OFFENSES IN DECENTRALIZED SYSTEMS

Keywords: blockchain, decentralized networks, cyber security, attacks, criminal law

Abstract

Introduction. The article is devoted to the study of the problem of offenses in decentralized systems, in particular in blockchain networks. The author analyzes the main types of offenses that can occur in these systems, such as fraud, various attacks, and others. Since decentralized networks have no centralized control, they become more vulnerable to various types of attacks and abuses. Understanding the nature of decentralized networks can help to solve the problem of crimes in these systems more effectively, and understanding the principles of these networks can help to develop effective and transparent methods of solving such crimes.

Summary of the main results of the study. Taking into account the results of the research, an explanation is provided as to how decentralized networks such as blockchain are organized, what are the offenses in such networks, what are attacks in decentralized systems. A detailed list of the main types of attacks, other types of offenses and abuses in decentralized systems is also provided, a description and explanation is provided for each type, and specific examples are also provided for some of them.

Conclusions. For the first time, a list of the main offenses in decentralized networks such as blockchain has been unified and provided in the context of criminal law.

Downloads

References

/

References

LOCKCHAIN TECHNOLOGY ON THE DEMOCRATIC CHOICE. 2020. [цит. за 03, Лютий 2023]. Доступний у: https://scholar.google.com/citations?view_op=view_citation&hl=en&user=pnwJInEAAAAJ&citation_for_view=pnwJInEAAAAJ:d1gkVwhDpl0C

Driscoll S. How Bitcoin Works Under the Hood [Інтернет]. [цит. за 21, Лютий 2023]. Доступний у: http://www.imponderablethings.com/2013/07/how-bitcoin-works-under-hood.html

Черніков М.Ю. Методи захисту транзакцій в блокчейн системах. 2021 [цит. за 21, Лютий 2023]; Доступний у: https://openarchive.nure.ua/handle/document/19433

Double-Spending Problem and Byzantine General’s Problem in Relation to Cryptocurrency [Інтернет]. Freeman Law. [цит. за 03, Лютий 2023]. Доступний у: https://freemanlaw.com/double-spending-problem-and-byzantine-generals-problem-in-relation-to-cryptocurrency-2/

Kovalchuk D, Ivko T, Kuznetsova T, Nariezhnii O. Огляд протоколів консенсусу, що застосовуються в технологіях блокчейн. CS&CS E-journal. 24, Червень 2019;(1):30–43. [цит. за 03, Лютий 2023]. Доступний у: https://periodicals.karazin.ua/cscs/article/view/13081

The Longest Chain—Blockchain Guide [Інтернет]. [цит. за 21, Лютий 2023]. Доступний у: https://learnmeabitcoin.com/technical/longest-chain

Обзор актуальных протоколов достижения консенсуса в децентрализованной среде [Інтернет]. Хабр. [цит. за 21, Лютий 2023]. Доступний у: https://habr.com/ru/company/distributedlab/blog/419185/

Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities. Ertem Nusret Tas, David Tse, Fangyu Gai, Sreeram Kannan, Mohammad Ali Maddah-Ali, Fisher Yu. [Інтернет]. [цит. за 21, Лютий 2023]. Доступний у: https://eprint.iacr.org/search?q=Bitcoin-Enhanced+&title=&authors=&category=&submittedafter=&submittedbefore=&revisedafter=&revisedbefore=

Синхронизация кошельков с Биткоин сетью [Інтернет]. Хабр. [цит. за 21, Лютий 2023]. Доступний у: https://habr.com/ru/company/distributedlab/blog/416469/

Подробно об обновлении Segregated Witness и последствиях его принятия в Bitcoin [Інтернет]. Хабр. [цит. за 21, Лютий 2023]. Доступний у: https://habr.com/ru/company/distributedlab/blog/418853/

Tse D. Bribery and stake grinding attacks. Scaling Blockchains, Stanford University. 2020. EE 374. URL: https://web.stanford.edu/class/archive/ee/ee374/ee374.1206//downloads/l18_notes.pdf (date of access: 23.01.2023)

Liveness—an overview | ScienceDirect Topics [Інтернет]. [цит. за 23, Січень 2023]. Доступний у: https://www.sciencedirect.com/topics/engineering/liveness

What is a distributed hash table? [Інтернет]. Educative: Interactive Courses for Software Developers. [цит. за 23, Січень 2023]. Доступний у: https://www.educative.io/answers/what-is-a-distributed-hash-table

Thellman P. Validators Create New Attack Vectors for Decentralized Systems [Інтернет]. 2019 [цит. за 21, Лютий 2023]. Доступний у: https://www.coindesk.com/markets/2019/02/24/validators-create-new-attack-vectors-for-decentralized-systems/

What Is Delegated Proof of Stake? [Інтернет]. [цит. за 21, Лютий 2023]. Доступний у: https://crypto.com/university/what-is-dpos-delegated-proof-of-stake

Crypto Off-Chain vs. On-Chain Transactions: What Are They? [Інтернет]. Bybit Learn. 2021 [цит. за 29, Січень 2023]. Доступний у: https://learn.bybit.com/blockchain/off-chain-vs-on-chain-transactions/

Bitcoin White Paper [Інтернет]. [цит. за 03, Лютий 2023]. Доступний у: https://bitcoinwhitepaper.co/

What is Simplified Payment Verification (SPV)? Definition & Meaning | Crypto Wiki [Інтернет]. BitDegree.org Crypto Exchanges. [цит. за 20, Січень 2023]. Доступний у: https://www.bitdegree.org/crypto/learn/crypto-terms/what-is-simplified-payment-verification-spv

What is ARP Spoofing | ARP Cache Poisoning Attack Explained | Imperva [Інтернет]. Learning Center. [цит. за 23, Січень 2023]. Доступний у: https://www.imperva.com/learn/application-security/arp-spoofing/

DHCP Starvation Attack [Інтернет]. GeeksforGeeks. 2022 [цит. за 21, Лютий 2023]. Доступний у: https://www.geeksforgeeks.org/dhcp-starvation-attack/

Published
2022-12-27
Cited
How to Cite
Rafalskyi, M. (2022). OFFENSES IN DECENTRALIZED SYSTEMS . The Journal of V. N. Karazin Kharkiv National University. Series Law, (34), 26-36. https://doi.org/10.26565/2075-1834-2022-34-03
Section
Theory and history of state and law; history of political and legal doctrines