Ethereum “Mining”, PoS, and Security

Section VII: Ethereum Framework

Army Cyber Institute

April 9, 2026

Agenda

  • Today we explore how Ethereum organizes data, proposes blocks, and reaches agreement.
  • We’ll trace the shift from Proof of Work “mining” to Proof of Stake “validation.”
  • Topics: block structure and headers, validator duties and rewards, and how consensus ensures shared state.
  • Security and incentives are part of the story — they explain why these mechanisms work under pressure.

Anatomy of the Ethereum Block

  • Think of Ethereum as a global append-only state machine shared by peers.

  • Anyone can submit a transaction; validators propose blocks and attesters verify and accept.

  • The chain with the most cumulative attestation weight is the canonical history.

  • Ownership is control of private keys (EOAs and contract accounts).

  • Incentives (block rewards + fees + MEV) fund security and honest participation.

EthBlockFlow Chain Canonical Head (heaviest attested) Wallet User Wallet Chain->Wallet Mempool Mempool Wallet->Mempool signed tx Validator Proposer (Validator) Mempool->Validator candidate set Block New Block Validator->Block builds block Nodes Full Nodes & Attesters Block->Nodes Nodes->Chain validate + attest

Ethereum Blocks: Header Structure

  • Block = Header + Body
    • Header: commitments and metadata.
    • Body: ordered transactions + “ommer” references.
  • Core header roots (Merkle–Patricia tries):
    • A Merkle–Patricia trie is a key-value data structure that combines prefix-based path compression for efficient lookups with Merkle hashing so that a single root hash commits to all entries and any entry can be verified with a short proof.
    • state_root → commits to global state after execution.
    • transactions_root → commits to ordered list of transactions.
    • receipts_root → commits to execution results (status, gas, logs).
  • Operational Fields: gas accounting, parent hash, indexing, etc.

Ommer blocks, also known as uncle blocks, refer to valid blocks that are not included in the main chain. This occurs when multiple miners create valid blocks at nearly the same time, resulting in one being left out.

EthBlock cluster_block Ethereum Block cluster_header Header (Commitments + Metadata) cluster_body Body (Execution Data) state state_root txroot transactions_root state->txroot rcproot receipts_root txroot->rcproot meta Operational Fields rcproot->meta body_placeholder Transactions Ommers Receipts meta->body_placeholder

Ethereum Blocks: The Body

  • Block Body = Execution Data
    • Transactions: signed actions initiated by EOAs (users).
    • Ommers: references to valid but non-canonical PoW blocks (unused in PoS).
    • Receipts: per-transaction outcomes — success/failure, gas used, and logs.

EthBlockBody cluster_block Ethereum Block cluster_body Body cluster_header Header txs Transactions header_placeholder->txs ommers Ommers (historical PoW) txs->ommers receipts Receipts ommers->receipts

Inside the Roots — Inputs, Outputs, and State

  • transactions_root: proves the ordered list of transactions. Trie keys encode position (0, 1, 2 …), enabling inclusion + order proofs.
  • receipts_root: proves the outcomes of those transactions. Receipts store status, gasUsed, and logs.
  • state_root: commits to the entire world state after execution. Each account (nonce, balance, code, storageRoot) sits in the state trie.
  • These roots let full nodes and light clients verify:
    what was included, what happened, and the final state.
  • The body enables full nodes to recompute these roots

Before the Merge: Beacon Chain and Layer Forks

  • Beacon Chain launched Dec 2020 — a parallel PoS chain where validators staked 32 ETH and ran consensus duties for ~21 months alongside PoW mainnet.
  • This parallel run bootstrapped the validator set and proved PoS liveness under real conditions before it carried production traffic.
  • Bellatrix (Consensus Layer fork): prepared the Beacon Chain to accept execution payloads. Paris (Execution Layer fork): stopped honoring PoW blocks.
  • Two layers, upgraded independently, then joined — the architectural basis for the hot-swap that followed.

The Merge: Transition to PoS

  • 15 Sep 2022: mainnet switched from PoW to PoS during live operation, handing block production to the Beacon Chain’s already-active validators.
  • TTD (Total Terminal Difficulty) triggered the cutover — cumulative difficulty, not a block number, so miners could not game the exact transition block.
  • Contracts, balances, and application state continued uninterrupted — only the consensus engine changed.
  • PoW security = continuous brute-force hashing (energy is the cost); PoS security = BLS signing (computationally trivial). The ~99.95% energy drop follows mechanically from removing the hash race.

PoS Overview: Validators, Committees, and Clients

  • Join by staking 32 ETH in the deposit contract on the execution layer.
  • Each validator runs:
    • Execution client → handles transactions and state (EVM).
    • Consensus client → runs the Beacon Chain: assigns duties, verifies blocks, manages committees and finality.
    • Validator process → signs duties assigned by the consensus client.
  • Duties (execution):
    • Rarely: propose a block for a slot.
    • Frequently: attest within a randomly selected committee that votes on block validity and checkpoints.
  • Rewards for timely, correct attestations; penalties for missed or conflicting votes.
  • Slashing burns stake for provable equivocation or surround voting.
  • Operational focus: client diversity, monitoring, secure key handling.

Committee attesters earn small rewards for each timely, correct vote. Proposers receive a larger reward that includes attestation aggregation bonuses and transaction fees. Rewards are funded by new ETH issuance and priority fees paid by users.

Validator Selection & Randomness

  • Purpose: prevent predictability or bias in proposer and committee selection.
  • Source: RANDAO — a multi-party commit–reveal randomness beacon.
    • Each epoch, validators first commit to a secret hash, then later reveal the secret.
    • Reveals are mixed (XORed) into the epoch’s random seed.
  • Assignments:
    • The Beacon Chain uses the seed to shuffle validators and assign proposers/committees per slot.
    • Short notice (~minutes) limits the chance to target specific validators.
  • Incentives:
    • Withholding a reveal forfeits rewards and only minimally affects the outcome.
    • Many contributors make it infeasible for one actor to steer selection.

RANDAO is stake-weighted: each validator’s influence on the random seed is proportional to their effective balance (up to 32 ETH per key), so selection probability scales with the amount of ETH staked.

Verifiable Random Functions (VRFs)

  • Context: Ethereum uses RANDAO for validator selection. Other PoS protocols (Algorand, Cardano/Ouroboros Praos) use VRFs instead.

  • Purpose: generate private, verifiable randomness for individual validators.

  • Analogy: a VRF is like a provable coin flip — each validator flips privately but can show cryptographic proof the flip was honest.

  • Mechanics:

    • Each validator inputs a secret key and public parameters (e.g., slot, epoch) into a VRF → outputs a random value + proof.
    • The validator checks if the value falls below a stake-weighted threshold (e.g., hash(output) < threshold × stake).
    • If so, it has won the slot and broadcasts its proof.
    • Others verify the proof using the validator’s public key — no coordination or trust required.
  • Properties:

    • Unpredictable until evaluated — prevents pre-computation or bias.
    • Verifiable by anyone — proof binds randomness to the validator’s key and epoch.

Ethereum does not currently use VRFs. Unlike RANDAO, where the last revealer can marginally bias the seed, VRFs eliminate this by keeping the output secret until broadcast. VRFs have been discussed as a potential future enhancement to Ethereum’s randomness pipeline.

Global Randomness: RANDAO + VDF Beacons

  • Why global randomness?
    Individual selection (VRFs) decides who wins locally, but the network still needs a shared, unbiased seed for committee rotation and epoch-level tasks.

  • RANDAO (RAndom DAO):
    Despite the name, RANDAO is not a DAO — it is a pseudorandom number generator (PRG) built into Ethereum’s Beacon Chain for committee and proposer selection.

    1. Validators commit to random values (hash commitments).
    2. Later, they reveal them; revealed values are XORed → collective seed.
    3. The Beacon Chain uses this seed to shuffle validators into committees and assign proposers each epoch.
    4. Problem: the last revealer could withhold to bias the result.
  • Verifiable Delay Function (VDF):

    • Adds a time-locked transformation seed' = VDF(seed) that everyone can verify but no one can compute faster.
    • Prevents the final participant from seeing and influencing the outcome in advance.
    • VDFs are a proposed enhancement — not yet deployed on Ethereum mainnet.
  • Result:

    • A shared, unbiased randomness beacon usable by all nodes.

RANDAO is Ethereum’s current production randomness mechanism. The last-revealer bias is considered minor in practice because withholding forfeits rewards and the effect is diluted by hundreds of other contributors. VDFs would close this gap entirely but remain under research.

Global Randomness: RANDAO + VDF Beacons: Image

Beacon C1 Commit (hash r₁) Reveal Reveal r₁, r₂, r₃ → XOR C1->Reveal C2 Commit (hash r₂) C2->Reveal C3 Commit (hash r₃) C3->Reveal Seed Combined seed Reveal->Seed VDF VDF(seed) → unbiased output Seed->VDF

Key idea: RANDAO + VDF beacons provide collective, bias-resistant entropy — the public dice roll that keeps PoS selection fair across epochs.

Slots and Epochs

  • Slot = 12 seconds; at most one block proposal per slot.
  • Epoch = 32 slots (~6.4 minutes); committees reshuffle each epoch.
  • Each slot, one committee (a subset of all validators) attests — over a full epoch, every active validator attests exactly once.
  • Missed slots happen — liveness continues through the next proposal.
  • Finality escalates through epoch checkpoints (Casper-FFG).
  • Per-slot lifecycle: proposer broadcasts a block (~0–4s), committee attests to it (~4s mark), attestations are BLS-aggregated and included in a subsequent slot’s block.

The original wording “most validators attest each slot” is misleading. In practice, the full validator set is divided evenly across the 32 slots of an epoch. Each validator is assigned to exactly one slot per epoch, so only ~1/32 of validators attest in any given slot — not most.

Forks in Proof of Stake — Causes and Resolution

  • Each slot has one designated proposer, but messages spread asynchronously.
  • Short-term forks occur when:
    • The proposer’s block arrives late or not at all.
    • Attestations propagate in different orders across validators.
    • A proposer equivocates or two blocks exist for the same slot.
  • Result:
    • Validators may temporarily disagree on the chain head.
  • Resolution:
    • Attestations serve as stake-weighted votes for blocks.
    • The fork-choice rule — LMD-GHOST (Latest-Message-Driven Greedy Heaviest-Observed SubTree) — follows the branch with the most recent total attestation weight.
    • As new votes arrive, honest nodes converge on the same head.

LMD-GHOST starts at the last justified checkpoint and walks down the block tree, choosing whichever child has the greatest stake weight from validators’ latest attestations. Each validator counts once (their most recent vote only). The result is a head that reflects the current majority view, not historical block count.

Gasper: Fork Choice + Finality

  • Gasper = the combined consensus protocol that pairs two mechanisms:
    • LMD-GHOST (fork choice): picks the head by following the branch with the greatest latest attested stake weight.
    • Casper-FFG (finality gadget): finalizes checkpoints once ≥ 2/3 of total stake votes consistently across epochs.
  • Finality sequence (across two epochs):
    1. Validators cast source→target votes; when ≥ 2/3 of stake supports a checkpoint link, the target becomes justified.
    2. When the next epoch’s checkpoint is also justified, the earlier checkpoint becomes finalized — economically irreversible.
  • Safety: reverting a finalized checkpoint implies ≥ 1/3 of total stake must be slashed.
  • Liveness: inactivity leak gradually restores a supermajority after major outages.

Gasper is the name for Ethereum’s full consensus protocol. Casper-FFG is one component within it — the finality gadget. LMD-GHOST is the other — the fork-choice rule. “Casper” alone is sometimes used loosely to refer to either the gadget or the broader system, but precisely it means the FFG finality layer only.

Double Spending (Threat Model)

  • Goal: accept payment, then publish a conflicting history that erases it.
  • PoW: requires sustained majority hash power to outpace the honest chain.
  • PoS: requires majority stake and willingness to be slashed — post-finality rewrites destroy at least 1/3 of bonded stake.
  • Mainnet double-spends are economically impractical under PoS finality.
  • Settlement policy: wait for finalized checkpoints (PoS) rather than counting confirmations (PoW).

Real-world example: Ethereum Classic suffered a series of 51% double-spend attacks in 2020, where attackers rented enough hash power to reorganize thousands of blocks and reverse exchange deposits worth millions of dollars. This was feasible because ETC’s total hash rate was low enough to rent temporarily. Ethereum mainnet’s shift to PoS changes the calculus entirely — an attacker cannot rent stake and walk away; they must own it and accept that it will be slashed.

Balance Attack

  • Goal: split the network into sub-partitions with roughly equal validator weight.
  • Delay cross-partition communication so each side builds its own fork and accumulates attestations independently.
  • Selectively release withheld blocks or attestations to one side, making its branch heavier under LMD-GHOST; the other side reorgs.
  • Exploits propagation asymmetry rather than absolute majority of stake.
  • Defenses: diverse peering, fast relay networks, client diversity, monitoring for unusual reorg depth or participation dips.

Real-world relevance: In 2023, researchers demonstrated balancing-style attacks against LMD-GHOST in testnet conditions, exploiting proposer boost timing and attestation delays. Ethereum responded with proposer boost — a fork-choice weight bonus given to the current slot’s block when seen on time — which raises the cost of these attacks significantly. The episode illustrates that consensus security depends on network plumbing, not just cryptography.

Security Risk: Smart Contract Code Reuse

  • Less than 10% of contracts are unique bytecode; templates dominate deployments.
  • One vulnerability can impact thousands of dependent contracts (e.g., Parity multisig 2017).
  • Attackers fingerprint bytecode families to find mass-exploitation targets.
  • Mitigations: audited libraries, invariants, upgrade discipline, runtime guards.
  • Encourage diversity in implementations and proactive upgrade playbooks.

Real-World Ethereum Security Examples

  • The DAO Hack (June 2016): A reentrancy vulnerability in The DAO’s smart contract allowed an attacker to drain ~$60M in ETH by repeatedly calling the withdraw function before balances updated. The Ethereum community responded with a controversial hard fork, splitting the chain into Ethereum (ETH) and Ethereum Classic (ETC).

  • Parity Multisig Wallet (July 2017): Hackers exploited a visibility bug in the Parity multisig library contract, stealing ~$31M in ETH from multiple wallets. A second Parity incident in November 2017 accidentally froze over 500,000 ETH when a user triggered a self-destruct on the shared library — a textbook case of code-reuse risk.

  • Beacon Chain Finality Delays (May 2023): On May 11–12, Ethereum mainnet experienced two finality delays — the first lasting ~25 minutes, the second over an hour. Consensus client bugs (Prysm, Teku) caused validators to go offline, dropping participation below the 2/3 threshold needed for finalization. Blocks continued to be produced (liveness held), and the network self-recovered without intervention. Client diversity was credited as the key reason the outage stayed brief.

  • Ethereum Classic 51% Attacks (2020): ETC suffered multiple double-spend attacks where attackers rented enough hash power to reorganize thousands of blocks and reverse exchange deposits. This contrast illustrates why Ethereum’s move to PoS — where stake cannot be rented and walked away from — fundamentally changes the attacker’s calculus.

Nothing-at-Stake

  • Risk: in naive PoS, validators could sign multiple competing forks at no cost, undermining convergence.
  • Defense: Ethereum enforces objective slashing for three offenses:
    1. Double proposal — two blocks for the same slot.
    2. Double attestation — two votes for the same target epoch with different chain heads.
    3. Surround vote — an attestation whose source→target range encloses or is enclosed by a prior vote.
  • Evidence is purely cryptographic — two conflicting signatures from the same key. Intent is irrelevant once proofs exist.
  • Correlation penalty: slashing severity scales with how many validators are slashed in the same ~18-day window. An isolated mistake costs ~1 ETH; a coordinated attack involving ≥1/3 of stake can burn the full 32 ETH per validator.
  • Slashing events propagate to all clients; anyone can submit evidence, making enforcement decentralized.

All known mainnet slashings have been accidental — misconfigured backups causing double attestations (Staked, 2021; Bitcoin Suisse, 2023). No intentional equivocation has occurred, suggesting the penalty structure deters it effectively.

Finality Delay

  • May 11–12, 2023: Ethereum mainnet experienced its first finality delays — consensus client bugs (Prysm, Teku) overloaded validators, dropping participation below the 2/3 threshold needed to finalize checkpoints.
    • First incident: ~25 minutes (4 epochs without finality).
    • Second incident: over an hour (9 epochs), triggering the inactivity leak penalty.
  • What kept working: blocks continued to be proposed and transactions processed — liveness was never lost, only finality paused.
  • What recovered it: client diversity meant unaffected clients (e.g., Lighthouse) kept attesting. The inactivity leak gradually penalized offline validators, restoring the 2/3 supermajority. No manual intervention was required.
  • Operational lesson: exchanges, bridges, and high-value services should pause large settlements when finality stalls and resume only after consecutive finalized epochs.

The May 2023 incidents validated Ethereum’s design under stress: the protocol distinguished between liveness (blocks keep coming) and safety (finality locks history), degraded gracefully, and self-healed. The community credited client diversity as the primary reason both outages stayed brief.

Censorship

  • Real-world case — OFAC / Tornado Cash (2022–2023): After the U.S. Treasury sanctioned Tornado Cash in August 2022, the dominant MEV-Boost relay (Flashbots) began filtering out sanctioned transactions. By November 2022, ~77% of relayed blocks excluded those transactions.
  • Censorship occurred at the relay and builder layer, not the protocol itself — validators outsource block construction to builders via MEV-Boost, and most builders chose to comply with sanctions.
  • Community response: Flashbots open-sourced its relay code; non-censoring relays (Ultra Sound, Agnostic, bloXroute) launched. By mid-2023, censored blocks dropped to ~30%. Vitalik Buterin publicly supported treating sustained base-layer censorship as a slashable attack.
  • Takeaway: Ethereum’s protocol never enforced censorship — sanctioned transactions still reached the chain, just with longer delays. But the episode exposed how infrastructure centralization (few relays, few builders) can create soft censorship even in a permissionless system.
  • Proposed mitigations: inclusion lists (forcing proposers to include pending transactions), encrypted mempools, and greater relay/builder diversity.

Exercises:

Conclusion: Summary of Concepts

  • Block structure: Headers cryptographically commit to inputs (transactions_root), outcomes (receipts_root), and world state (state_root) — enabling verification without full re-execution.
  • PoS consensus: RANDAO randomness selects validators → committees attest in 12-second slots → LMD-GHOST picks the head → Casper-FFG finalizes checkpoints across epochs.
  • Security is layered: The DAO and Parity exploited the application layer; finality delays hit the consensus layer; balance attacks and censorship target the network layer. No single defense covers all three.
  • Defenses are economic + operational: Slashing deters equivocation, inactivity leaks restore finality, client diversity limits blast radius, and checkpoint sync blocks long-range attacks.
  • Operational takeaway: Monitor participation and finality status, settle on finalized checkpoints (not block count), and treat infrastructure concentration as a security risk.

Conclusion: Discussion & Reflection

  • Which security assurance (cryptography, protocol design, incentives) feels most fragile today?
  • How does PoS change your threat model compared to PoW deployments?
[1]
G. Wood, “Ethereum: A Secure Decentralised Generalised Transaction Ledger, EIP-150 Revision.” 2016. Available: https://ethereum.github.io/yellowpaper/paper.pdf
[2]
Ethereum Developers, “Proof-of-stake (PoS).” Accessed: Oct. 27, 2025. [Online]. Available: https://ethereum.org/developers/docs/consensus-mechanisms/pos/
[3]
Ethereum Developers, “Block proposal.” Accessed: Oct. 27, 2025. [Online]. Available: https://ethereum.org/developers/docs/consensus-mechanisms/pos/block-proposal/
[4]
Ethereum.org, “Blocks — Developer Docs.” 2025. Available: https://ethereum.org/en/developers/docs/blocks/
[5]
ethereum.org, “Ethereum history.” Accessed: Mar. 27, 2026. [Online]. Available: https://ethereum.org/en/history/
[6]
ethereum.org, “The merge.” Accessed: Mar. 23, 2026. [Online]. Available: https://ethereum.org/roadmap/merge/
[7]
CCRI, CCRI Indices for Ethereum’s Merge.” Accessed: Oct. 28, 2025. [Online]. Available: https://indices.carbon-ratings.com/ethereum-merge
[8]
Ethereum.org, “Nodes and ClientsDeveloper Docs.” 2025. Available: https://ethereum.org/en/developers/docs/nodes-and-clients/
[9]
Ethereum Developers, “Ethereum proof-of-stake Attack and Defense.” Accessed: Oct. 27, 2025. [Online]. Available: https://ethereum.org/developers/docs/consensus-mechanisms/pos/attack-and-defense/
[10]
Ethereum.org, “Smart ContractsDeveloper Docs.” 2025. Available: https://ethereum.org/en/developers/docs/smart-contracts/
[11]
D. A. Siegel, “Understanding the DAO Attack.” 2016. Available: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3014782
[12]
Ethereum Foundation, “Critical update re: DAO vulnerability.” Accessed: Mar. 23, 2026. [Online]. Available: https://blog.ethereum.org/2016/06/17/critical-update-re-dao-vulnerability
[13]
Beaconcha.in, “Ethereum Beacon Chain epochs 200750–200756: Finality issues.” Accessed: Mar. 27, 2026. [Online]. Available: https://beaconcha.in/epoch/200752
[14]
M. Hristov, “Ethereum Validators Lost Over $1 Million to Prysm Bug.” Accessed: Mar. 27, 2026. [Online]. Available: https://beincrypto.com/ethereum-validators-lost-over-1-million-to-prysm-bug/
[15]
Ether Alpha, “Client Diversity | Ethereum.” Accessed: Oct. 27, 2025. [Online]. Available: https://clientdiversity.org
[16]
Flashbots, Ltd, “Flashbots.” Accessed: Oct. 27, 2025. [Online]. Available: https://www.flashbots.net
[17]
U.S. Dept. of Treasury, “U.S. Treasury Sanctions Notorious Virtual Currency Mixer Tornado Cash,” United States Government, Washington, D.C., Press Release, Aug. 2022. Accessed: Oct. 28, 2025. [Online]. Available: https://home.treasury.gov/news/press-releases/jy0916
[18]
MEV Watch, “MEV watch.” Accessed: Mar. 28, 2026. [Online]. Available: https://www.mevwatch.info/