Exploring the Attack Surface of Blockchain: A Comprehensive Survey

In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the attack surface to 1) the Blockchain cryptographic constructs, 2) the distributed architecture of the systems using Blockchain, and 3) the Blockchain application context. To each of those contributing factors, we outline several attacks, including selfish mining, the 51% attack, DNS attacks, distributed denial-of-service (DDoS) attacks, consensus delay (due to selfish behavior or distributed denial-of-service attacks), Blockchain forks, orphaned and stale blocks, block ingestion, wallet thefts, smart contract attacks, and privacy attacks. We also explore the causal relationships between these attacks to demonstrate how various attack vectors are connected to one another. A secondary contribution of this work is outlining effective defense measures taken by the Blockchain technology or proposed by researchers to mitigate the effects of these attacks and patch associated vulnerabilities.

[1]  Tim Roughgarden,et al.  Incentive Compatibility of Bitcoin Mining Pool Reward Functions , 2016, Financial Cryptography.

[2]  Ingo Weber,et al.  New kids on the block: an analysis of modern blockchains , 2016, ArXiv.

[3]  Aziz Mohaisen,et al.  Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).

[4]  Ying Wang,et al.  An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks , 2017, ISPEC.

[5]  Aziz Mohaisen,et al.  POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization , 2018, AsiaCCS.

[6]  Miguel Castro,et al.  Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.

[7]  Anas Abou El Kalam,et al.  FairAccess: a new Blockchain-based access control framework for the Internet of Things , 2016, Secur. Commun. Networks.

[8]  George Danezis,et al.  Centrally Banked Cryptocurrencies , 2015, NDSS.

[9]  Pedro Moreno-Sanchez,et al.  R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies , 2018, IACR Cryptol. ePrint Arch..

[10]  Guido Perboli,et al.  Blockchain in Logistics and Supply Chain: A Lean Approach for Designing Real-World Use Cases , 2018, IEEE Access.

[11]  Kouichi Sakurai,et al.  Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools , 2016, ISC.

[12]  Jin Song Dong,et al.  Formal Analysis of a Proof-of-Stake Blockchain , 2018, 2018 23rd International Conference on Engineering of Complex Computer Systems (ICECCS).

[13]  Emin Gün Sirer,et al.  Teechain: Reducing Storage Costs on the Blockchain With Offline Payment Channels , 2018, SYSTOR.

[14]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[15]  Young-Sik Jeong,et al.  DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks , 2017, IEEE Communications Magazine.

[16]  Iuon-Chang Lin,et al.  A Survey of Blockchain Security Issues and Challenges , 2017, Int. J. Netw. Secur..

[17]  Aggelos Kiayias,et al.  Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.

[18]  Wei Xu,et al.  Gosig: Scalable Byzantine Consensus on Adversarial Wide Area Network for Blockchains , 2018, ArXiv.

[19]  Aziz Mohaisen,et al.  An Adversary-Centric Behavior Modeling of DDoS Attacks , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[20]  Younghee Park,et al.  Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners , 2019, ACNS.

[21]  Hans P. Reiser,et al.  Scaling Byzantine Consensus: A Broad Analysis , 2018, SERIAL@Middleware.

[22]  Christian Janze,et al.  Are Cryptocurrencies Criminals Best Friends? Examining the Co-Evolution of Bitcoin and Darknet Markets , 2017, AMCIS.

[23]  Eric Filiol,et al.  On blockchain security and relevant attacks , 2018, 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM).

[24]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[25]  Timo Hanke AsicBoost - A Speedup for Bitcoin Mining , 2016, ArXiv.

[26]  Nadia Heninger,et al.  Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies , 2019, IACR Cryptol. ePrint Arch..

[27]  Massimo Bartoletti,et al.  A Proof-of-Stake Protocol for Consensus on Bitcoin Subchains , 2017, Financial Cryptography Workshops.

[28]  Sachin Shetty,et al.  Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).

[29]  Hao Xu,et al.  Dynamic Practical Byzantine Fault Tolerance , 2018, 2018 IEEE Conference on Communications and Network Security (CNS).

[30]  Elaine Shi,et al.  Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions , 2015, CCS.

[31]  Mario Zagar,et al.  Comparative analysis of blockchain consensus algorithms , 2018, 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[32]  Laurent Vanbever,et al.  SABRE: Protecting Bitcoin against Routing Attacks , 2018, NDSS.

[33]  Ethan Heilman,et al.  Technical perspective: The rewards of selfish mining , 2018, Commun. ACM.

[34]  Jun Zhao An Analysis of Blockchain Consistency in Asynchronous Networks: Deriving a Neat Bound , 2019, ArXiv.

[35]  Yongdae Kim,et al.  Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin , 2017, CCS.

[36]  Pedro Moreno-Sanchez,et al.  P2P Mixing and Unlinkable Bitcoin Transactions , 2017, NDSS.

[37]  Victor C. M. Leung,et al.  Distributed Resource Allocation in Blockchain-Based Video Streaming Systems With Mobile Edge Computing , 2019, IEEE Transactions on Wireless Communications.

[38]  Akanksha Kaushik,et al.  Blockchain — Literature survey , 2017, 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).

[39]  Matthias Mettler,et al.  Blockchain technology in healthcare: The revolution starts here , 2016, 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom).

[40]  Miguel Correia,et al.  Efficient Byzantine Fault-Tolerance , 2013, IEEE Transactions on Computers.

[41]  Lodewijk André de la Porte The Bitcoin transaction system , 2012 .

[42]  Peng Jiang,et al.  A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..

[43]  Sarah Meiklejohn,et al.  An Empirical Analysis of Anonymity in Zcash , 2018, USENIX Security Symposium.

[44]  Ali Hortaçsu,et al.  A Memo on the Proof-of-Stake Mechanism , 2018, ArXiv.

[45]  Kim-Kwang Raymond Choo,et al.  Cracking Bitcoin wallets: I want what you have in the wallets , 2019, Future Gener. Comput. Syst..

[46]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.

[47]  Elaine Shi,et al.  Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[48]  Ghassan O. Karame,et al.  On the Security and Scalability of Bitcoin's Blockchain , 2016, CCS.

[49]  Marco Alberto Javarone,et al.  From Bitcoin to Bitcoin Cash: a network analysis , 2018, CRYBLOCK@MobiSys.

[50]  Christian Decker,et al.  BlueWallet: The Secure Bitcoin Wallet , 2014, STM.

[51]  Laurent Vanbever,et al.  Hijacking Bitcoin: Routing Attacks on Cryptocurrencies , 2016, 2017 IEEE Symposium on Security and Privacy (SP).

[52]  Aggelos Kiayias,et al.  SoK: A Consensus Taxonomy in the Blockchain Era , 2020, IACR Cryptol. ePrint Arch..

[53]  Michele Marchesi,et al.  A Blockchain Based System to Ensure Transparency and Reliability in Food Supply Chain , 2018, Euro-Par Workshops.

[54]  Elaine Shi,et al.  Thunderella: Blockchains with Optimistic Instant Confirmation , 2018, IACR Cryptol. ePrint Arch..

[55]  Marc Pilkington,et al.  Blockchain Technology: Principles and Applications , 2015 .

[56]  Aziz Mohaisen,et al.  Towards Blockchain-Driven, Secure and Transparent Audit Logs , 2018, MobiQuitous.

[57]  Michael Huth,et al.  Optimizing Governed Blockchains for Financial Process Authentications , 2016, ArXiv.

[58]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[59]  Ethan Heilman,et al.  One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner (Poster Abstract) , 2014, Financial Cryptography Workshops.

[60]  Hubert Ritzdorf,et al.  Tampering with the Delivery of Blocks and Transactions in Bitcoin , 2015, IACR Cryptol. ePrint Arch..

[61]  Aziz Mohaisen,et al.  Towards characterizing blockchain-based cryptocurrencies for highly-accurate predictions , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[62]  Michael Brengel,et al.  Identifying Key Leakage of Bitcoin Users , 2018, RAID.

[63]  Nicolas Courtois,et al.  On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.

[64]  Sunny King,et al.  PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .

[65]  RonTal Itzhak,et al.  CASE ANALYSIS FOR THE EFFECT OF BLOCKCHAIN TECHNOLOGY IN THE GAMING REGULATORY ENVIRONMENT , 2017 .

[66]  Miguel Oom Temudo de Castro,et al.  Practical Byzantine fault tolerance , 1999, OSDI '99.

[67]  Christian Decker,et al.  Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.

[68]  Marten Risius,et al.  A Blockchain-Based Approach Towards Overcoming Financial Fraud in Public Sector Services , 2017, Bus. Inf. Syst. Eng..

[69]  A.W.G. de Vries Bitcoin's Growing Energy Problem , 2018 .

[70]  Marta Poblet,et al.  Is Blockchain Hashing an Effective Method for Electronic Governance? , 2018, JURIX.

[71]  S. Matthew Weinberg,et al.  On the Instability of Bitcoin Without the Block Reward , 2016, CCS.

[72]  Maged M. Eljazzar,et al.  Merging supply chain and blockchain technologies , 2018, ArXiv.

[73]  Yue Wang,et al.  Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G , 2017, IET Commun..

[74]  Mauro Conti,et al.  A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.

[75]  Laurent Njilla,et al.  Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).

[76]  Mian Zhang,et al.  Blockchain for healthcare records: A data perspective , 2018, PeerJ Prepr..

[77]  Pierre Noizat Blockchain Electronic Vote , 2015 .

[78]  Michael S. Kester,et al.  Bitcoin Transaction Graph Analysis , 2015, ArXiv.

[79]  Martijn Bastiaan,et al.  Preventing the 51%-Attack: a Stochastic Analysis of Two Phase Proof of Work in Bitcoin , 2015 .

[80]  Konstantinos Markantonakis,et al.  E-Voting With Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[81]  Nikita Borisov,et al.  Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises , 2017, RAID.

[82]  Sunghyun Cho,et al.  A Survey of Scalability Solutions on Blockchain , 2018, 2018 International Conference on Information and Communication Technology Convergence (ICTC).

[83]  Snowflake to Avalanche : A Novel Metastable Consensus Protocol Family for Cryptocurrencies Team Rocket , 2018 .

[84]  Andrew Miller,et al.  Sprites: Payment Channels that Go Faster than Lightning , 2017, ArXiv.

[85]  Prateek Saxena,et al.  On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.

[86]  Massimo Bartoletti,et al.  A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.

[87]  Ling Ren,et al.  Analysis of Nakamoto Consensus , 2019, IACR Cryptol. ePrint Arch..

[88]  Zhen Liu,et al.  Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain , 2018, NSS.

[89]  Dean Rakic,et al.  Blockchain Technology in Healthcare , 2018, ICT4AWE.

[90]  Jörg Becker,et al.  Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency , 2012, WEIS.

[91]  Sarah Underwood,et al.  Blockchain beyond bitcoin , 2016, Commun. ACM.

[92]  Gavin Andresen,et al.  An Analysis of Attacks on Blockchain Consensus , 2016, ArXiv.

[93]  Tobias Distler,et al.  Resource-Efficient Byzantine Fault Tolerance , 2016, IEEE Transactions on Computers.

[94]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[95]  Sushmita Ruj,et al.  Bitcoin Block Withholding Attack: Analysis and Mitigation , 2017, IEEE Transactions on Information Forensics and Security.

[96]  Lear Bahack,et al.  Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) , 2013, IACR Cryptol. ePrint Arch..

[97]  Ethan Heilman,et al.  Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions , 2016, Financial Cryptography Workshops.

[98]  Ying Liu,et al.  Model Checking PBFT Consensus Mechanism in Healthcare Blockchain Network , 2018, 2018 9th International Conference on Information Technology in Medicine and Education (ITME).

[99]  Jong-Hyouk Lee,et al.  Double-Spending With a Sybil Attack in the Bitcoin Decentralized Network , 2019, IEEE Transactions on Industrial Informatics.

[100]  R. Stokes,et al.  Virtual money laundering: the case of Bitcoin and the Linden dollar , 2012 .

[101]  Lixin Gao On inferring autonomous system relationships in the internet , 2001, TNET.

[102]  Tyler Moore,et al.  Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem , 2014, Financial Cryptography Workshops.

[103]  Ghassan O. Karame,et al.  Scalable Byzantine Consensus via Hardware-Assisted Secret Sharing , 2016, IEEE Transactions on Computers.

[104]  Iresha Dilhani,et al.  Transaction Verification Model over Double Spending for Peer-to-Peer Digital Currency Transactions based on Blockchain Architecture , 2017 .

[105]  Radu State,et al.  Automated Labeling of Unknown Contracts in Ethereum , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).

[106]  Abdelhakim Hafid,et al.  ChainSecure - A Scalable and Proactive Solution for Protecting Blockchain Applications Using SDN , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[107]  Hong-Sheng Zhou,et al.  TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake , 2018, BCC '18.

[108]  Meni Rosenfeld,et al.  Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.

[109]  Uwe Zdun,et al.  Smart contracts: security patterns in the ethereum ecosystem and solidity , 2018, 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE).

[110]  Martin B. H. Weiss,et al.  On the Application of Blockchains to Spectrum Management , 2019, IEEE Transactions on Cognitive Communications and Networking.

[111]  Sachin Shetty,et al.  Attack Surface Analysis of Permissioned Blockchain Platforms for Smart Cities , 2018, 2018 IEEE International Smart Cities Conference (ISC2).

[112]  Jaekyun Moon,et al.  Scalable Network-Coded PBFT Consensus Algorithm , 2019, 2019 IEEE International Symposium on Information Theory (ISIT).

[113]  Tiago M. Fernández-Caramés,et al.  A Review on the Use of Blockchain for the Internet of Things , 2018, IEEE Access.

[114]  Xu Hao,et al.  Dynamic Practical Byzantine Fault Tolerance , 2018 .

[115]  Marko Vukolic,et al.  Blockchain Consensus Protocols in the Wild (Keynote Talk) , 2017, DISC.

[116]  Anamika Chauhan,et al.  Blockchain and Scalability , 2018, 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).

[117]  Aviv Zohar,et al.  Avoiding Deadlocks in Payment Channel Networks , 2018, DPM/CBT@ESORICS.

[118]  Rui Guo,et al.  Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems , 2018, IEEE Access.

[119]  Myungjae Shin,et al.  Recipient-Oriented Transaction for Preventing Double Spending Attacks in Private Blockchain , 2018, 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

[120]  Guillermo Navarro-Arribas,et al.  Double-spending prevention for Bitcoin zero-confirmation transactions , 2018, International Journal of Information Security.

[121]  Juan M. Corchado,et al.  Blockchain framework for IoT data quality via edge computing , 2018, BlockSys@SenSys.

[122]  Pieter Wuille,et al.  Enabling Blockchain Innovations with Pegged Sidechains , 2014 .

[123]  Joseph Bonneau,et al.  Why Buy When You Can Rent? - Bribery Attacks on Bitcoin-Style Consensus , 2016, Financial Cryptography Workshops.

[124]  Emin Gün Sirer,et al.  Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.

[125]  Tyler Moore,et al.  The Bitcoin Brain Drain: Examining the Use and Abuse of Bitcoin Brain Wallets , 2016, Financial Cryptography.

[126]  Ghassan O. Karame,et al.  Double-spending fast payments in bitcoin , 2012, CCS.

[127]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[128]  Nikos Fotiou,et al.  Decentralized name-based security for content distribution using blockchains , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[129]  Jian Tang,et al.  CoinExpress: A Fast Payment Routing Mechanism in Blockchain-Based Payment Channel Networks , 2018, 2018 27th International Conference on Computer Communication and Networks (ICCCN).

[130]  Henrik Sternberg,et al.  Chains in Chains - Logic and Challenges of Blockchains in Supply Chains , 2018, HICSS.

[131]  Aziz Mohaisen,et al.  RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).

[132]  Kotagiri Ramamohanarao,et al.  Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.

[133]  Aggelos Kiayias,et al.  Stake-Bleeding Attacks on Proof-of-Stake Blockchains , 2018, 2018 Crypto Valley Conference on Blockchain Technology (CVCBT).

[134]  Beng Chin Ooi,et al.  BLOCKBENCH: A Framework for Analyzing Private Blockchains , 2017, SIGMOD Conference.

[135]  Tyler Moore,et al.  Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools , 2014, Financial Cryptography Workshops.

[136]  Ethan Heilman,et al.  Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.

[137]  Aziz Mohaisen,et al.  Countering Selfish Mining in Blockchains , 2018, 2019 International Conference on Computing, Networking and Communications (ICNC).

[138]  Anthony E. Krzesinski,et al.  Increased block size and Bitcoin blockchain dynamics , 2017, 2017 27th International Telecommunication Networks and Applications Conference (ITNAC).

[139]  Ernesto Damiani,et al.  A Comparative Analysis of Current Cryptocurrencies , 2018, ICISSP.

[140]  Ittay Eyal,et al.  The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.

[141]  Aziz Mohaisen,et al.  Domain Name System Security and Privacy: Old Problems and New Challenges , 2016, ArXiv.

[142]  Andrew Kang Bitcoin's Growing Pains: Intermediation and the Need for an Effective Loss Allocation Mechanism , 2017 .

[143]  Ari Juels,et al.  $evwu Dfw , 1998 .

[144]  Younghee Park,et al.  Silent Timestamping for Blockchain Mining Pool Security , 2019, 2019 International Conference on Computing, Networking and Communications (ICNC).

[145]  Renato Lo Cigno,et al.  Proof of networking: Can blockchains boost the next generation of distributed networks? , 2018, 2018 14th Annual Conference on Wireless On-demand Network Systems and Services (WONS).

[146]  Guillermo Navarro-Arribas,et al.  Analysis of the Bitcoin UTXO set , 2018, IACR Cryptol. ePrint Arch..

[147]  A. Stephen Morse,et al.  Analysis of Difficulty Control in Bitcoin and Proof-of-Work Blockchains , 2018, 2018 IEEE Conference on Decision and Control (CDC).

[148]  Mubashir Husain Rehmani,et al.  Applications of Blockchains in the Internet of Things: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.

[149]  Hyoung Joong Kim,et al.  Electronic Voting Service Using Block-Chain , 2016, J. Digit. Forensics Secur. Law.

[150]  Alf Zugenmaier,et al.  The Impact of Uncle Rewards on Selfish Mining in Ethereum , 2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[151]  Hubert Ritzdorf,et al.  On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..

[152]  Roberto Baldoni,et al.  PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain , 2018, ITASEC.

[153]  Aziz Mohaisen,et al.  BlockTrail: A Scalable Multichain Solution for Blockchain-Based Audit Trails , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[154]  Rojeena Bajracharya,et al.  A new type of blockchain for secure message exchange in VANET , 2020, Digit. Commun. Networks.

[155]  Ethan Heilman,et al.  Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network , 2020, IACR Cryptol. ePrint Arch..

[156]  Kishor S. Trivedi,et al.  Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric) , 2017, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS).

[157]  Cyril Grunspan,et al.  On profitability of selfish mining , 2018, ArXiv.

[158]  Maria Gradinariu Potop-Butucaru,et al.  ZeroBlock: Preventing Selfish Mining in Bitcoin , 2016, ArXiv.

[159]  Aziz Mohaisen,et al.  Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking , 2019, 2019 APWG Symposium on Electronic Crime Research (eCrime).

[160]  Denis Butin,et al.  XMSS: Extended Hash-Based Signatures , 2015 .

[161]  Aviv Zohar,et al.  Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.

[162]  Friedrich Holotiuk,et al.  The Impact of Blockchain Technology on Business Models in the Payments Industry , 2017, Wirtschaftsinformatik.

[163]  Mohammed Samaka,et al.  Security Services Using Blockchains: A State of the Art Survey , 2018, IEEE Communications Surveys & Tutorials.

[164]  Ghassan O. Karame,et al.  Misbehavior in Bitcoin: A Study of Double-Spending and Accountability , 2015, TSEC.

[165]  Jong Hyuk Park,et al.  DistArch-SCNet: Blockchain-Based Distributed Architecture with Li-Fi Communication for a Scalable Smart City Network , 2018, IEEE Consumer Electronics Magazine.

[166]  Jeremy Clark,et al.  SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.

[167]  Moti Yung,et al.  Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation , 2017, AsiaCCS.

[168]  Chinmaya Vyas,et al.  Security Concerns and Issues for Bitcoin , 2014 .

[169]  Kartik Nayak,et al.  Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[170]  Abhi Shelat,et al.  Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.

[171]  Albert Levi,et al.  A Survey on Anonymity and Privacy in Bitcoin-Like Digital Cash Systems , 2018, IEEE Communications Surveys & Tutorials.

[172]  Shengling Wang,et al.  Corking by Forking: Vulnerability Analysis of Blockchain , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[173]  Min-Shiang Hwang,et al.  A Blockchain-Based Traceable Certification System , 2017 .

[174]  Wei Ni,et al.  Attack and Defence of Ethereum Remote APIs , 2018, 2018 IEEE Globecom Workshops (GC Wkshps).

[175]  Björn Scheuermann,et al.  Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.

[176]  George Danezis,et al.  SoK: Consensus in the Age of Blockchains , 2017, AFT.

[177]  Praneeth Babu Marella,et al.  BroncoVote: Secure Voting System using Ethereum's Blockchain , 2018, ICISSP.

[178]  Mahesh Kumar,et al.  Improving routing in large networks inside autonomous system , 2014, Int. J. Syst. Assur. Eng. Manag..

[179]  Jason Teutsch,et al.  Smart Contracts Make Bitcoin Mining Pools Vulnerable , 2017, Financial Cryptography Workshops.

[180]  Long Tran-Thanh,et al.  On the Preliminary Investigation of Selfish Mining Strategy with Multiple Selfish Miners , 2018, ArXiv.

[181]  Nikhil Swamy,et al.  Formal Verification of Smart Contracts: Short Paper , 2016, PLAS@CCS.

[182]  Antônio A. de A. Rocha,et al.  A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack , 2018, Secur. Commun. Networks.