Abstract
We describe a new methodology that enables the direct execution of multi-threaded applications inside of Shadow, an existing parallel discrete-event network simulation framework. Our methodology utilizes function interposition and an application-layer thread library to emulate the ordinary thread interface to the application. Using this methodology, we implement a new Shadow plug-in that directly executes the Bitcoin reference client software. To demonstrate the usefulness of this tool, we present novel denial-of-service attacks against the Bitcoin software that exploit low-level implementation artifacts in the Bitcoin reference client; our deterministic simulator was helpful in developing and demonstrating these attacks. We describe optimizations that enable scalable execution of thousands of Bitcoin nodes on a single machine, and discuss how to model the Bitcoin network for experimental purposes.
Original language | English (US) |
---|---|
State | Published - 2015 |
Externally published | Yes |
Event | 8th Workshop on Cyber Security Experimentation and Test, CSET 2015 - Washington, United States Duration: Aug 10 2015 → … |
Conference
Conference | 8th Workshop on Cyber Security Experimentation and Test, CSET 2015 |
---|---|
Country/Territory | United States |
City | Washington |
Period | 8/10/15 → … |
ASJC Scopus subject areas
- Computer Networks and Communications
- Safety, Risk, Reliability and Quality