Corking by Forking: Vulnerability Analysis of Blockchain

作者: Shengling Wang , Chenyu Wang , Qin Hu

DOI: 10.1109/INFOCOM.2019.8737490

关键词:

摘要: The great market success of Blockchain makes it an extremely valuable target for attackers. A well-known attack in Blockchain is the forking attack, where divergent blockchains are …

参考文章(19)
Ghassan O. Karame, Elli Androulaki, Marc Roeschlin, Arthur Gervais, Srdjan Čapkun, Misbehavior in Bitcoin ACM Transactions on Information and System Security. ,vol. 18, pp. 1- 32 ,(2015) , 10.1145/2732196
Ayelet Sapirshtein, Yonatan Sompolinsky, Aviv Zohar, Optimal Selfish Mining Strategies in Bitcoin Financial Cryptography and Data Security. pp. 515- 532 ,(2017) , 10.1007/978-3-662-54970-4_30
Ghassan O. Karame, Elli Androulaki, Srdjan Capkun, Double-spending fast payments in bitcoin Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12. pp. 906- 917 ,(2012) , 10.1145/2382196.2382292
Sarah Spiekermann, Alessandro Acquisti, Rainer Böhme, Kai-Lung Hui, The Challenges of Personal Data Markets and Privacy Electronic Markets. ,vol. 25, pp. 161- 167 ,(2015) , 10.1007/S12525-015-0191-0
Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun, Tampering with the Delivery of Blocks and Transactions in Bitcoin computer and communications security. pp. 692- 705 ,(2015) , 10.1145/2810103.2813655
Ittay Eyal, Emin Gün Sirer, Majority is not enough: bitcoin mining is vulnerable Communications of The ACM. ,vol. 61, pp. 95- 102 ,(2018) , 10.1145/3212998
Tao Zhou, Jian-Guo Liu, Wen-Jie Bai, Guanrong Chen, Bing-Hong Wang, Behaviors of susceptible-infected epidemics on scale-free networks with identical infectivity. Physical Review E. ,vol. 74, pp. 056109- 056109 ,(2006) , 10.1103/PHYSREVE.74.056109
J. Göbel, H.P. Keeler, A.E. Krzesinski, P.G. Taylor, Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay Performance Evaluation. ,vol. 104, pp. 23- 41 ,(2016) , 10.1016/J.PEVA.2016.07.001
Kartik Nayak, Srijan Kumar, Andrew Miller, Elaine Shi, Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack ieee european symposium on security and privacy. pp. 305- 320 ,(2016) , 10.1109/EUROSP.2016.32
Flavia Jolliffe, S. M. Ross, Introduction to Probability Models. Journal of The Royal Statistical Society Series A-statistics in Society. ,vol. 158, pp. 201- 202 ,(1995) , 10.2307/2983433