Finally got around to reading this Selfish Mining Paper.
http://arxiv.org/pdf/1311.0243v5.pdfWe now describe our strategy, called Selfsh-Mine. As we show in Section Selfish-Mine allows a pool of sufficient size to obtain a revenue larger than its ratio of mining power. For simplicity, and without loss of generality, we assume that miners are divided into two groups, a colluding minority pool that follows the selfsh mining strategy, and a majority that follows the honest mining strategy (others). It is immaterial whether the hon.est miners operate as a single group, as a collection of groups, or individually.
Here the author makes some very poor assumptions. It is possible to easily thwart this attack by making a double-agent miner who claims to be part of this subversive pool, but isn't and publishes the selfish chain information to the outside. This double agent miner need not even have any real mining power, they only need to CLAIM such. Thus the cost of this defense is virtually negligible. This would thwart this attack vector entirely.
-bm