Reconstructing Hash Reversal based Proof of Work Schemes

Jeff Green, Joshua Juen, Omid Fatemieh, Ravinder Shankesi, Dong Jin, Carl A. Gunter

Research output: Contribution to conferencePaper

Abstract

Proof of work schemes use client puzzles to manage limited resources on a server and provide resilience to denial of service attacks. Attacks utilizing GPUs to inflate computational capacity, known as resource inflation, are a novel and powerful threat that dramatically increase the computational disparity between clients. This disparity renders proof of work schemes based on hash reversal ineffective and potentially destructive. This paper examines various such schemes in view of GPU-based attacks and identifies characteristics that allow defense mechanisms to withstand attacks. In particular, we demonstrate that, hash-reversal schemes which adapt solely on server load are ineffective under attack by GPU utilizing adversaries; whereas, hash-reversal schemes which adapt based on client behavior are effective even under GPU based attacks.

Original languageEnglish (US)
StatePublished - Jan 1 2011
Event4th USENIX Workshop on Large-Scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More, LEET 2011 - Boston, United States
Duration: Mar 29 2011 → …

Conference

Conference4th USENIX Workshop on Large-Scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More, LEET 2011
CountryUnited States
CityBoston
Period3/29/11 → …

ASJC Scopus subject areas

  • Information Systems
  • Artificial Intelligence
  • Computer Science Applications

Fingerprint Dive into the research topics of 'Reconstructing Hash Reversal based Proof of Work Schemes'. Together they form a unique fingerprint.

  • Cite this

    Green, J., Juen, J., Fatemieh, O., Shankesi, R., Jin, D., & Gunter, C. A. (2011). Reconstructing Hash Reversal based Proof of Work Schemes. Paper presented at 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More, LEET 2011, Boston, United States.