar Series Blockchain Technology
GAYATRI INSTITUTE OF COMPUTER AND MANAGEMENT HINJILICUT (GANJAM)
Explore Txs, block, blockchain in Bitcoin
Cryptocurrency and Blockchain Technology
Presentation transcript:

Bitcoin is a cryptographic currency that has been in continuous operation over the last 3 years. It currently enjoys an exchange rate of $4.80 (as of April 1 st, 2012), with a market capitalization of roughly $40 million. Payments in Bitcoin are made pseudo- anonymously, making Bitcoin an attractive alternative to other forms of electronic payment. Academics have shown interest in Bitcoin, particularly in de-anonymizing the user base, understanding the incentive structure, and extending the consensus mechanism. The anonymous sale of drugs and weapons has also caused Bitcoin to be scrutinized by law enforcement and members of Congress. Our goal is to study this network in an effort to judge the health of the system and disaggregate anomalous behavior. Understanding Bitcoin Data Mining Bitcoin, a P2P Crypto-Currency Philip Koshy, Diana Koshy, and Patrick McDaniel Data Collection Bitcoin is a decentralized P2P currency that uses a gossip protocol to transmit messages among peers in an overlay network. Transactions (Fig. 1) and blocks (Fig. 2) are the two main data structures in the protocol. Coins are transferred among users within transactions, which are then grouped into blocks that must be accepted by the network. Coin generation is tied to block creation. Creating a block is computationally expensive since it requires solving a cryptographic proof-of-work puzzle. Anytime a node generates a block which goes on to be accepted by the network, it is currently awarded 50 Bitcoins. Not all published blocks will be accepted network-wide. New blocks are linked to older blocks, forming a block chain that is constantly being extended. Because of Bitcoin’s decentralized and distributed nature, multiple participants may generate blocks at the same time. This leads to the distributed consensus problem. We can represent the block chain as a tree structure, with the longest path representing the accepted chain (Fig. 3). A participant choosing to extend an existing path in the block chain indicates a vote towards consensus on that path. The longer the path, the more computation was expended building it. In this way, Bitcoin offers a unique solution to the consensus problem in distributed systems since voting power is directly proportional to computing power. Preliminary Results We have begun studying the data and have noted anomalous behavior. Misconfiguration Errors We have observed malformed messages being relayed across the network. Some messages are incomplete, while others fail to conform to the protocol specification. We have received numerous transactions with malformed scripts. Scripts in the Bitcoin protocol are used to verify identities, specify recipients of coins, as well as indicate conditions under which coins may be claimed. Scripts use a stack-based language similar to assembly. Potential Misuse Blocks that completely ignore valid transactions are being created, relayed, and accepted, often winning consensus over competing blocks. By ignoring valid transactions, the block creator is more quickly able to publish their block. This behavior financially benefits the block creator at the expense of other users. Future work will attempt to group colluding users to determine if there is malicious intent. Consensus Without Contention The branching factor of the block chain is close to 1, which indicates that there is very little contention on the network about which chain is longest. In other words, computing power is not often wasted on chains that will eventually become orphaned. Double-Spending A digital coin is theoretically easy to copy since it is decoupled from physical reality. Despite built-in probabilistic safeguards against double-spending, we have observed a number of attempts. This may be the result of a poorly designed custom client, or that of a malicious participant. We are currently capturing real-time traffic from upwards of 5,000 nodes using a custom-built Bitcoin client leveraging the Linux epoll API. With our client, we are able to request historical data and record real-time broadcasts at scale. Our data-collection software runs efficiently on consumer-grade hardware; we are currently running the software on Ubuntu Server Edition in a single thread, maintaining an in- memory footprint of only 400MB. Data is stored in a MySQL 5.1 database. Fig. 1: A coin owner transfers coins by digitally signing a hash of the previous transaction and the public key of the next owner. This signature is then appended to the end of the coin. Fig. 2: Transactions are placed in blocks, which are linked by hashes. Fig. 3: The block chain is represented as a tree structure.