Firmware Distribution as Attack Surface: A Security Study of ASIC Cryptocurrency Miners
Pierre Pouliquen, Hadrien Barral, David Naccache, Thibaut Heckmann, Antoine Houssais
TLDR
ASIC cryptocurrency miner firmware distribution is a major attack surface, enabling large-scale compromises through static analysis.
Key contributions
- Introduces a scalable methodology for static analysis of publicly distributed ASIC miner firmware.
- Analyzes 134 firmware images from major manufacturers (Bitmain, MicroBT, Canaan, Iceriver).
- Identifies vulnerabilities enabling large-scale attacks, including firmware phishing and Stratum V1 exploitation.
- Validates findings on real devices, confirming attack capabilities from public firmware artifacts.
Why it matters
This study highlights critical security flaws in the ASIC cryptocurrency mining ecosystem, a core component of blockchain infrastructure. By showing that firmware distribution itself is a primary attack surface, it significantly lowers the barrier for adversaries to compromise miners and impact the stability of blockchain networks.
Original Abstract
ASIC cryptocurrency miners are a core component of blockchain infrastructures, directly converting computation and energy into monetary value. Despite their economic im- portance, their security is rarely evaluated in a structured manner. In this paper, we show that the firmware distribution ecosystem of mining devices fundamentally challenges existing trust assumptions. We introduce a scalable methodology based on the collection and static analysis of publicly distributed firmware artifacts, requiring neither device access nor runtime interaction. Applying this approach, we reconstruct and analyze 134 firmware images spanning manufacturers that account for over 99% of deployed miners (Bitmain, MicroBT, Canaan, Iceriver). Our re- sults reveal that firmware artifacts alone are sufficient to recover internal architecture, identify security weaknesses, and recon- struct complete attack paths leading to high-impact adversarial objectives. In particular, our analysis reveals vulnerabilities that enable realistic large-scale attack scenarios, including firmware phishing and the exploitation of miners still operating over Stratum V1. Validation on two real devices confirms that publicly distributed artifacts closely reflect deployed software and that these weaknesses translate into attack capabilities. Overall, our study shows that firmware distribution mechanisms themselves constitute a primary attack surface, significantly lowering the barrier to compromise in the ASIC mining ecosystem.
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.