Bhudia, Alpesh, O’Keeffe, Daniel, Hurley-Smith, Darren (2024) Revoke: Mitigating Ransomware Attacks Against Ethereum Validators. In: Lecture Notes in Computer Science. Computer Security – ESORICS 2024: 29th European Symposium on Research in Computer Security. Proceedings Part IV. 14985. pp. 333-353. Springer ISBN 978-3-031-70902-9. (doi:10.1007/978-3-031-70903-6_17) (KAR id:112635)
|
PDF
Author's Accepted Manuscript
Language: English |
|
|
Download this file (PDF/659kB) |
Preview |
| Request a format suitable for use with assistive technology e.g. a screenreader | |
| Official URL: https://doi.org/10.1007/978-3-031-70903-6_17 |
|
Abstract
Recent research has shown the viability of ransomware attacks on Ethereum Proof-of-Stake (PoS) validators, whereby an attacker that compromises a validator can threaten to perform slashable actions unless a ransom is paid. Given the size of Ethereum validator stakes, validators could become an attractive target for future ransomware. However, there are currently no practical mechanisms to recover from ransomware since even validators that attempt to exit the network are retrospectively slashable during the withdrawal period. We propose Revoke, an extension of Ethereum that mitigates the impact of ransomware attacks on validators. Revoke introduces a new decentralised key revocation mechanism that enables validators to change their signing key without withdrawing their stake. A challenge for Revoke is balancing the utility of the revocation mechanism for individual validators against potential reductions in overall chain security. Revoke exposes a trade-off whereby validators cannot propose or attest to blocks during the revocation process, and hence incur inactivity penalties, but are not susceptible to much larger slashing penalties. Our design extends the Ethereum specification to capture the impact of Revoke’s core key-change mechanism on both the beacon-chain state transition function and fork-choice decisions. We also adapt the existing safety and liveness proofs of Ethereum to incorporate the effects of Revoke.
| Item Type: | Conference or workshop item (Proceeding) |
|---|---|
| DOI/Identification number: | 10.1007/978-3-031-70903-6_17 |
| Projects: | Ethereum Proof of Stake - Security Analysis of COnsensus Mechanisms |
| Uncontrolled keywords: | ransomware, protocol analysis, security |
| Subjects: | Q Science > QA Mathematics (inc Computing science) > QA 76 Software, computer programming, |
| Institutional Unit: | Schools > School of Computing |
| Former Institutional Unit: |
There are no former institutional units.
|
| Depositing User: | Darren Hurley-Smith |
| Date Deposited: | 16 Jan 2026 08:48 UTC |
| Last Modified: | 21 Jan 2026 14:21 UTC |
| Resource URI: | https://kar.kent.ac.uk/id/eprint/112635 (The current URI for this page, for reference purposes) |
- Link to SensusAccess
- Export to:
- RefWorks
- EPrints3 XML
- BibTeX
- CSV
- Depositors only (login required):

https://orcid.org/0000-0002-9896-9308
Altmetric
Altmetric