Blockchain System Defensive Overview for Double-Spend and Selfish Mining Attacks: A Systematic Approach
暂无分享,去创建一个
Yi Wang | George C. Giakos | Hongda Shen | Bingyang Wei | Kervins Nicolas | G. Giakos | Bingyang Wei | Yi Wang | Hongda Shen | Kervins Nicolas
[1] Ethan Heilman,et al. One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner (Poster Abstract) , 2014, Financial Cryptography Workshops.
[2] Vijay Janapa Reddi,et al. Deep Reinforcement Learning for Cyber Security , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[3] Hokey Min,et al. Blockchain technology for enhancing supply chain resilience , 2019, Business Horizons.
[4] A. Juels,et al. SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning , 2021, NDSS.
[5] Kai Petersen,et al. Systematic Mapping Studies in Software Engineering , 2008, EASE.
[6] Miguel P Caldas,et al. Research design: qualitative, quantitative, and mixed methods approaches , 2003 .
[7] Alex Biryukov,et al. Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.
[8] A Survey on Attacks of Bitcoin , 2018 .
[9] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[10] Joseph Sarkis,et al. Blockchain technology and its relationships to sustainable supply chain management , 2018, Int. J. Prod. Res..
[11] Jiong Jin,et al. Towards Fair and Privacy-Preserving Federated Deep Models , 2019, IEEE Transactions on Parallel and Distributed Systems.
[12] Ivan Porres,et al. Distributed virtual machine consolidation: A systematic mapping study , 2018, Comput. Sci. Rev..
[13] Johan Pouwelse,et al. TrustChain: A Sybil-resistant scalable blockchain , 2017, Future Gener. Comput. Syst..
[14] S. Matthew Weinberg,et al. On the Instability of Bitcoin Without the Block Reward , 2016, CCS.
[15] Daniel Reijsbergen,et al. Decentralized Lightweight Detection of Eclipse Attacks on Bitcoin Clients , 2020, 2020 IEEE International Conference on Blockchain (Blockchain).
[16] Lin Chen,et al. Supporting Blockchain-Based Cryptocurrency Mobile Payment With Smart Devices , 2020, IEEE Consumer Electronics Magazine.
[17] Meng Shen,et al. Data Security and Privacy in Bitcoin System: A Survey , 2020, Journal of Computer Science and Technology.
[18] Qi Zhang,et al. Sidechain technologies in blockchain networks: An examination and state-of-the-art review , 2020, J. Netw. Comput. Appl..
[19] Tiago M. Fernández-Caramés,et al. A Review on the Use of Blockchain for the Internet of Things , 2018, IEEE Access.
[20] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[21] Yanjiao Chen,et al. Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools , 2020, IEEE/ACM Transactions on Networking.
[22] Meni Rosenfeld,et al. Analysis of Hashrate-Based Double Spending , 2014, ArXiv.
[23] Mohamed Amine Ferrag,et al. DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids , 2020, IEEE Transactions on Engineering Management.
[24] Ren Zhang. Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin , 2015, IACR Cryptol. ePrint Arch..
[25] Zibin Zheng,et al. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).
[26] Jonathan Katz,et al. Competing (Semi-)Selfish Miners in Bitcoin , 2019, AFT.
[27] Deke Guo,et al. Selfholding: A combined attack model using selfish mining with block withholding attack , 2019, Comput. Secur..
[28] Manuel Díaz,et al. On blockchain and its integration with IoT. Challenges and opportunities , 2018, Future Gener. Comput. Syst..
[29] Wei-Chiang Hong,et al. Machine Learning Adoption in Blockchain-Based Smart Applications: The Challenges, and a Way Forward , 2020, IEEE Access.
[30] James J. Cordeiro,et al. Blockchain technology: Business, strategy, the environment, and sustainability , 2019 .
[31] Bart Preneel,et al. Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin , 2017, CT-RSA.
[32] Zhuming Bi,et al. Blockchain and Internet of Things for Modern Business Process in Digital Economy—the State of the Art , 2019, IEEE Transactions on Computational Social Systems.
[33] Zhiniang Peng,et al. All roads lead to Rome: Many ways to double spend your cryptocurrency , 2018, ArXiv.
[34] Célio Vinicius N. de Albuquerque,et al. On the detection of selfish mining and stalker attacks in blockchain networks , 2020, Ann. des Télécommunications.
[35] Josep M. Guerrero,et al. Blockchain for power systems: Current trends and future applications , 2020 .
[36] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[37] R. Monfared,et al. Blockchain ready manufacturing supply chain using distributed ledger , 2016 .
[38] Jong-Hyouk Lee,et al. Double-Spending With a Sybil Attack in the Bitcoin Decentralized Network , 2019, IEEE Transactions on Industrial Informatics.
[39] Emin Gün Sirer,et al. Selfish Mining Re-Examined , 2020, Financial Cryptography.
[40] Zhen Liu,et al. Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol , 2018, IACR Cryptol. ePrint Arch..
[41] Guillermo Navarro-Arribas,et al. Double-spending prevention for Bitcoin zero-confirmation transactions , 2018, International Journal of Information Security.
[42] Tongtong Li,et al. Bitcoin and Blockchain: Security and Privacy , 2019, IEEE Internet of Things Journal.
[43] P. Sanjeevikumar,et al. Enhancement of Security and Handling the Inconspicuousness in IoT Using a Simple Size Extensible Blockchain , 2020 .
[44] Camilo Rocha,et al. Double-spend Attack Models with Time Advantange for Bitcoin , 2016, CLEI Selected Papers.
[45] Maria Gradinariu Potop-Butucaru,et al. ZeroBlock: Timestamp-Free Prevention of Block-Withholding Attack in Bitcoin , 2016 .
[46] Chen Feng,et al. Selfish Mining in Ethereum , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).
[47] Maria Domenica Di Benedetto,et al. Cyber-Physical Systems Security: a Systematic Mapping Study , 2016, J. Syst. Softw..
[48] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[49] Nicolas Mayer,et al. A Comprehensive Reference Model for Blockchain-based Distributed Ledger Technology , 2017, ER Forum/Demos.
[50] Nicolas Courtois,et al. On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.
[51] Meni Rosenfeld,et al. Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.
[52] Rui Zhang,et al. Security and Privacy on Blockchain , 2019, ACM Comput. Surv..
[53] Ghassan O. Karame,et al. Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin , 2012, IACR Cryptol. ePrint Arch..
[54] Samuel Fosso Wamba,et al. Bitcoin, Blockchain and Fintech: a systematic review and case studies in the supply chain , 2018 .
[55] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[56] Jamal N. Al-Karaki,et al. Towards building a blockchain framework for IoT , 2020, Cluster Computing.
[57] Elaine Shi,et al. FruitChains: A Fair Blockchain , 2017, IACR Cryptol. ePrint Arch..
[58] Ghassan O. Karame,et al. Double-spending fast payments in bitcoin , 2012, CCS.
[59] Xiaojiang Du,et al. Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering , 2020, Science China Information Sciences.
[60] Gavin Andresen,et al. An Analysis of Attacks on Blockchain Consensus , 2016, ArXiv.
[61] Marko Hölbl,et al. A Systematic Review of the Use of Blockchain in Healthcare , 2018, Symmetry.
[62] Sherali Zeadally,et al. A survey on privacy protection in blockchain system , 2019, J. Netw. Comput. Appl..
[63] Keke Gai,et al. Privacy-Preserving Energy Trading Using Consortium Blockchain in Smart Grid , 2019, IEEE Transactions on Industrial Informatics.
[64] Xinying Yu,et al. A Security Detection Model for Selfish Mining Attack , 2019, BlockSys.
[65] Ghassan O. Karame,et al. Misbehavior in Bitcoin: A Study of Double-Spending and Accountability , 2015, TSEC.
[66] Cyril Grunspan,et al. On profitability of selfish mining , 2018, ArXiv.
[67] Hongbo Zhu,et al. Blockchain for the IoT and industrial IoT: A review , 2020, Internet Things.
[68] Kyungbaek Kim,et al. A Survey about Consensus Algorithms Used in Blockchain , 2018, J. Inf. Process. Syst..
[69] Mayank Vatsa,et al. DeepRing: Protecting Deep Neural Network With Blockchain , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[70] Mohamed Aymen Chalouf,et al. Survey on blockchain-based applications in internet of vehicles , 2020, Comput. Electr. Eng..
[71] Aziz Mohaisen,et al. Countering Selfish Mining in Blockchains , 2018, 2019 International Conference on Computing, Networking and Communications (ICNC).
[72] Chirag Modi,et al. Preventing Sybil Attack in Blockchain using Distributed Behavior Monitoring of Miners , 2019, 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT).
[73] Bhaskar Krishnamachari,et al. A Survey of Blockchain-Based Strategies for Healthcare , 2020, ACM Comput. Surv..
[74] Ahmed Ben Ayed,et al. A Conceptual Secure Blockchain Based Electronic Voting System , 2017 .
[75] Usman W. Chohan. The Double Spending Problem and Cryptocurrencies , 2017 .
[76] Eklas Hossain,et al. Authentication Protocol for Cloud Databases Using Blockchain Mechanism , 2019, Sensors.
[77] Nidhee Rathod,et al. Security threats on Blockchain and its countermeasures , 2018 .
[78] Lin Zhong,et al. A secure versatile light payment system based on blockchain , 2019, Future Gener. Comput. Syst..
[79] Dongming Xu,et al. A maturity model for blockchain adoption , 2016, Financial Innovation.
[80] Alexander Kogan,et al. Designing confidentiality-preserving Blockchain-based transaction processing systems , 2018, Int. J. Account. Inf. Syst..
[81] Yi Wang,et al. Comprehensive Overview of Selfish Mining and Double Spending Attack Countermeasures , 2019, 2019 IEEE 40th Sarnoff Symposium.
[82] Yan Wang,et al. A survey on security and privacy issues of blockchain technology , 2018, Math. Found. Comput..
[83] Alf Zugenmaier,et al. The Impact of Uncle Rewards on Selfish Mining in Ethereum , 2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[84] Yuanyuan Yang,et al. A Survey of IoT Applications in Blockchain Systems , 2020, ACM Comput. Surv..
[85] Jonathan Katz,et al. Incentivizing Double-Spend Collusion in Bitcoin , 2017 .
[86] Liang Liu,et al. A type of block withholding delay attack and the countermeasure based on type-2 fuzzy inference. , 2019, Mathematical biosciences and engineering : MBE.
[87] Mohsen Guizani,et al. MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain , 2017, IEEE Access.
[88] Karen A. Scarfone,et al. Blockchain Technology Overview , 2018, ArXiv.
[89] Ittay Eyal,et al. The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.
[90] Vasisht Duddu,et al. A Survey of Adversarial Machine Learning in Cyber Warfare , 2018, Defence Science Journal.
[91] Daniel S. Berman,et al. A Survey of Deep Learning Methods for Cyber Security , 2019, Inf..
[92] Brian Neil Levine,et al. An Explanation of Nakamoto's Analysis of Double-spend Attacks , 2017, ArXiv.
[93] Jing Liu,et al. A Survey on Security Verification of Blockchain Smart Contracts , 2019, IEEE Access.
[94] Mauro Conti,et al. A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.
[95] Heung-No Lee,et al. Profitable Double-Spending Attacks , 2019, Applied Sciences.
[96] Kartik Nayak,et al. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[97] Mahdi H. Miraz,et al. Application of Blockchain in Booking and Registration Systems of Securities Exchanges , 2018, 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE).
[98] Roman Beck,et al. Blockchain to Rule the Waves - Nascent Design Principles for Reducing Risk and Uncertainty in Decentralized Environments , 2017, ICIS.
[99] Vincent Gramoli,et al. Router RouterRouter Router Router Attacker Stratum 2 Stratum 1 Stratum 7 Stratum 8 Stratum 6 Stratum 5 Stratum 3 Stratum , 2018 .
[100] Tooska Dargahi,et al. A systematic , 2022 .
[101] Yongdae Kim,et al. Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin , 2017, CCS.
[102] S. M. Muyeen,et al. Blockchain Applications in Smart Grid–Review and Frameworks , 2019, IEEE Access.
[103] Sachin Shetty,et al. Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).
[104] Arshdeep Bahga,et al. Blockchain Platform for Industrial Internet of Things , 2016 .
[105] Andrew Lippman,et al. MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).
[106] Chunhua Wang,et al. Machine Learning and Deep Learning Methods for Cybersecurity , 2018, IEEE Access.
[107] Nicholas Hopper,et al. Combating Double-Spending Using Cooperative P2P Systems , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[108] Feng Gao,et al. A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks , 2018, IEEE Network.
[109] David Silver,et al. Deep Reinforcement Learning with Double Q-Learning , 2015, AAAI.
[110] Khaled Salah,et al. Blockchain for AI: Review and Open Research Challenges , 2019, IEEE Access.
[111] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol with Chains of Variable Difficulty , 2017, CRYPTO.
[112] John P. Podolanko,et al. Countering Double-Spend Attacks on Bitcoin Fast-Pay Transactions , 2017 .
[113] Kim-Kwang Raymond Choo,et al. Blockchain in healthcare applications: Research challenges and opportunities , 2019, J. Netw. Comput. Appl..
[114] Keke Gai,et al. Research on the Security of Blockchain Data: A Survey , 2018, ArXiv.
[115] Hector Marco-Gisbert,et al. Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack , 2019, Applied Sciences.
[116] Peng Jiang,et al. A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..
[117] Cyril Grunspan,et al. Double spend races , 2017, International Journal of Theoretical and Applied Finance.
[118] Jong Hyuk Park,et al. Blockchain Technology Toward Green IoT: Opportunities and Challenges , 2020, IEEE Network.
[119] Mohsen Guizani,et al. Applications of blockchain in unmanned aerial vehicles: A review , 2020, Veh. Commun..
[120] Ari Juels,et al. BDoS: Blockchain Denial-of-Service , 2020, CCS.
[121] Alec Radford,et al. Proximal Policy Optimization Algorithms , 2017, ArXiv.
[122] Z. Jane Wang,et al. A Strong Adaptive, Strategic Double-Spending Attack on Blockchains , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[123] Pieter Wuille,et al. Enabling Blockchain Innovations with Pegged Sidechains , 2014 .
[124] Seungjoo Kim,et al. Pooled Mining Makes Selfish Mining Tricky , 2018, IACR Cryptol. ePrint Arch..
[125] Pan He,et al. Adversarial Examples: Attacks and Defenses for Deep Learning , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[126] Cyril Grunspan,et al. Selfish Mining and Dyck Words in Bitcoin and Ethereum Networks , 2019, Tokenomics.
[127] The Fallacy of Selfish Mining in Bitcoin: A Mathematical Critique , 2017 .
[128] Long Tran-Thanh,et al. On the Preliminary Investigation of Selfish Mining Strategy with Multiple Selfish Miners , 2018, ArXiv.
[129] Asif Karim,et al. An Overview of Blockchain Applications and Attacks , 2019, 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN).
[130] Hannes Hartenstein,et al. Exploiting Transaction Accumulation and Double Spends for Topology Inference in Bitcoin , 2018, Financial Cryptography Workshops.
[131] Seungjoo Kim,et al. Countering Block Withholding Attack Efficiently , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[132] Mohammad A. Hoque,et al. Blockchain Consensus Algorithms: A Survey , 2020, 2001.07091.
[133] Hubert Ritzdorf,et al. On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..