ments in Bitcoin or mechanisms for their prevention
have not been studied. In this work, we analyze
double spending attacks in detail and we demon-
strate that double-spending attacks can be mounted
on currently deployed version of Bitcoin, when used
in fast payments. We further show that the measures
recommended by Bitcoin developers for fast trans-
actions are not always effective in resisting double-
spending; we argue that if those recommendations
are followed, double-spending attacks on Bitcoin
are still possible. Finally, we propose a lightweight
countermeasure to detect double-spending attacks in
fast transactions.
More specifically, our contributions in this paper
can be summarized as follows:
We measure and analyze the time required to con-
firm transactions in Bitcoin. Our analysis shows
that transaction confirmation in Bitcoin can be
modeled with a shifted geometric distribution and
that, although the average time to confirm transac-
tions is almost 10 minutes, its standard deviation is
approximately 15 minutes. We argue that this hin-
ders the reliance of transaction confirmation when
dealing with fast payment scenarios.
We thoroughly analyze the conditions for perform-
ing successful double-spending attacks against fast
payments in Bitcoin. We then present the first
comprehensive double-spending measurements in
Bitcoin. Our experiments were conducted us-
ing modified Bitcoin clients running on a hand-
ful of hosts located around the globe. Our results
demonstrate the feasibility and easy realization of
double-spending attacks in current Bitcoin client
implementations.
We explore and evaluate empirically a number of
solutions for preventing double-spending attacks
against fast payments in Bitcoin. We show that the
recommendations of Bitcoin developers on how to
counter double-spending are not always effective.
Leveraging on our results, we propose a lightweight
countermeasure that enables the secure verification
of fast payments. ...