메뉴 건너뛰기




Volumn , Issue , 2015, Pages 129-144

Eclipse attacks on Bitcoin’s peer-to-peer network

Author keywords

[No Author keywords available]

Indexed keywords

BITCOIN; INTELLIGENT SYSTEMS; MONTE CARLO METHODS; NETWORK ARCHITECTURE;

EID: 85070733097     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (799)

References (65)
  • 1
    • 84855422618 scopus 로고    scopus 로고
    • Accessed: 2014-06-18
    • Amazon web services elastic ip. http://aws.amazon.com/ec2/faqs/#elastic-ip. Accessed: 2014-06-18.
    • Amazon Web Services Elastic IP
  • 3
    • 85045342317 scopus 로고    scopus 로고
    • Accessed: 2014-02-09
    • Bitcoin wiki: Double-spending. https://en.bitcoin.it/wiki/Double-spending. Accessed: 2014-02-09.
    • Bitcoin Wiki: Double-Spending
  • 5
    • 85076324480 scopus 로고    scopus 로고
    • Accessed: 2014-02-09
    • Bitpay: What is transaction speed? https://support.bitpay.com/hc/en- us/articles/ 202943915- What- is- Transaction- Speed-. Accessed: 2014-02-09.
    • Bitpay: What Is Transaction Speed?
  • 6
    • 85076302706 scopus 로고    scopus 로고
    • Bug bounty requested: 10 btc for huge dos bug in all current bitcoin clients
    • Accessed: 2014-06-17
    • Bug bounty requested: 10 btc for huge dos bug in all current bitcoin clients. Bitcoin Forum. https://bitcointalk.org/index.php?topic=944369.msg10376763#msg10376763. Accessed: 2014-06-17.
    • Bitcoin Forum
  • 7
    • 85076295811 scopus 로고    scopus 로고
    • CVE-2013-5700: Accessed: 2014-02-11
    • CVE-2013-5700: Remote p2p crash via bloom filters. https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_ Exposures. Accessed: 2014-02-11.
    • Remote P2p Crash Via Bloom Filters
  • 8
    • 85076321681 scopus 로고    scopus 로고
    • Accessed: 2014-06-18
    • Microsoft azure ip address pricing. http://azure.microsoft.com/en-us/pricing/details/ ip-addresses/. Accessed: 2014-06-18.
    • Microsoft Azure IP Address Pricing
  • 13
    • 84885718443 scopus 로고    scopus 로고
    • Robust random number generation for peer-to-peer systems
    • Springer
    • AWERBUCH, B., AND SCHEIDELER, C. Robust random number generation for peer-to-peer systems. In Principles of Distributed Systems. Springer, 2006, pp. 275–289.
    • (2006) Principles of Distributed Systems , pp. 275-289
    • Awerbuch, B.1    Scheideler, C.2
  • 18
    • 84962940118 scopus 로고    scopus 로고
    • February
    • BITCOIN WIKI. Confirmation. https://en.bitcoin.it/wiki/Confirmation, February 2015.
    • (2015) Confirmation
  • 20
    • 85076324247 scopus 로고    scopus 로고
    • February
    • BLOCKCHAIN.IO. Average transaction confirmation time. https://blockchain.info/charts/ avg-confirmation-time, February 2015.
    • (2015) Average Transaction Confirmation Time
  • 21
  • 22
    • 0002681959 scopus 로고
    • Untraceable off-line cash in wallets with observers (extended abstract)
    • BRANDS, S. Untraceable off-line cash in wallets with observers (extended abstract). In CRYPTO (1993).
    • (1993) CRYPTO
    • Brands, S.1
  • 26
    • 84937390337 scopus 로고    scopus 로고
    • 2012
    • CARNABOTNET. Internet census 2012. http://internetcensus2012.bitbucket.org/paper.html, 2012.
    • (2012) Internet Census
  • 28
    • 0003062028 scopus 로고
    • Blind signature system
    • CHAUM, D. Blind signature system. In CRYPTO (1983).
    • (1983) CRYPTO
    • Chaum, D.1
  • 37
    • 84916608111 scopus 로고    scopus 로고
    • Majority is not enough: Bitcoin mining is vulnerable
    • Springer
    • EYAL, I., AND SIRER, E. G. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security. Springer, 2014, pp. 436–454.
    • (2014) Financial Cryptography and Data Security , pp. 436-454
    • Eyal, I.1    Sirer, E.G.2
  • 38
    • 84902673916 scopus 로고    scopus 로고
    • Analyzing the deployment of bitcoin’s p2p network under an as-level perspective
    • FELD, S., SCHÖNFELD, M., AND WERNER, M. Analyzing the deployment of bitcoin’s p2p network under an as-level perspective. Procedia Computer Science 32 (2014), 1121–1126.
    • (2014) Procedia Computer Science , vol.32 , pp. 1121-1126
    • Feld, S.1    Schönfeld, M.2    Werner, M.3
  • 39
    • 85076273093 scopus 로고    scopus 로고
    • Accessed: 2014-02-12
    • FINNEY, H. Bitcoin talk: Finney attack. https://bitcointalk.org/index.php?topic=3441.msg48384# msg48384, 2011. Accessed: 2014-02-12.
    • (2011) Bitcoin Talk: Finney Attack
    • Finney, H.1
  • 42
    • 35248832638 scopus 로고    scopus 로고
    • Asymptotically efficient approaches to fault-tolerance in peer-to-peer networks
    • Springer
    • HILDRUM, K., AND KUBIATOWICZ, J. Asymptotically efficient approaches to fault-tolerance in peer-to-peer networks. In Distributed Computing. Springer, 2003, pp. 321–336.
    • (2003) Distributed Computing , pp. 321-336
    • Hildrum, K.1    Kubiatowicz, J.2
  • 43
    • 85034596949 scopus 로고    scopus 로고
    • January
    • IANA. Iana ipv4 address space registry. http://www.iana.org/assignments/ipv4-address-space/ ipv4-address-space.xhtml, January 2015.
    • (2015) Iana Ipv4 Address Space Registry
  • 46
    • 84887938476 scopus 로고    scopus 로고
    • Two bitcoins at the price of one? Double-spending attacks on fast payments in bitcoin
    • KARAME, G., ANDROULAKI, E., AND CAPKUN, S. Two bitcoins at the price of one? double-spending attacks on fast payments in bitcoin. IACR Cryptology ePrint Archive 2012 (2012), 248.
    • (2012) IACR Cryptology ePrint Archive , vol.2012 , pp. 248
    • Karame, G.1    Androulaki, E.2    Capkun, S.3
  • 49
    • 84940409394 scopus 로고    scopus 로고
    • The economics of bitcoin mining, or bitcoin in the presence of adversaries
    • KROLL, J. A., DAVEY, I. C., AND FELTEN, E. W. The economics of bitcoin mining, or bitcoin in the presence of adversaries. In Proceedings of WEIS (2013), vol. 2013.
    • (2013) Proceedings of WEIS , vol.2013
    • Kroll, J.A.1    Davey, I.C.2    Felten, E.W.3
  • 55
    • 85076324513 scopus 로고    scopus 로고
    • October
    • RIPE. Ripestat. https://stat.ripe.net/data/ announced-prefixes, October 2014.
    • (2014) Ripestat
  • 56
    • 85076306645 scopus 로고    scopus 로고
    • RIPE. Latest delegations. ftp://ftp.ripe.net/pub/stats/ripencc/delegated-ripencc-extended-latest, 2015.
    • (2015) Latest Delegations
  • 60
    • 85065092524 scopus 로고    scopus 로고
    • On the phase space of block-hiding strategies
    • SHOMER, A. On the phase space of block-hiding strategies. IACR Cryptology ePrint Archive 2014 (2014), 139.
    • (2014) IACR Cryptology ePrint Archive , vol.2014 , pp. 139
    • Shomer, A.1
  • 62
    • 84947265806 scopus 로고    scopus 로고
    • Security considerations for peer-to-peer distributed hash tables
    • Springer
    • SIT, E., AND MORRIS, R. Security considerations for peer-to-peer distributed hash tables. In Peer-to-Peer Systems. Springer, 2002, pp. 261–269.
    • (2002) Peer-to-Peer Systems , pp. 261-269
    • Sit, E.1    Morris, R.2
  • 65
    • 84910624054 scopus 로고    scopus 로고
    • Empirical analysis of denial-of-service attacks in the bitcoin ecosystem
    • Springer
    • VASEK, M., THORNTON, M., AND MOORE, T. Empirical analysis of denial-of-service attacks in the bitcoin ecosystem. In Financial Cryptography and Data Security. Springer, 2014, pp. 57–71.
    • (2014) Financial Cryptography and Data Security , pp. 57-71
    • Vasek, M.1    Thornton, M.2    Moore, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.