Exploring the Attack Surface of Blockchain: A Comprehensive Survey
暂无分享,去创建一个
David Mohaisen | Sachin Shetty | Charles A. Kamhoua | Laurent Njilla | DaeHun Nyang | Muhammad Saad | Jeffrey Spaulding | David A. Mohaisen | C. Kamhoua | S. Shetty | Daehun Nyang | L. Njilla | Muhammad Saad | Jeffrey Spaulding
[1] Tim Roughgarden,et al. Incentive Compatibility of Bitcoin Mining Pool Reward Functions , 2016, Financial Cryptography.
[2] Ingo Weber,et al. New kids on the block: an analysis of modern blockchains , 2016, ArXiv.
[3] Aziz Mohaisen,et al. Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).
[4] Ying Wang,et al. An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks , 2017, ISPEC.
[5] Aziz Mohaisen,et al. POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization , 2018, AsiaCCS.
[6] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[7] Anas Abou El Kalam,et al. FairAccess: a new Blockchain-based access control framework for the Internet of Things , 2016, Secur. Commun. Networks.
[8] George Danezis,et al. Centrally Banked Cryptocurrencies , 2015, NDSS.
[9] Pedro Moreno-Sanchez,et al. R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies , 2018, IACR Cryptol. ePrint Arch..
[10] Guido Perboli,et al. Blockchain in Logistics and Supply Chain: A Lean Approach for Designing Real-World Use Cases , 2018, IEEE Access.
[11] Kouichi Sakurai,et al. Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools , 2016, ISC.
[12] Jin Song Dong,et al. Formal Analysis of a Proof-of-Stake Blockchain , 2018, 2018 23rd International Conference on Engineering of Complex Computer Systems (ICECCS).
[13] Emin Gün Sirer,et al. Teechain: Reducing Storage Costs on the Blockchain With Offline Payment Channels , 2018, SYSTOR.
[14] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[15] Young-Sik Jeong,et al. DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks , 2017, IEEE Communications Magazine.
[16] Iuon-Chang Lin,et al. A Survey of Blockchain Security Issues and Challenges , 2017, Int. J. Netw. Secur..
[17] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[18] Wei Xu,et al. Gosig: Scalable Byzantine Consensus on Adversarial Wide Area Network for Blockchains , 2018, ArXiv.
[19] Aziz Mohaisen,et al. An Adversary-Centric Behavior Modeling of DDoS Attacks , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[20] Younghee Park,et al. Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners , 2019, ACNS.
[21] Hans P. Reiser,et al. Scaling Byzantine Consensus: A Broad Analysis , 2018, SERIAL@Middleware.
[22] Christian Janze,et al. Are Cryptocurrencies Criminals Best Friends? Examining the Co-Evolution of Bitcoin and Darknet Markets , 2017, AMCIS.
[23] Eric Filiol,et al. On blockchain security and relevant attacks , 2018, 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM).
[24] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[25] Timo Hanke. AsicBoost - A Speedup for Bitcoin Mining , 2016, ArXiv.
[26] Nadia Heninger,et al. Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies , 2019, IACR Cryptol. ePrint Arch..
[27] Massimo Bartoletti,et al. A Proof-of-Stake Protocol for Consensus on Bitcoin Subchains , 2017, Financial Cryptography Workshops.
[28] Sachin Shetty,et al. Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).
[29] Hao Xu,et al. Dynamic Practical Byzantine Fault Tolerance , 2018, 2018 IEEE Conference on Communications and Network Security (CNS).
[30] Elaine Shi,et al. Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions , 2015, CCS.
[31] Mario Zagar,et al. Comparative analysis of blockchain consensus algorithms , 2018, 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[32] Laurent Vanbever,et al. SABRE: Protecting Bitcoin against Routing Attacks , 2018, NDSS.
[33] Ethan Heilman,et al. Technical perspective: The rewards of selfish mining , 2018, Commun. ACM.
[34] Jun Zhao. An Analysis of Blockchain Consistency in Asynchronous Networks: Deriving a Neat Bound , 2019, ArXiv.
[35] Yongdae Kim,et al. Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin , 2017, CCS.
[36] Pedro Moreno-Sanchez,et al. P2P Mixing and Unlinkable Bitcoin Transactions , 2017, NDSS.
[37] Victor C. M. Leung,et al. Distributed Resource Allocation in Blockchain-Based Video Streaming Systems With Mobile Edge Computing , 2019, IEEE Transactions on Wireless Communications.
[38] Akanksha Kaushik,et al. Blockchain — Literature survey , 2017, 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).
[39] Matthias Mettler,et al. Blockchain technology in healthcare: The revolution starts here , 2016, 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom).
[40] Miguel Correia,et al. Efficient Byzantine Fault-Tolerance , 2013, IEEE Transactions on Computers.
[41] Lodewijk André de la Porte. The Bitcoin transaction system , 2012 .
[42] Peng Jiang,et al. A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..
[43] Sarah Meiklejohn,et al. An Empirical Analysis of Anonymity in Zcash , 2018, USENIX Security Symposium.
[44] Ali Hortaçsu,et al. A Memo on the Proof-of-Stake Mechanism , 2018, ArXiv.
[45] Kim-Kwang Raymond Choo,et al. Cracking Bitcoin wallets: I want what you have in the wallets , 2019, Future Gener. Comput. Syst..
[46] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[47] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[48] Ghassan O. Karame,et al. On the Security and Scalability of Bitcoin's Blockchain , 2016, CCS.
[49] Marco Alberto Javarone,et al. From Bitcoin to Bitcoin Cash: a network analysis , 2018, CRYBLOCK@MobiSys.
[50] Christian Decker,et al. BlueWallet: The Secure Bitcoin Wallet , 2014, STM.
[51] Laurent Vanbever,et al. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[52] Aggelos Kiayias,et al. SoK: A Consensus Taxonomy in the Blockchain Era , 2020, IACR Cryptol. ePrint Arch..
[53] Michele Marchesi,et al. A Blockchain Based System to Ensure Transparency and Reliability in Food Supply Chain , 2018, Euro-Par Workshops.
[54] Elaine Shi,et al. Thunderella: Blockchains with Optimistic Instant Confirmation , 2018, IACR Cryptol. ePrint Arch..
[55] Marc Pilkington,et al. Blockchain Technology: Principles and Applications , 2015 .
[56] Aziz Mohaisen,et al. Towards Blockchain-Driven, Secure and Transparent Audit Logs , 2018, MobiQuitous.
[57] Michael Huth,et al. Optimizing Governed Blockchains for Financial Process Authentications , 2016, ArXiv.
[58] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[59] Ethan Heilman,et al. One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner (Poster Abstract) , 2014, Financial Cryptography Workshops.
[60] Hubert Ritzdorf,et al. Tampering with the Delivery of Blocks and Transactions in Bitcoin , 2015, IACR Cryptol. ePrint Arch..
[61] Aziz Mohaisen,et al. Towards characterizing blockchain-based cryptocurrencies for highly-accurate predictions , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[62] Michael Brengel,et al. Identifying Key Leakage of Bitcoin Users , 2018, RAID.
[63] Nicolas Courtois,et al. On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.
[64] Sunny King,et al. PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .
[65] RonTal Itzhak,et al. CASE ANALYSIS FOR THE EFFECT OF BLOCKCHAIN TECHNOLOGY IN THE GAMING REGULATORY ENVIRONMENT , 2017 .
[66] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[67] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[68] Marten Risius,et al. A Blockchain-Based Approach Towards Overcoming Financial Fraud in Public Sector Services , 2017, Bus. Inf. Syst. Eng..
[69] A.W.G. de Vries. Bitcoin's Growing Energy Problem , 2018 .
[70] Marta Poblet,et al. Is Blockchain Hashing an Effective Method for Electronic Governance? , 2018, JURIX.
[71] S. Matthew Weinberg,et al. On the Instability of Bitcoin Without the Block Reward , 2016, CCS.
[72] Maged M. Eljazzar,et al. Merging supply chain and blockchain technologies , 2018, ArXiv.
[73] Yue Wang,et al. Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G , 2017, IET Commun..
[74] Mauro Conti,et al. A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.
[75] Laurent Njilla,et al. Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
[76] Mian Zhang,et al. Blockchain for healthcare records: A data perspective , 2018, PeerJ Prepr..
[77] Pierre Noizat. Blockchain Electronic Vote , 2015 .
[78] Michael S. Kester,et al. Bitcoin Transaction Graph Analysis , 2015, ArXiv.
[79] Martijn Bastiaan,et al. Preventing the 51%-Attack: a Stochastic Analysis of Two Phase Proof of Work in Bitcoin , 2015 .
[80] Konstantinos Markantonakis,et al. E-Voting With Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[81] Nikita Borisov,et al. Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises , 2017, RAID.
[82] Sunghyun Cho,et al. A Survey of Scalability Solutions on Blockchain , 2018, 2018 International Conference on Information and Communication Technology Convergence (ICTC).
[83] Snowflake to Avalanche : A Novel Metastable Consensus Protocol Family for Cryptocurrencies Team Rocket , 2018 .
[84] Andrew Miller,et al. Sprites: Payment Channels that Go Faster than Lightning , 2017, ArXiv.
[85] Prateek Saxena,et al. On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.
[86] Massimo Bartoletti,et al. A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.
[87] Ling Ren,et al. Analysis of Nakamoto Consensus , 2019, IACR Cryptol. ePrint Arch..
[88] Zhen Liu,et al. Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain , 2018, NSS.
[89] Dean Rakic,et al. Blockchain Technology in Healthcare , 2018, ICT4AWE.
[90] Jörg Becker,et al. Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency , 2012, WEIS.
[91] Sarah Underwood,et al. Blockchain beyond bitcoin , 2016, Commun. ACM.
[92] Gavin Andresen,et al. An Analysis of Attacks on Blockchain Consensus , 2016, ArXiv.
[93] Tobias Distler,et al. Resource-Efficient Byzantine Fault Tolerance , 2016, IEEE Transactions on Computers.
[94] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[95] Sushmita Ruj,et al. Bitcoin Block Withholding Attack: Analysis and Mitigation , 2017, IEEE Transactions on Information Forensics and Security.
[96] Lear Bahack,et al. Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) , 2013, IACR Cryptol. ePrint Arch..
[97] Ethan Heilman,et al. Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions , 2016, Financial Cryptography Workshops.
[98] Ying Liu,et al. Model Checking PBFT Consensus Mechanism in Healthcare Blockchain Network , 2018, 2018 9th International Conference on Information Technology in Medicine and Education (ITME).
[99] Jong-Hyouk Lee,et al. Double-Spending With a Sybil Attack in the Bitcoin Decentralized Network , 2019, IEEE Transactions on Industrial Informatics.
[100] R. Stokes,et al. Virtual money laundering: the case of Bitcoin and the Linden dollar , 2012 .
[101] Lixin Gao. On inferring autonomous system relationships in the internet , 2001, TNET.
[102] Tyler Moore,et al. Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem , 2014, Financial Cryptography Workshops.
[103] Ghassan O. Karame,et al. Scalable Byzantine Consensus via Hardware-Assisted Secret Sharing , 2016, IEEE Transactions on Computers.
[104] Iresha Dilhani,et al. Transaction Verification Model over Double Spending for Peer-to-Peer Digital Currency Transactions based on Blockchain Architecture , 2017 .
[105] Radu State,et al. Automated Labeling of Unknown Contracts in Ethereum , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).
[106] Abdelhakim Hafid,et al. ChainSecure - A Scalable and Proactive Solution for Protecting Blockchain Applications Using SDN , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).
[107] Hong-Sheng Zhou,et al. TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake , 2018, BCC '18.
[108] Meni Rosenfeld,et al. Analysis of Bitcoin Pooled Mining Reward Systems , 2011, ArXiv.
[109] Uwe Zdun,et al. Smart contracts: security patterns in the ethereum ecosystem and solidity , 2018, 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE).
[110] Martin B. H. Weiss,et al. On the Application of Blockchains to Spectrum Management , 2019, IEEE Transactions on Cognitive Communications and Networking.
[111] Sachin Shetty,et al. Attack Surface Analysis of Permissioned Blockchain Platforms for Smart Cities , 2018, 2018 IEEE International Smart Cities Conference (ISC2).
[112] Jaekyun Moon,et al. Scalable Network-Coded PBFT Consensus Algorithm , 2019, 2019 IEEE International Symposium on Information Theory (ISIT).
[113] Tiago M. Fernández-Caramés,et al. A Review on the Use of Blockchain for the Internet of Things , 2018, IEEE Access.
[114] Xu Hao,et al. Dynamic Practical Byzantine Fault Tolerance , 2018 .
[115] Marko Vukolic,et al. Blockchain Consensus Protocols in the Wild (Keynote Talk) , 2017, DISC.
[116] Anamika Chauhan,et al. Blockchain and Scalability , 2018, 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).
[117] Aviv Zohar,et al. Avoiding Deadlocks in Payment Channel Networks , 2018, DPM/CBT@ESORICS.
[118] Rui Guo,et al. Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems , 2018, IEEE Access.
[119] Myungjae Shin,et al. Recipient-Oriented Transaction for Preventing Double Spending Attacks in Private Blockchain , 2018, 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[120] Guillermo Navarro-Arribas,et al. Double-spending prevention for Bitcoin zero-confirmation transactions , 2018, International Journal of Information Security.
[121] Juan M. Corchado,et al. Blockchain framework for IoT data quality via edge computing , 2018, BlockSys@SenSys.
[122] Pieter Wuille,et al. Enabling Blockchain Innovations with Pegged Sidechains , 2014 .
[123] Joseph Bonneau,et al. Why Buy When You Can Rent? - Bribery Attacks on Bitcoin-Style Consensus , 2016, Financial Cryptography Workshops.
[124] Emin Gün Sirer,et al. Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.
[125] Tyler Moore,et al. The Bitcoin Brain Drain: Examining the Use and Abuse of Bitcoin Brain Wallets , 2016, Financial Cryptography.
[126] Ghassan O. Karame,et al. Double-spending fast payments in bitcoin , 2012, CCS.
[127] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[128] Nikos Fotiou,et al. Decentralized name-based security for content distribution using blockchains , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[129] Jian Tang,et al. CoinExpress: A Fast Payment Routing Mechanism in Blockchain-Based Payment Channel Networks , 2018, 2018 27th International Conference on Computer Communication and Networks (ICCCN).
[130] Henrik Sternberg,et al. Chains in Chains - Logic and Challenges of Blockchains in Supply Chains , 2018, HICSS.
[131] Aziz Mohaisen,et al. RouteChain: Towards Blockchain-based Secure and Efficient BGP Routing , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
[132] Kotagiri Ramamohanarao,et al. Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.
[133] Aggelos Kiayias,et al. Stake-Bleeding Attacks on Proof-of-Stake Blockchains , 2018, 2018 Crypto Valley Conference on Blockchain Technology (CVCBT).
[134] Beng Chin Ooi,et al. BLOCKBENCH: A Framework for Analyzing Private Blockchains , 2017, SIGMOD Conference.
[135] Tyler Moore,et al. Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools , 2014, Financial Cryptography Workshops.
[136] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[137] Aziz Mohaisen,et al. Countering Selfish Mining in Blockchains , 2018, 2019 International Conference on Computing, Networking and Communications (ICNC).
[138] Anthony E. Krzesinski,et al. Increased block size and Bitcoin blockchain dynamics , 2017, 2017 27th International Telecommunication Networks and Applications Conference (ITNAC).
[139] Ernesto Damiani,et al. A Comparative Analysis of Current Cryptocurrencies , 2018, ICISSP.
[140] Ittay Eyal,et al. The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.
[141] Aziz Mohaisen,et al. Domain Name System Security and Privacy: Old Problems and New Challenges , 2016, ArXiv.
[142] Andrew Kang. Bitcoin's Growing Pains: Intermediation and the Need for an Effective Loss Allocation Mechanism , 2017 .
[143] Ari Juels,et al. $evwu Dfw , 1998 .
[144] Younghee Park,et al. Silent Timestamping for Blockchain Mining Pool Security , 2019, 2019 International Conference on Computing, Networking and Communications (ICNC).
[145] Renato Lo Cigno,et al. Proof of networking: Can blockchains boost the next generation of distributed networks? , 2018, 2018 14th Annual Conference on Wireless On-demand Network Systems and Services (WONS).
[146] Guillermo Navarro-Arribas,et al. Analysis of the Bitcoin UTXO set , 2018, IACR Cryptol. ePrint Arch..
[147] A. Stephen Morse,et al. Analysis of Difficulty Control in Bitcoin and Proof-of-Work Blockchains , 2018, 2018 IEEE Conference on Decision and Control (CDC).
[148] Mubashir Husain Rehmani,et al. Applications of Blockchains in the Internet of Things: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.
[149] Hyoung Joong Kim,et al. Electronic Voting Service Using Block-Chain , 2016, J. Digit. Forensics Secur. Law.
[150] Alf Zugenmaier,et al. The Impact of Uncle Rewards on Selfish Mining in Ethereum , 2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[151] Hubert Ritzdorf,et al. On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..
[152] Roberto Baldoni,et al. PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain , 2018, ITASEC.
[153] Aziz Mohaisen,et al. BlockTrail: A Scalable Multichain Solution for Blockchain-Based Audit Trails , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[154] Rojeena Bajracharya,et al. A new type of blockchain for secure message exchange in VANET , 2020, Digit. Commun. Networks.
[155] Ethan Heilman,et al. Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network , 2020, IACR Cryptol. ePrint Arch..
[156] Kishor S. Trivedi,et al. Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric) , 2017, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS).
[157] Cyril Grunspan,et al. On profitability of selfish mining , 2018, ArXiv.
[158] Maria Gradinariu Potop-Butucaru,et al. ZeroBlock: Preventing Selfish Mining in Bitcoin , 2016, ArXiv.
[159] Aziz Mohaisen,et al. Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking , 2019, 2019 APWG Symposium on Electronic Crime Research (eCrime).
[160] Denis Butin,et al. XMSS: Extended Hash-Based Signatures , 2015 .
[161] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[162] Friedrich Holotiuk,et al. The Impact of Blockchain Technology on Business Models in the Payments Industry , 2017, Wirtschaftsinformatik.
[163] Mohammed Samaka,et al. Security Services Using Blockchains: A State of the Art Survey , 2018, IEEE Communications Surveys & Tutorials.
[164] Ghassan O. Karame,et al. Misbehavior in Bitcoin: A Study of Double-Spending and Accountability , 2015, TSEC.
[165] Jong Hyuk Park,et al. DistArch-SCNet: Blockchain-Based Distributed Architecture with Li-Fi Communication for a Scalable Smart City Network , 2018, IEEE Consumer Electronics Magazine.
[166] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[167] Moti Yung,et al. Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation , 2017, AsiaCCS.
[168] Chinmaya Vyas,et al. Security Concerns and Issues for Bitcoin , 2014 .
[169] Kartik Nayak,et al. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[170] Abhi Shelat,et al. Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.
[171] Albert Levi,et al. A Survey on Anonymity and Privacy in Bitcoin-Like Digital Cash Systems , 2018, IEEE Communications Surveys & Tutorials.
[172] Shengling Wang,et al. Corking by Forking: Vulnerability Analysis of Blockchain , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.
[173] Min-Shiang Hwang,et al. A Blockchain-Based Traceable Certification System , 2017 .
[174] Wei Ni,et al. Attack and Defence of Ethereum Remote APIs , 2018, 2018 IEEE Globecom Workshops (GC Wkshps).
[175] Björn Scheuermann,et al. Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.
[176] George Danezis,et al. SoK: Consensus in the Age of Blockchains , 2017, AFT.
[177] Praneeth Babu Marella,et al. BroncoVote: Secure Voting System using Ethereum's Blockchain , 2018, ICISSP.
[178] Mahesh Kumar,et al. Improving routing in large networks inside autonomous system , 2014, Int. J. Syst. Assur. Eng. Manag..
[179] Jason Teutsch,et al. Smart Contracts Make Bitcoin Mining Pools Vulnerable , 2017, Financial Cryptography Workshops.
[180] Long Tran-Thanh,et al. On the Preliminary Investigation of Selfish Mining Strategy with Multiple Selfish Miners , 2018, ArXiv.
[181] Nikhil Swamy,et al. Formal Verification of Smart Contracts: Short Paper , 2016, PLAS@CCS.
[182] Antônio A. de A. Rocha,et al. A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack , 2018, Secur. Commun. Networks.