Blockchain Censorship

Permissionless blockchains promise to be resilient against censorship by a single entity. This suggests that deterministic rules, and not third-party actors, are responsible for deciding if a transaction is appended to the blockchain or not. In 2022, the U.S. Office of Foreign Assets Control (OFAC) sanctioned a Bitcoin mixer and an Ethereum application, putting the neutrality of permissionless blockchains to the test. In this paper, we formalize quantify and analyze the security impact of blockchain censorship. We start by defining censorship, followed by a quantitative assessment of current censorship practices. We find that 46% of Ethereum blocks were made by censoring actors that intend to comply with OFAC sanctions, indicating the significant impact of OFAC sanctions on the neutrality of public blockchains. We further uncover that censorship not only impacts neutrality, but also security. We show how after Ethereum's move to Proof-of-Stake (PoS) and adoption of Proposer-Builder Separation (PBS) the inclusion of censored transactions was delayed by an average of 85%. Inclusion delays compromise a transaction's security by, e.g., strengthening a sandwich adversary. Finally we prove a fundamental limitation of PoS and Proof-of-Work (PoW) protocols against censorship resilience.

[1]  Sri Aravinda Krishnan Thyagarajan,et al.  Foundations of Coin Mixing Services , 2022, IACR Cryptol. ePrint Arch..

[2]  Kshitij Kulkarni,et al.  Improving Proof of Stake Economic Security via MEV Redistribution , 2022, DeFi@CCS.

[3]  A. Kiayias,et al.  SoK: A Stratified Approach to Blockchain Decentralization , 2022, ArXiv.

[4]  Yotam gafni,et al.  Greedy Transaction Fee Mechanisms for (Non-)myopic Miners , 2022, ArXiv.

[5]  Qiang Tang,et al.  Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency , 2022, CCS.

[6]  Arthur Gervais,et al.  SoK: Decentralized Finance (DeFi) Attacks , 2022, 2023 IEEE Symposium on Security and Privacy (SP).

[7]  Ertem Nusret Tas,et al.  Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities , 2022, 2023 IEEE Symposium on Security and Privacy (SP).

[8]  Aviv Zohar,et al.  Blockchain Stretching & Squeezing: Manipulating Time for Your Best Interest , 2022, EC.

[9]  Mike Just,et al.  The Unique Dressing of Transactions: Wasabi CoinJoin Transaction Detection , 2022, EICC.

[10]  Ye Wang,et al.  Impact and User Perception of Sandwich Attacks in the DeFi Ecosystem , 2022, CHI.

[11]  Roger Wattenhofer,et al.  SoK: Preventing Transaction Reordering Manipulations in Decentralized Finance , 2022, AFT.

[12]  B. Livshits,et al.  On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy , 2022, IACR Cryptol. ePrint Arch..

[13]  Aviv Zohar,et al.  Sliding Window Challenge Process for Congestion Detection , 2022, Financial Cryptography.

[14]  Kartik Nayak,et al.  Empirical Analysis of EIP-1559: Transaction Fees, Waiting Times, and Consensus Security , 2022, CCS.

[15]  Malaw Ndiaye,et al.  Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain , 2021, 2021 International Symposium on Networks, Computers and Communications (ISNCC).

[16]  Arthur Gervais,et al.  A2MM: Mitigating Frontrunning, Transaction Reordering and Consensus Instability in Decentralized Exchanges , 2021, ArXiv.

[17]  Philipp Jovanovic,et al.  An empirical study of DeFi liquidations: incentives, risks, and instabilities , 2021, Internet Measurement Conference.

[18]  Joachim Neu,et al.  The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets , 2021, IACR Cryptol. ePrint Arch..

[19]  Vincent Gramoli,et al.  Red Belly: A Secure, Fair and Scalable Open Blockchain , 2021, 2021 IEEE Symposium on Security and Privacy (SP).

[20]  Benjamin Livshits,et al.  On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols , 2021, 2021 IEEE Symposium on Security and Privacy (SP).

[21]  Daniel J. Moroz,et al.  Low-cost attacks on Ethereum 2.0 by sub-1/3 stakeholders , 2021, ArXiv.

[22]  Arthur Gervais,et al.  Quantifying Blockchain Extractable Value: How dark is the forest? , 2021, 2022 IEEE Symposium on Security and Privacy (SP).

[23]  Zhi Wang,et al.  Towards Understanding and Demystifying Bitcoin Mixing Services , 2020, WWW.

[24]  Kartik Nayak,et al.  BFT Protocol Forensics , 2020, CCS.

[25]  Arthur Gervais,et al.  AMR: autonomous coin mixer with privacy preserving reward distribution , 2020, AFT.

[26]  Arthur Gervais,et al.  High-Frequency Trading on Decentralized On-Chain Exchanges , 2020, 2021 IEEE Symposium on Security and Privacy (SP).

[27]  M. Matos,et al.  Impact of Geo-Distribution and Mining Pools on Blockchains: A Study of Ethereum , 2020, 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[28]  Ari Juels,et al.  Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability , 2020, 2020 IEEE Symposium on Security and Privacy (SP).

[29]  Yong Guan,et al.  Knowing your Bitcoin Customer: Money Laundering in the Bitcoin Economy , 2020, 2020 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE).

[30]  Friedhelm Victor,et al.  Address Clustering Heuristics for Ethereum , 2020, Financial Cryptography.

[31]  Angelique Faye Loe,et al.  You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques , 2019, CCS.

[32]  George Danezis,et al.  SoK: Consensus in the Age of Blockchains , 2017, AFT.

[33]  Clifford De Raffaele,et al.  Cybersecurity and the Blockchain: Preventing the Insertion of Child Pornography Images , 2019, 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).

[34]  Jie Chen,et al.  Anti-Money Laundering in Bitcoin: Experimenting with Graph Convolutional Networks for Financial Forensics , 2019, ArXiv.

[35]  Min Suk Kang,et al.  A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network , 2019, 2020 IEEE Symposium on Security and Privacy (SP).

[36]  Sebastian Faust,et al.  Temporary Censorship Attacks in the Presence of Rational Miners , 2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[37]  Yu Zhou,et al.  Improved Consensus Mechanisms Against Censorship Attacks , 2019, 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS).

[38]  Bart Preneel,et al.  Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[39]  Jeremy Clark,et al.  SoK: Transparent Dishonesty: Front-Running Attacks on Blockchain , 2019, Financial Cryptography Workshops.

[40]  Jin Song Dong,et al.  Formal Analysis of a Proof-of-Stake Blockchain , 2018, 2018 23rd International Conference on Engineering of Complex Computer Systems (ICECCS).

[41]  Sarah Meiklejohn,et al.  Smart contracts for bribing miners , 2018, IACR Cryptol. ePrint Arch..

[42]  Martin Florian,et al.  Anonymous CoinJoin Transactions with Arbitrary Values , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.

[43]  Elaine Shi,et al.  The Honey Badger of BFT Protocols , 2016, CCS.

[44]  Ian Goldberg,et al.  SoK: Making Sense of Censorship Resistance Systems , 2016, Proc. Priv. Enhancing Technol..

[45]  Laurent Vanbever,et al.  Hijacking Bitcoin: Routing Attacks on Cryptocurrencies , 2016, 2017 IEEE Symposium on Security and Privacy (SP).

[46]  Vern Paxson,et al.  SoK: Towards Grounding Censorship Circumvention in Empiricism , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[47]  Hubert Ritzdorf,et al.  Tampering with the Delivery of Blocks and Transactions in Bitcoin , 2015, IACR Cryptol. ePrint Arch..

[48]  Ethan Heilman,et al.  Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.

[49]  Ghassan O. Karame,et al.  Misbehavior in Bitcoin: A Study of Double-Spending and Accountability , 2015, TSEC.

[50]  Aggelos Kiayias,et al.  The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.

[51]  Alex Biryukov,et al.  Bitcoin over Tor isn't a Good Idea , 2014, 2015 IEEE Symposium on Security and Privacy.

[52]  Pedro Moreno-Sanchez,et al.  CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin , 2014, ESORICS.

[53]  Ghassan O. Karame,et al.  Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.

[54]  Nicolas Christin,et al.  Traveling the silk road: a measurement analysis of a large anonymous online marketplace , 2012, WWW.

[55]  Nir Bitansky,et al.  From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again , 2012, ITCS '12.

[56]  Michael K. Reiter,et al.  Censorship Resistance Revisited , 2005, Information Hiding.

[57]  Ghassan O. Karame,et al.  Censorship-Resilient and Confidential Collateralized Second-Layer Payments , 2022, IACR Cryptol. ePrint Arch..

[58]  Gilad Stern,et al.  Uncle Maker: (Time)Stamping Out The Competition in Ethereum , 2023, IACR Cryptol. ePrint Arch..

[59]  Raphael A. Auer,et al.  Miners as intermediaries: extractable value and market manipulation in crypto and DeFi , 2022 .

[60]  Pedro Moreno-Sanchez,et al.  Pinpointing and Measuring Wasabi and Samourai CoinJoins in the Bitcoin Ecosystem , 2021, ArXiv.

[61]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[62]  A. J. Angulo By Executive Order , 2012 .

[63]  S. Nakamoto,et al.  Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .

[64]  George Danezis,et al.  The Economics of Censorship Resistance , 2004 .