-
The Vulnerable Nature of Decentralized Governance in DeFi
Authors:
Maya Dotan,
Aviv Yaish,
Hsin-Chu Yin,
Eytan Tsytkin,
Aviv Zohar
Abstract:
Decentralized Finance (DeFi) platforms are often governed by Decentralized Autonomous Organizations (DAOs) which are implemented via governance protocols. Governance tokens are distributed to users of the platform, granting them voting rights in the platform's governance protocol. Many DeFi platforms have already been subject to attacks resulting in the loss of millions of dollars in user funds.…
▽ More
Decentralized Finance (DeFi) platforms are often governed by Decentralized Autonomous Organizations (DAOs) which are implemented via governance protocols. Governance tokens are distributed to users of the platform, granting them voting rights in the platform's governance protocol. Many DeFi platforms have already been subject to attacks resulting in the loss of millions of dollars in user funds.
In this paper we show that governance tokens are often not used as intended and may be harmful to the security of DeFi platforms. We show that (1) users often do not use governance tokens to vote, (2) that voting rates are negatively correlated to gas prices, (3) voting is very centralized.
We explore vulnerabilities in the design of DeFi platform's governance protocols and analyze different governance attacks, focusing on the transferable nature of voting rights via governance tokens. Following the movement and holdings of governance tokens, we show they are often used to perform a single action and then sold off. We present evidence of DeFi platforms using other platforms' governance protocols to promote their own agenda at the expense of the host platform.
△ Less
Submitted 8 August, 2023;
originally announced August 2023.
-
Validated Byzantine Asynchronous Multidimensional Approximate Agreement
Authors:
Maya Dotan,
Gilad Stern,
Aviv Zohar
Abstract:
Consider an asynchronous system where each node begins with some point in $\mathbb{R}^m$. Given some fixed $ε> 0$, we wish to have every nonfaulty node eventually output a point in $\mathbb{R}^m$, where all outputs are within distance $ε$ of each other, and are within the convex hull of the original nonfaulty inputs. This problem, when some of the nodes are adversarial, is known as the ``Byzantine…
▽ More
Consider an asynchronous system where each node begins with some point in $\mathbb{R}^m$. Given some fixed $ε> 0$, we wish to have every nonfaulty node eventually output a point in $\mathbb{R}^m$, where all outputs are within distance $ε$ of each other, and are within the convex hull of the original nonfaulty inputs. This problem, when some of the nodes are adversarial, is known as the ``Byzantine Asynchronous Multidimensional Approximate Agreement'' problem.
Previous landmark work by Mendes et al. and Vaidya et al. presented two solutions to the problem. Both of these solutions require exponential computation by each node in each round. Furthermore, the work provides a lower bound showing that it is impossible to solve the task of approximate agreement if $n\leq (m+2)t$, and thus the protocols assume that $n>(m+2)t$.
We present a Byzantine Asynchronous Multidimensional Approximate Agreement protocol in the validated setting of Cachin et al. Our protocol terminates after a logarithmic number of rounds, and requires only polynomial computation in each round. Furthermore, it is resilient to $t<\frac{n}{3}$ Byzantine nodes, which we prove to be optimal in the validated setting. In other words, working on the task in the validated setting allows us to significantly improve on previous works in several significant metrics. In addition, the techniques presented in this paper can easily yield a protocol in the original non-validated setting which requires exponential computation only in the first round, and polynomial computation in every subsequent round.
△ Less
Submitted 3 November, 2022;
originally announced November 2022.
-
Survey on Cryptocurrency Networking: Context, State-of-the-Art, Challenges
Authors:
Maya Dotan,
Yvonne-Anne Pignolet,
Stefan Schmid,
Saar Tochner,
Aviv Zohar
Abstract:
Cryptocurrencies such as Bitcoin are realized using distributed systems and hence critically rely on the performance and security of the interconnecting network. The requirements on these networks and their usage, however can differ significantly from traditional communication networks, with implications on all layers of the protocol stack. This paper is motivated by these differences, and in part…
▽ More
Cryptocurrencies such as Bitcoin are realized using distributed systems and hence critically rely on the performance and security of the interconnecting network. The requirements on these networks and their usage, however can differ significantly from traditional communication networks, with implications on all layers of the protocol stack. This paper is motivated by these differences, and in particular by the observation that many fundamental design aspects of these networks are not well-understood today. In order to support the networking community to contribute to this emerging application domain, we present a structured overview of the field, from topology and neighbor discovery to block and transaction propagation. In particular, we provide the context, highlighting differences and commonalities with traditional networks, review the state-of-the-art, and identify open research challenges. Our paper can hence also be seen as a call-to-arms to improve the foundation on top of which cryptocurrencies are built.
△ Less
Submitted 19 August, 2020;
originally announced August 2020.
-
Proofs of Useless Work -- Positive and Negative Results for Wasteless Mining Systems
Authors:
Maya Dotan,
Saar Tochner
Abstract:
Many blockchain systems today, including Bitcoin, rely on Proof of Work (PoW). Proof of work is crucial to the liveness and security of cryptocurrencies. The assumption when using PoW is that a lot of trial and error is required on average before a valid block is generated. One of the main concerns raised with regard to this kind of system is the inherent need to "waste" energy on "meaningless" pr…
▽ More
Many blockchain systems today, including Bitcoin, rely on Proof of Work (PoW). Proof of work is crucial to the liveness and security of cryptocurrencies. The assumption when using PoW is that a lot of trial and error is required on average before a valid block is generated. One of the main concerns raised with regard to this kind of system is the inherent need to "waste" energy on "meaningless" problems. In fact, the Bitcoin system is believed to consume more electricity than several small countries.
In this work we formally define three properties that are necessary for wasteless PoW systems: (1) solve "meaningful" problems (2) solve them efficiently and (3) be secure against double-spend attacks. These properties aim to create an open market for problem-solving, in which miners produce solutions to problems in the most efficient way (wasteless). The security of the system stems from the economical incentive created by the demand for solutions to these problems.
We analyze these properties, and deduce constraints that must apply to such PoW systems. In our main result, we conclude that under realistic assumptions, the set of allowed problems must be preimage resistant functions in order to keep the system secure and efficient.
△ Less
Submitted 6 November, 2021; v1 submitted 2 July, 2020;
originally announced July 2020.
-
Efficient Generation of One-Factorizations through Hill Climbing
Authors:
Maya Dotan,
Nati Linial
Abstract:
It is well known that for every even integer $n$, the complete graph $K_{n}$ has a one-factorization, namely a proper edge coloring with $n-1$ colors. Unfortunately, not much is known about the possible structure of large one-factorizations. Also, at present we have only woefully few explicit constructions of one-factorizations. Specifically, we know essentially nothing about the {\em typical} pro…
▽ More
It is well known that for every even integer $n$, the complete graph $K_{n}$ has a one-factorization, namely a proper edge coloring with $n-1$ colors. Unfortunately, not much is known about the possible structure of large one-factorizations. Also, at present we have only woefully few explicit constructions of one-factorizations. Specifically, we know essentially nothing about the {\em typical} properties of one-factorizations for large $n$.
Suppose that $\cal C_{\rm n}$ is a graph whose vertex set includes the set of all order-$n$ one-factorizations and that $Ψ: V(\cal C_{\rm n})\to \mathbb R$ takes its minimum precisely at the one-factorizations. Given $\cal C_{\rm n}$ and $Ψ$, we can generate one-factorizations via hill climbing. Namely, by taking a walk on $\cal C_{\rm n}$ that tends to go from a vertex to a neighbor of smaller $Ψ$. For over 30 years, hill-climbing has been essentially the only method for generating many large one-factorizations. However, the validity of such methods was supported so far only by numerical evidence. Here, we present for the first time hill-climbing algorithms that provably generate an order-$n$ one-factorization in $\text{polynomial}(n)$ steps regardless of the starting state, while all vertex degrees in the underlying graph are appropriately bounded.
We also raise many questions and conjectures regarding hill-climbing methods and concerning the possible and typical structure of one-factorizations.
△ Less
Submitted 27 September, 2017; v1 submitted 3 July, 2017;
originally announced July 2017.