The Ring of Gyges: Investigating the Future of Criminal Smart Contracts

被引:96
作者
Juels, Ari [1 ]
Kosba, Ahmed [2 ]
Shi, Elaine [3 ]
机构
[1] Cornell Tech, Jacobs Inst, IC3, New York, NY 10011 USA
[2] Univ Maryland, College Pk, MD 20742 USA
[3] Cornell Univ, IC3, Ithaca, NY 14853 USA
来源
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2016年
关键词
D O I
10.1145/2976749.2978362
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Thanks to their anonymity (pseudonymity) and elimination of trusted intermediaries, cryptocurrencies such as Bitcoin have created or stimulated growth in many businesses and communities. Unfortunately, some of these are criminal, e.g., money laundering, illicit marketplaces, and ransomware. Next-generation cryptocurrencies such as Ethereum will include rich scripting languages in support of smart contracts, programs that autonomously intermediate transactions. In this paper, we explore the risk of smart contracts fueling new criminal ecosystems. Specifically, we show how what we call criminal smart contracts (CSCs) can facilitate leakage of confidential information, theft of cryptographic keys, and various real-world crimes (murder, arson, terrorism). We show that CSCs for leakage of secrets (a la Wikileaks) are efficiently realizable in existing scripting languages such as that in Ethereum. We show that CSCs for theft of cryptographic keys can be achieved using primitives, such as Succinct Non-interactive ARguments of Knowledge (SNARKs), that are already expressible in these languages and for which efficient supporting language extensions are anticipated. We show similarly that authenticated data feeds, an emerging feature of smart contract systems, can facilitate CSCs for real-world crimes (e.g., property crimes). Our results highlight the urgency of creating policy and technical safeguards against CSCs in order to realize the promise of smart contracts for beneficial goals.
引用
收藏
页码:283 / 295
页数:13
相关论文
共 44 条
[1]  
Andrychowicz M., 2013, S P
[2]  
[Anonymous], 1995, International Conference on the Theory and Applications of Cryptographic Techniques
[3]  
[Anonymous], ZDNET
[4]  
[Anonymous], 2008, WIRED
[5]  
Bates J., 1990, Virus Bulletin, P3
[6]  
Bell J., 1995, ASSASSINATION POLITI
[7]  
Ben-Sasson E., 2014, USENIX SECURIT
[8]  
Ben-Sasson E., 2015, S P
[9]  
Ben-Sasson Eli, 2014, S P
[10]  
Bentov Iddo., 2014, CRYPTO