{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:47:34Z","timestamp":1774162054491,"version":"3.50.1"},"reference-count":52,"publisher":"Privacy Enhancing Technologies Symposium Advisory Board","issue":"3","license":[{"start":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T00:00:00Z","timestamp":1498867200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Stratum, the de-facto mining communication protocol used by blockchain based cryptocurrency systems, enables miners to reliably and efficiently fetch jobs from mining pool servers. In this paper we exploit Stratum\u2019s lack of encryption to develop passive and active attacks on Bitcoin\u2019s mining protocol, with important implications on the privacy, security and even safety of mining equipment owners. We introduce StraTap and ISP Log attacks, that infer miner earnings if given access to miner communications, or even their logs. We develop BiteCoin, an active attack that hijacks shares submitted by miners, and their associated payouts. We build BiteCoin on WireGhost, a tool we developed to hijack and surreptitiously maintain Stratum connections. Our attacks reveal that securing Stratum through pervasive encryption is not only undesirable (due to large overheads), but also ineffective: an adversary can predict miner earnings even when given access to only packet timestamps. Instead, we devise Bedrock, a minimalistic Stratum extension that protects the privacy and security of mining participants. We introduce and leverage the <jats:italic>mining cookie<\/jats:italic> concept, a secret that each miner shares with the pool and includes in its puzzle computations, and that prevents attackers from reconstructing or hijacking the puzzles.<\/jats:p>\n               <jats:p>We have implemented our attacks and collected 138MB of Stratum protocol traffic from mining equipment in the US and Venezuela. We show that Bedrock is resilient to active attacks even when an adversary breaks the crypto constructs it uses. Bedrock imposes a daily overhead of 12.03s on a single pool server that handles mining traffic from 16,000 miners.<\/jats:p>","DOI":"10.1515\/popets-2017-0028","type":"journal-article","created":{"date-parts":[[2017,7,8]],"date-time":"2017-07-08T10:01:47Z","timestamp":1499508107000},"page":"57-74","source":"Crossref","is-referenced-by-count":32,"title":["Hardening Stratum, the Bitcoin Pool Mining Protocol"],"prefix":"10.56553","volume":"2017","author":[{"given":"Ruben","family":"Recabarren","sequence":"first","affiliation":[{"name":"Florida Int\u2019l University , Miami , FL 33199"}]},{"given":"Bogdan","family":"Carbunar","sequence":"additional","affiliation":[{"name":"Florida Int\u2019l University , Miami , FL 33199"}]}],"member":"35752","published-online":{"date-parts":[[2017,7,6]]},"reference":[{"key":"2021040622595976613_j_popets-2017-0028_ref_001_w2aab2b8c19b1b7b1ab1ab1Aa","doi-asserted-by":"crossref","unstructured":"[1] Alex Biryukov, Dmitry Khovratovich, and Ivan Pustogarov. Deanonymisation of clients in bitcoin p2p network. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 15\u201329. ACM, 2014.","DOI":"10.1145\/2660267.2660379"},{"key":"2021040622595976613_j_popets-2017-0028_ref_002_w2aab2b8c19b1b7b1ab1ab2Aa","doi-asserted-by":"crossref","unstructured":"[2] Philip Koshy, Diana Koshy, and Patrick McDaniel. An analysis of anonymity in bitcoin using p2p network traffic. In International Conference on Financial Cryptography and Data Security, pages 469\u2013485. Springer, 2014.","DOI":"10.1007\/978-3-662-45472-5_30"},{"key":"2021040622595976613_j_popets-2017-0028_ref_003_w2aab2b8c19b1b7b1ab1ab3Aa","doi-asserted-by":"crossref","unstructured":"[3] Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage. A fistful of bitcoins: Characterizing payments among men with no names. In Proceedings of the 2013 Conference on Internet Measurement Conference, pages 127\u2013140, 2013.","DOI":"10.1145\/2504730.2504747"},{"key":"2021040622595976613_j_popets-2017-0028_ref_004_w2aab2b8c19b1b7b1ab1ab4Aa","doi-asserted-by":"crossref","unstructured":"[4] Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, and Srdjan Capkun. Evaluating user privacy in bitcoin. In Proceedings of the Financial Cryptography and Data Security, pages 34\u201351, 2013.","DOI":"10.1007\/978-3-642-39884-1_4"},{"key":"2021040622595976613_j_popets-2017-0028_ref_005_w2aab2b8c19b1b7b1ab1ab5Aa","doi-asserted-by":"crossref","unstructured":"[5] Ian Miers, Christina Garman, Matthew Green, and Aviel D. Rubin. Zerocoin: Anonymous distributed e-cash from bitcoin. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, pages 397\u2013411, 2013.","DOI":"10.1109\/SP.2013.34"},{"key":"2021040622595976613_j_popets-2017-0028_ref_006_w2aab2b8c19b1b7b1ab1ab6Aa","doi-asserted-by":"crossref","unstructured":"[6] Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, and Madars Virza. Zerocash: Decentralized anonymous payments from bitcoin. In Proceedings of the Symposium on Security and Privacy, pages 459\u2013474, 2014.","DOI":"10.1109\/SP.2014.36"},{"key":"2021040622595976613_j_popets-2017-0028_ref_007_w2aab2b8c19b1b7b1ab1ab7Aa","doi-asserted-by":"crossref","unstructured":"[7] Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A Kroll, and Edward W Felten. Mixcoin: Anonymity for bitcoin with accountable mixes. In Proceedings of the International Conference on Financial Cryptography and Data Security, pages 486\u2013504, 2014.","DOI":"10.1007\/978-3-662-45472-5_31"},{"key":"2021040622595976613_j_popets-2017-0028_ref_008_w2aab2b8c19b1b7b1ab1ab8Aa","doi-asserted-by":"crossref","unstructured":"[8] Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, and Edward W. Felten. Sok: Research perspectives and challenges for bitcoin and cryptocurrencies. In Proceedings of the IEEE Symposium on Security and Privacy, 2015.","DOI":"10.1109\/SP.2015.14"},{"key":"2021040622595976613_j_popets-2017-0028_ref_009_w2aab2b8c19b1b7b1ab1ab9Aa","unstructured":"[9] BBC. We Looked Inside a Secret Chinese Bitcoin Mine. http:\/\/www.bbc.com\/future\/story\/20160504-we-looked-inside-a-secret-chinese-bitcoin-mine, May 2016."},{"key":"2021040622595976613_j_popets-2017-0028_ref_010_w2aab2b8c19b1b7b1ab1ac10Aa","unstructured":"[10] allinvain. I just got hacked - any help is welcome! (25,000 BTC stolen). https:\/\/bitcointalk.org\/index.php?topic=16457.msg214423#msg214423, June 2011."},{"key":"2021040622595976613_j_popets-2017-0028_ref_011_w2aab2b8c19b1b7b1ab1ac11Aa","unstructured":"[11] dree12. List of Major Bitcoin Heists, Thefts, Hacks, Scams, and Losses [Old]. https:\/\/bitcointalk.org\/index.php?topic=83794.0#post_mybitcoin_theft, May 2012."},{"key":"2021040622595976613_j_popets-2017-0028_ref_012_w2aab2b8c19b1b7b1ab1ac12Aa","unstructured":"[12] Ed Williams. Kidnappings in Venezuela. American Diplomacy, 2011."},{"key":"2021040622595976613_j_popets-2017-0028_ref_013_w2aab2b8c19b1b7b1ab1ac13Aa","unstructured":"[13] Wikipedia. Legality of Bitcoin by Country. https:\/\/en.wikipedia.org\/wiki\/Legality_of_bitcoin_by_country."},{"key":"2021040622595976613_j_popets-2017-0028_ref_014_w2aab2b8c19b1b7b1ab1ac14Aa","unstructured":"[14] Cryptocoins News. Top 10 Countries in Which Bitcoin is Banned. https:\/\/www.cryptocoinsnews.com\/top-10-countries-bitcoin-banned\/, May 2015."},{"key":"2021040622595976613_j_popets-2017-0028_ref_015_w2aab2b8c19b1b7b1ab1ac15Aa","unstructured":"[15] Cryptocoins News. Report: Two Venezuelan Men Arrested for Mining Bitcoin. https:\/\/www.cryptocoinsnews.com\/report-two-venezuelans-arrested-mining-bitcoin\/, March 2016."},{"key":"2021040622595976613_j_popets-2017-0028_ref_016_w2aab2b8c19b1b7b1ab1ac16Aa","unstructured":"[16] Bitcoin Magazine. Venezuela Seems to Be Cracking Down on Bitcoin. https:\/\/bitcoinmagazine.com\/articles\/venezuelaseems-be-cracking-down-bitcoin\/, February 2017."},{"key":"2021040622595976613_j_popets-2017-0028_ref_017_w2aab2b8c19b1b7b1ab1ac17Aa","unstructured":"[17] Jim Epstein. The Secret, Dangerous World of Venezuelan Bitcoin Mining. http:\/\/reason.com\/archives\/2016\/11\/28\/the-secret-dangerous-world-of, 2017."},{"key":"2021040622595976613_j_popets-2017-0028_ref_018_w2aab2b8c19b1b7b1ab1ac18Aa","unstructured":"[18] Stratum mining protocol specification. https:\/\/slushpool.com\/help\/!\/manual\/stratum-protocol, Last accessed in July 2016."},{"key":"2021040622595976613_j_popets-2017-0028_ref_019_w2aab2b8c19b1b7b1ab1ac19Aa","unstructured":"[19] Stratum mining protocol - Displacing GBT. https:\/\/en.bitcoin.it\/wiki\/Stratum_mining_protocol#Displacing_GBT, Last accessed in July 2016."},{"key":"2021040622595976613_j_popets-2017-0028_ref_020_w2aab2b8c19b1b7b1ab1ac20Aa","unstructured":"[20] Litecoin pool mining. https:\/\/www.litecoinpool.org\/help, Last accessed in Oct 2016."},{"key":"2021040622595976613_j_popets-2017-0028_ref_021_w2aab2b8c19b1b7b1ab1ac21Aa","unstructured":"[21] Ethereum pool mining. https:\/\/forum.ethereum.org\/discussion\/7091\/stratum-mining-protocol-for-ethereum, Last accessed in Oct 2016."},{"key":"2021040622595976613_j_popets-2017-0028_ref_022_w2aab2b8c19b1b7b1ab1ac22Aa","unstructured":"[22] Monero pool mining. https:\/\/dwarfpool.com\/xmr, Last accessed in Oct 2016."},{"key":"2021040622595976613_j_popets-2017-0028_ref_023_w2aab2b8c19b1b7b1ab1ac23Aa","unstructured":"[23] Cryptocoins Market Capitalization. https:\/\/coinmarketcap.com\/, Last accessed in Oct 2016."},{"key":"2021040622595976613_j_popets-2017-0028_ref_024_w2aab2b8c19b1b7b1ab1ac24Aa","unstructured":"[24] Stratum mining protocol description. https:\/\/en.bitcoin.it\/wiki\/Stratum_mining_protocol, Last accessed in July 2016."},{"key":"2021040622595976613_j_popets-2017-0028_ref_025_w2aab2b8c19b1b7b1ab1ac25Aa","unstructured":"[25] Number of Bitcoin Miners Far Higher Than Popular Estimates. http:\/\/bravenewcoin.com\/news\/number-of-bitcoin-miners-far-higher-than-popular-estimates\/, May 2015."},{"key":"2021040622595976613_j_popets-2017-0028_ref_026_w2aab2b8c19b1b7b1ab1ac26Aa","unstructured":"[26] Neighbourhood Pool Watch. http:\/\/organofcorti.blogspot.com.au\/."},{"key":"2021040622595976613_j_popets-2017-0028_ref_027_w2aab2b8c19b1b7b1ab1ac27Aa","unstructured":"[27] An estimation of hashrate distribution amongst the largest mining pools. https:\/\/blockchain.info\/pools."},{"key":"2021040622595976613_j_popets-2017-0028_ref_028_w2aab2b8c19b1b7b1ab1ac28Aa","doi-asserted-by":"crossref","unstructured":"[28] Alex Biryukov and Ivan Pustogarov. Bitcoin over Tor isn\u2019t a Good Idea. In Proceedings of the IEEE Symposium on Security and Privacy, pages 122\u2013134, 2015.","DOI":"10.1109\/SP.2015.15"},{"key":"2021040622595976613_j_popets-2017-0028_ref_029_w2aab2b8c19b1b7b1ab1ac29Aa","unstructured":"[29] Collected Stratum Traffic Data. https:\/\/mega.nz\/#!FRVn0ZQT!00yzShFT5Rg5T1yVOzYOoVFxbzuibnzRqGJ7spSmac."},{"key":"2021040622595976613_j_popets-2017-0028_ref_030_w2aab2b8c19b1b7b1ab1ac30Aa","unstructured":"[30] F2Pool Help Page. https:\/\/www.f2pool.com\/help, Last accessed in July 2016."},{"key":"2021040622595976613_j_popets-2017-0028_ref_031_w2aab2b8c19b1b7b1ab1ac31Aa","unstructured":"[31] Antpool. https:\/\/www.antpool.com\/."},{"key":"2021040622595976613_j_popets-2017-0028_ref_032_w2aab2b8c19b1b7b1ab1ac32Aa","unstructured":"[32] Ghash.io. http:\/\/ghash.io\/."},{"key":"2021040622595976613_j_popets-2017-0028_ref_033_w2aab2b8c19b1b7b1ab1ac33Aa","unstructured":"[33] Slush pool. https:\/\/slushpool.com\/home\/."},{"key":"2021040622595976613_j_popets-2017-0028_ref_034_w2aab2b8c19b1b7b1ab1ac34Aa","unstructured":"[34] Btcc pool. https:\/\/pool.btcc.com\/."},{"key":"2021040622595976613_j_popets-2017-0028_ref_035_w2aab2b8c19b1b7b1ab1ac35Aa","unstructured":"[35] Bitcoin pools hashrate distribution. https:\/\/blockchain.info\/pools, Last accessed in July 2016."},{"key":"2021040622595976613_j_popets-2017-0028_ref_036_w2aab2b8c19b1b7b1ab1ac36Aa","unstructured":"[36] Wikipedia. Telecommunications data retention, 2011."},{"key":"2021040622595976613_j_popets-2017-0028_ref_037_w2aab2b8c19b1b7b1ab1ac37Aa","doi-asserted-by":"crossref","unstructured":"[37] Christian DeSimmone. Pitting karlsruhe against luxembourg-german data protection and the contested implementation of the eu data retention directive. German LJ, 11:291, 2010.","DOI":"10.1017\/S2071832200018538"},{"key":"2021040622595976613_j_popets-2017-0028_ref_038_w2aab2b8c19b1b7b1ab1ac38Aa","unstructured":"[38] Dialy News: NSA analysts spied on spouses, girlfriends: documents. http:\/\/www.nydailynews.com\/news\/politics\/nsa-analysts-spied-spouses-girlfriends-documents-article-1.2058282, Last accessed in August 2016."},{"key":"2021040622595976613_j_popets-2017-0028_ref_039_w2aab2b8c19b1b7b1ab1ac39Aa","unstructured":"[39] Yue Cao, Zhiyun Qian, Zhongjie Wang, Tuan Dao, Srikanth V Krishnamurthy, and Lisa M Marvel. Off-path tcp exploits: Global rate limit considered dangerous."},{"key":"2021040622595976613_j_popets-2017-0028_ref_040_w2aab2b8c19b1b7b1ab1ac40Aa","doi-asserted-by":"crossref","unstructured":"[40] Zhiyun Qian and Z Morley Mao. Off-path tcp sequence number inference attack-how firewall middleboxes reduce security. In 2012 IEEE Symposium on Security and Privacy, pages 347\u2013361. IEEE, 2012.","DOI":"10.1109\/SP.2012.29"},{"key":"2021040622595976613_j_popets-2017-0028_ref_041_w2aab2b8c19b1b7b1ab1ac41Aa","unstructured":"[41] CoinDesk. Gallery: Fire Destroys Thai Bitcoin Mining Facility. http:\/\/www.coindesk.com\/gallery-fire-destroys-thaibitcoin-mining-facility\/, November 2014."},{"key":"2021040622595976613_j_popets-2017-0028_ref_042_w2aab2b8c19b1b7b1ab1ac42Aa","unstructured":"[42] Shijack - TCP session hijacking. https:\/\/www.exploit-db.com\/papers\/13587\/, Last accessed in July 2016."},{"key":"2021040622595976613_j_popets-2017-0028_ref_043_w2aab2b8c19b1b7b1ab1ac43Aa","unstructured":"[43] Juggernaut - TCP session hijacking. http:\/\/phrack.org\/issues\/50\/6.html, Last accessed in July 2016."},{"key":"2021040622595976613_j_popets-2017-0028_ref_044_w2aab2b8c19b1b7b1ab1ac44Aa","unstructured":"[44] Hunt - TCP session hijacking. http:\/\/linux.die.net\/man\/1\/hunt, Last accessed in July 2016."},{"key":"2021040622595976613_j_popets-2017-0028_ref_045_w2aab2b8c19b1b7b1ab1ac45Aa","doi-asserted-by":"crossref","unstructured":"[45] Ilias Giechaskiel, Cas Cremers, and Kasper Rasmussen. On bitcoin security in the presence of broken crypto primitives. eprint.iacr.org, 2016.","DOI":"10.1007\/978-3-319-45741-3_11"},{"key":"2021040622595976613_j_popets-2017-0028_ref_046_w2aab2b8c19b1b7b1ab1ac46Aa","unstructured":"[46] AntMiner S7. https:\/\/bitmaintech.com\/productDetail.htm?pid=00020150827084021471OHYdwd9D06A0, Last accessed in July 2016."},{"key":"2021040622595976613_j_popets-2017-0028_ref_047_w2aab2b8c19b1b7b1ab1ac47Aa","unstructured":"[47] Van Jacobson, Craig Leres, and Steven McCanne. Tcpdump public repository. http:\/\/www.tcpdump.org, 2003."},{"key":"2021040622595976613_j_popets-2017-0028_ref_048_w2aab2b8c19b1b7b1ab1ac48Aa","unstructured":"[48] Philippe Biondi. Scapy. see http:\/\/www.secdev.org\/projects\/scapy, 2011."},{"key":"2021040622595976613_j_popets-2017-0028_ref_049_w2aab2b8c19b1b7b1ab1ac49Aa","doi-asserted-by":"crossref","unstructured":"[49] Christian Decker and Roger Wattenhofer. Information propagation in the bitcoin network. In IEEE P2P 2013 Proceedings, pages 1\u201310. IEEE, 2013.","DOI":"10.1109\/P2P.2013.6688704"},{"key":"2021040622595976613_j_popets-2017-0028_ref_050_w2aab2b8c19b1b7b1ab1ac50Aa","unstructured":"[50] Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. Eclipse attacks on bitcoin\u2019s peer-to-peer network. In 24th USENIX Security Symposium (USENIX Security 15), pages 129\u2013144, 2015."},{"key":"2021040622595976613_j_popets-2017-0028_ref_051_w2aab2b8c19b1b7b1ab1ac51Aa","unstructured":"[51] George Bissas, Brian Neil Levine, A Pinar Ozisik, Gavin Andresen, and Amir Houmansadr. An analysis of attacks on blockchain consensus. preprint arXiv:1610.07985, 2016."},{"key":"2021040622595976613_j_popets-2017-0028_ref_052_w2aab2b8c19b1b7b1ab1ac52Aa","unstructured":"[52] Nicolas T Courtois and Lear Bahack. On subversive miner strategies and block withholding attack in bitcoin digital currency. arXiv preprint arXiv:1402.1718, 2014."}],"container-title":["Proceedings on Privacy Enhancing Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/content.sciendo.com\/view\/journals\/popets\/2017\/3\/article-p57.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.sciendo.com\/article\/10.1515\/popets-2017-0028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T16:29:47Z","timestamp":1658334587000},"score":1,"resource":{"primary":{"URL":"https:\/\/petsymposium.org\/popets\/2017\/popets-2017-0028.php"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,1]]},"references-count":52,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2017,7,6]]},"published-print":{"date-parts":[[2017,7,1]]}},"alternative-id":["10.1515\/popets-2017-0028"],"URL":"https:\/\/doi.org\/10.1515\/popets-2017-0028","relation":{},"ISSN":["2299-0984"],"issn-type":[{"value":"2299-0984","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,1]]}}}