Abstract | ||
---|---|---|
Proof of work schemes use client puzzles to manage limited resources on a server and provide resilience to denial of service attacks. Attacks utilizing GPUs to inflate computational capacity, known as resource inflation, are a novel and powerful threat that dramatically increase the computational disparity between clients. This disparity renders proof of work schemes based on hash reversal ineffective and potentially destructive. This paper examines various such schemes in view of GPU-based attacks and identifies characteristics that allow defense mechanisms to withstand attacks. In particular, we demonstrate that, hash-reversal schemes which adapt solely on server load are ineffective under attack by GPU utilizing adversaries; whereas, hash-reversal schemes which adapt based on client behavior are effective even under GPU based attacks. |
Year | Venue | Keywords |
---|---|---|
2011 | LEET | computational capacity,hash reversal,gpu-based attack,client puzzle,work scheme,server load,gpu utilizing adversary,hash-reversal scheme,client behavior,disparity renders proof,computational disparity |
Field | DocType | Citations |
Psychological resilience,Server load,Proof-of-work system,Denial-of-service attack,Computer security,CUDA,Computer science,Hash function,Distributed computing | Conference | 4 |
PageRank | References | Authors |
0.50 | 14 | 6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jeff Green | 1 | 37 | 2.69 |
Joshua Juen | 2 | 82 | 5.86 |
Omid Fatemieh | 3 | 127 | 7.45 |
Ravinder Shankesi | 4 | 20 | 1.51 |
Dong Jin | 5 | 84 | 10.13 |
Carl A. Gunter | 6 | 1941 | 185.30 |