BDoS: Blockchain Denial-of-Service
暂无分享,去创建一个
[1] Jeremy Clark,et al. SoK: Transparent Dishonesty: Front-Running Attacks on Blockchain , 2019, Financial Cryptography Workshops.
[2] Jonathan Katz,et al. Incentivizing Blockchain Forks via Whale Transactions , 2017, Financial Cryptography Workshops.
[3] Elaine Shi,et al. Snow White: Provably Secure Proofs of Stake , 2016, IACR Cryptol. ePrint Arch..
[4] Prateek Saxena,et al. On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.
[5] Chen Feng,et al. Selfish Mining in Ethereum , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).
[6] Emin Gün Sirer,et al. Majority is not enough , 2013, Financial Cryptography.
[7] Blockchains Cannot Rely on Honesty , 2019 .
[8] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[9] Sanjay Jain,et al. When Cryptocurrencies Mine Their Own Business , 2016, Financial Cryptography.
[10] Markus Jakobsson,et al. Proofs of Work and Bread Pudding Protocols , 1999, Communications and Multimedia Security.
[11] Marc Jansen,et al. Short Paper: Revisiting Difficulty Control for Blockchain Systems , 2017, DPM/CBT@ESORICS.
[12] Aggelos Kiayias,et al. Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain , 2018, EUROCRYPT.
[13] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[14] Aggelos Kiayias,et al. Blockchain Mining Games , 2016, EC.
[15] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[16] Aggelos Kiayias,et al. Cryptocurrency Egalitarianism: A Quantitative Approach , 2019, Tokenomics.
[17] Ittay Eyal,et al. The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.
[18] Sebastian Faust,et al. Temporary Censorship Attacks in the Presence of Rational Miners , 2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[19] Atul Singh,et al. Eclipse Attacks on Overlay Networks: Threats and Defenses , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[20] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[21] Ian Miers,et al. PIEs: Public Incompressible Encodings for Decentralized Storage , 2019, IACR Cryptol. ePrint Arch..
[22] Susan Landau,et al. Making Sense from Snowden: What's Significant in the NSA Surveillance Revelations , 2013, IEEE Security & Privacy.
[23] Eric Budish. The Economic Limits of Bitcoin and the Blockchain , 2018 .
[24] Roger Wattenhofer,et al. 12 Angry Miners , 2019, DPM/CBT@ESORICS.
[25] Yanjiao Chen,et al. Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools , 2020, IEEE/ACM Transactions on Networking.
[26] Meni Rosenfeld,et al. Analysis of Hashrate-Based Double Spending , 2014, ArXiv.
[27] Thomas M. Chen,et al. Lessons from Stuxnet , 2011, Computer.
[28] Joseph J. LaViola,et al. Byzantine Consensus from Moderately-Hard Puzzles : A Model for Bitcoin , 2014 .
[29] S. Matthew Weinberg,et al. On the Instability of Bitcoin Without the Block Reward , 2016, CCS.
[30] Silvio Micali,et al. Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..
[31] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[32] Shawn Wilkinson,et al. Storj A Peer-to-Peer Cloud Storage Network , 2014 .
[33] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[34] Robert Tappan Morris,et al. Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.
[35] Kartik Nayak,et al. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[36] Edgar R. Weippl,et al. Pitchforks in Cryptocurrencies: - Enforcing Rule Changes Through Offensive Forking- and Consensus Techniques (Short Paper) , 2018, DPM/CBT@ESORICS.
[37] Lin Chen,et al. On Security Analysis of Proof-of-Elapsed-Time (PoET) , 2017, SSS.
[38] Edgar R. Weippl,et al. Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies , 2019, IACR Cryptol. ePrint Arch..
[39] Tyler Moore,et al. Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem , 2014, Financial Cryptography Workshops.
[40] Ari Juels,et al. Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges , 2019, ArXiv.
[41] Sarah Meiklejohn,et al. Smart contracts for bribing miners , 2018, IACR Cryptol. ePrint Arch..
[42] R. Aumann. Agreeing to disagree. , 1976, Nature cell biology.
[43] Adam S. Hayes,et al. Cryptocurrency Value Formation: An Empirical Analysis Leading to a Cost of Production Model for Valuing Bitcoin , 2016, MCIS.
[44] Jonathan Katz,et al. Competing (Semi-)Selfish Miners in Bitcoin , 2019, AFT.
[45] Alexander Spiegelman,et al. Mind the Mining , 2019, EC.
[46] Shawn Wilkinson. MetaDisk A Blockchain-Based Decentralized File Storage Application , 2014 .
[47] Laurent Vanbever,et al. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[48] Hubert Ritzdorf,et al. On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..
[49] Alf Zugenmaier,et al. The Impact of Uncle Rewards on Selfish Mining in Ethereum , 2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[50] Abhi Shelat,et al. Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.
[51] Xing Wang,et al. A Deep Dive Into Blockchain Selfish Mining , 2018, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[52] Laurent Vanbever,et al. SABRE: Protecting Bitcoin against Routing Attacks , 2018, NDSS.
[53] S. Nakamoto,et al. Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .
[54] Joseph Bonneau,et al. Hostile Blockchain Takeovers (Short Paper) , 2018, Financial Cryptography Workshops.
[55] Jacob D. Leshno,et al. Monopoly without a Monopolist: An Economic Analysis of the Bitcoin Payment System , 2017, The Review of Economic Studies.
[56] Junichiro Osawa. The Escalation of State Sponsored Cyberattack and National Cyber Security Affairs: Is Strategic Cyber Deterrence the Key to Solving the Problem? , 2017 .
[57] Joshua A. Kroll,et al. The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .
[58] Oscar Delgado-Mohatar,et al. The Bitcoin mining breakdown: Is mining still profitable? , 2019, Economics Letters.
[59] Claus D. Zimmermann. Monetary Policy in the Digital Age , 2019, Regulating Blockchain.
[60] Ittay Eyal,et al. The Gap Game , 2018, CCS.
[61] Alexander Spiegelman,et al. HEB: Hybrid Expenditure Blockchain. , 2019 .
[62] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.
[63] Michael Connell,et al. Russia's Approach to Cyber Warfare (1Rev) , 2017 .
[64] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[65] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[66] Ethan Heilman,et al. Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network , 2020, IACR Cryptol. ePrint Arch..
[67] Yongdae Kim,et al. Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin , 2017, CCS.
[68] Elaine Shi,et al. Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake , 2019, Financial Cryptography.
[69] J. Sobel,et al. A Multistage Model of Bargaining , 1983 .
[70] Ingo Weber,et al. On Availability for Blockchain-Based Systems , 2017, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS).
[71] Aviv Zohar,et al. Secure High-Rate Transaction Processing in Bitcoin , 2015, Financial Cryptography.
[72] Adam Hayes,et al. Cryptocurrency Value Formation: An Empirical Analysis Leading to a Cost of Production Model for Valuing Bitcoin , 2016, MCIS.
[73] Joseph Bonneau,et al. Why Buy When You Can Rent? - Bribery Attacks on Bitcoin-Style Consensus , 2016, Financial Cryptography Workshops.
[74] Fan Zhang,et al. REM: Resource-Efficient Mining for Blockchains , 2017, IACR Cryptol. ePrint Arch..
[75] Neil Gandal,et al. Price Manipulation in the Bitcoin Ecosystem , 2017 .
[76] Jinwoo Shin,et al. Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash? , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[77] Joshua A. Kroll,et al. Why buy when you can rent ? Bribery attacks on Bitcoin consensus , 2015 .
[78] Tyler Moore,et al. Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools , 2014, Financial Cryptography Workshops.
[79] Aggelos Kiayias,et al. Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability , 2018, IACR Cryptol. ePrint Arch..
[80] Peng Jiang,et al. A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..
[81] Idit Keidar,et al. Game of Coins , 2018, 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS).
[82] Aron Laszka,et al. When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools , 2015, Financial Cryptography Workshops.
[83] Meni Rosenfeld,et al. Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.