Shadow-bitcoin: scalable simulation via direct execution of multi-threaded applications

Andrew Miller, Rob Jansen

Research output: Contribution to conferencePaper

Abstract

We describe a new methodology that enables the direct execution of multi-threaded applications inside of Shadow, an existing parallel discrete-event network simulation framework. Our methodology utilizes function interposition and an application-layer thread library to emulate the ordinary thread interface to the application. Using this methodology, we implement a new Shadow plug-in that directly executes the Bitcoin reference client software. To demonstrate the usefulness of this tool, we present novel denial-of-service attacks against the Bitcoin software that exploit low-level implementation artifacts in the Bitcoin reference client; our deterministic simulator was helpful in developing and demonstrating these attacks. We describe optimizations that enable scalable execution of thousands of Bitcoin nodes on a single machine, and discuss how to model the Bitcoin network for experimental purposes.

Original languageEnglish (US)
StatePublished - Jan 1 2015
Event8th Workshop on Cyber Security Experimentation and Test, CSET 2015 - Washington, United States
Duration: Aug 10 2015 → …

Conference

Conference8th Workshop on Cyber Security Experimentation and Test, CSET 2015
CountryUnited States
CityWashington
Period8/10/15 → …

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Fingerprint Dive into the research topics of 'Shadow-bitcoin: scalable simulation via direct execution of multi-threaded applications'. Together they form a unique fingerprint.

  • Cite this

    Miller, A., & Jansen, R. (2015). Shadow-bitcoin: scalable simulation via direct execution of multi-threaded applications. Paper presented at 8th Workshop on Cyber Security Experimentation and Test, CSET 2015, Washington, United States.