Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies
暂无分享,去创建一个
Edgar R. Weippl | Sarah Meiklejohn | Aljosha Judmayer | Alexei Zamyatin | Nicholas Stifter | Ittay Eyal | Peter Gazi | Itay Tsabary | Ittay Eyal | S. Meiklejohn | Itay Tsabary | Aljosha Judmayer | Nicholas Stifter | Alexei Zamyatin | Peter Gazi | E. Weippl
[1] Ari Juels,et al. Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability , 2020, 2020 IEEE Symposium on Security and Privacy (SP).
[2] Sebastian Faust,et al. Temporary Censorship Attacks in the Presence of Rational Miners , 2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[3] Jeremy Clark,et al. SoK: Transparent Dishonesty: Front-Running Attacks on Blockchain , 2019, Financial Cryptography Workshops.
[4] Prateek Saxena,et al. Exploiting the laws of order in smart contracts , 2018, ISSTA.
[5] Edgar R. Weippl,et al. Pitchforks in Cryptocurrencies: - Enforcing Rule Changes Through Offensive Forking- and Consensus Techniques (Short Paper) , 2018, DPM/CBT@ESORICS.
[6] Eric Budish. The Economic Limits of Bitcoin and the Blockchain , 2018 .
[7] Ueli Maurer,et al. But Why does it Work? A Rational Protocol Design Treatment of Bitcoin , 2018, IACR Cryptol. ePrint Arch..
[8] Joseph Bonneau,et al. Hostile Blockchain Takeovers (Short Paper) , 2018, Financial Cryptography Workshops.
[9] Sarah Meiklejohn,et al. Smart contracts for bribing miners , 2018, IACR Cryptol. ePrint Arch..
[10] Sarah Meiklejohn,et al. Möbius: Trustless Tumbling for Transaction Privacy , 2018, IACR Cryptol. ePrint Arch..
[11] Ueli Maurer,et al. Bitcoin as a Transaction Ledger: A Composable Treatment , 2017, CRYPTO.
[12] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol with Chains of Variable Difficulty , 2017, CRYPTO.
[13] Jason Teutsch,et al. SmartPool: Practical Decentralized Pooled Mining , 2017, USENIX Security Symposium.
[14] Jason Teutsch,et al. Smart Contracts Make Bitcoin Mining Pools Vulnerable , 2017, Financial Cryptography Workshops.
[15] Jonathan Katz,et al. Incentivizing Blockchain Forks via Whale Transactions , 2017, Financial Cryptography Workshops.
[16] Abhi Shelat,et al. Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.
[17] Aviv Zohar,et al. Bitcoin's Security Model Revisited , 2016, ArXiv.
[18] Sanjay Jain,et al. When Cryptocurrencies Mine Their Own Business , 2016, Financial Cryptography.
[19] Joseph Bonneau,et al. Why Buy When You Can Rent? - Bribery Attacks on Bitcoin-Style Consensus , 2016, Financial Cryptography Workshops.
[20] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[21] Joshua A. Kroll,et al. Why buy when you can rent ? Bribery attacks on Bitcoin consensus , 2015 .
[22] Joshua A. Kroll,et al. The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .
[23] S. Nakamoto,et al. Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .
[24] Michael Dahlin,et al. BAR gossip , 2006, OSDI '06.