-
1
-
-
84855422618
-
-
Accessed: 2014-06-18
-
Amazon web services elastic ip. http://aws.amazon.com/ec2/faqs/#elastic-ip. Accessed: 2014-06-18.
-
Amazon Web Services Elastic IP
-
-
-
3
-
-
85045342317
-
-
Accessed: 2014-02-09
-
Bitcoin wiki: Double-spending. https://en.bitcoin.it/wiki/Double-spending. Accessed: 2014-02-09.
-
Bitcoin Wiki: Double-Spending
-
-
-
5
-
-
85076324480
-
-
Accessed: 2014-02-09
-
Bitpay: What is transaction speed? https://support.bitpay.com/hc/en- us/articles/ 202943915- What- is- Transaction- Speed-. Accessed: 2014-02-09.
-
Bitpay: What Is Transaction Speed?
-
-
-
6
-
-
85076302706
-
Bug bounty requested: 10 btc for huge dos bug in all current bitcoin clients
-
Accessed: 2014-06-17
-
Bug bounty requested: 10 btc for huge dos bug in all current bitcoin clients. Bitcoin Forum. https://bitcointalk.org/index.php?topic=944369.msg10376763#msg10376763. Accessed: 2014-06-17.
-
Bitcoin Forum
-
-
-
7
-
-
85076295811
-
-
CVE-2013-5700: Accessed: 2014-02-11
-
CVE-2013-5700: Remote p2p crash via bloom filters. https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_ Exposures. Accessed: 2014-02-11.
-
Remote P2p Crash Via Bloom Filters
-
-
-
8
-
-
85076321681
-
-
Accessed: 2014-06-18
-
Microsoft azure ip address pricing. http://azure.microsoft.com/en-us/pricing/details/ ip-addresses/. Accessed: 2014-06-18.
-
Microsoft Azure IP Address Pricing
-
-
-
11
-
-
84893351003
-
On the power of the adversary to solve the node sampling problem
-
Springer
-
ANCEAUME, E., BUSNEL, Y., AND GAMBS, S. On the power of the adversary to solve the node sampling problem. In Transactions on Large-Scale Data-and Knowledge-Centered Systems XI. Springer, 2013, pp. 102–126.
-
(2013)
Transactions on Large-Scale Data-and Knowledge-Centered Systems
, vol.11
, pp. 102-126
-
-
Anceaume, E.1
Busnel, Y.2
Gambs, S.3
-
13
-
-
84885718443
-
Robust random number generation for peer-to-peer systems
-
Springer
-
AWERBUCH, B., AND SCHEIDELER, C. Robust random number generation for peer-to-peer systems. In Principles of Distributed Systems. Springer, 2006, pp. 275–289.
-
(2006)
Principles of Distributed Systems
, pp. 275-289
-
-
Awerbuch, B.1
Scheideler, C.2
-
16
-
-
84910678324
-
Deanonymisation of clients in Bitcoin P2P network
-
BIRYUKOV, A., KHOVRATOVICH, D., AND PUSTOGAROV, I. Deanonymisation of clients in Bitcoin P2P network. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (2014), ACM, pp. 15–29.
-
(2014)
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
, pp. 15-29
-
-
Biryukov, A.1
Khovratovich, D.2
Pustogarov, I.3
-
18
-
-
84962940118
-
-
February
-
BITCOIN WIKI. Confirmation. https://en.bitcoin.it/wiki/Confirmation, February 2015.
-
(2015)
Confirmation
-
-
-
20
-
-
85076324247
-
-
February
-
BLOCKCHAIN.IO. Average transaction confirmation time. https://blockchain.info/charts/ avg-confirmation-time, February 2015.
-
(2015)
Average Transaction Confirmation Time
-
-
-
21
-
-
67650523874
-
BRAHMS: Byzantine resilient random membership sampling
-
BORTNIKOV, E., GUREVICH, M., KEIDAR, I., KLIOT, G., AND SHRAER, A. Brahms: Byzantine resilient random membership sampling. Computer Networks 53, 13 (2009), 2340–2359.
-
(2009)
Computer Networks
, vol.53
, Issue.13
, pp. 2340-2359
-
-
Bortnikov, E.1
Gurevich, M.2
Keidar, I.3
Kliot, G.4
Shraer, A.5
-
22
-
-
0002681959
-
Untraceable off-line cash in wallets with observers (extended abstract)
-
BRANDS, S. Untraceable off-line cash in wallets with observers (extended abstract). In CRYPTO (1993).
-
(1993)
CRYPTO
-
-
Brands, S.1
-
26
-
-
84937390337
-
-
2012
-
CARNABOTNET. Internet census 2012. http://internetcensus2012.bitbucket.org/paper.html, 2012.
-
(2012)
Internet Census
-
-
-
27
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
CASTRO, M., DRUSCHEL, P., GANESH, A., ROWSTRON, A., AND WALLACH, D. S. Secure routing for structured peer-to-peer overlay networks. ACM SIGOPS Operating Systems Review 36, SI (2002), 299–314.
-
(2002)
ACM SIGOPS Operating Systems Review
, vol.36
, Issue.SI
, pp. 299-314
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.S.5
-
28
-
-
0003062028
-
Blind signature system
-
CHAUM, D. Blind signature system. In CRYPTO (1983).
-
(1983)
CRYPTO
-
-
Chaum, D.1
-
30
-
-
58149094016
-
Sybil attacks as a mitigation strategy against the storm botnet
-
2008 IEEE
-
DAVIS, C. R., FERNANDEZ, J. M., NEVILLE, S., AND MCHUGH, J. Sybil attacks as a mitigation strategy against the storm botnet. In 3rd International Conference on Malicious and Unwanted Software, 2008. (2008), IEEE, pp. 32–40.
-
(2008)
3rd International Conference on Malicious and Unwanted Software
, pp. 32-40
-
-
Davis, C.R.1
Fernandez, J.M.2
Neville, S.3
McHugh, J.4
-
33
-
-
84941579649
-
One fast guard for life (or 9 months)
-
DINGLEDINE, R., HOPPER, N., KADIANAKIS, G., AND MATHEWSON, N. One fast guard for life (or 9 months). In 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2014) (2014).
-
(2014)
7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2014)
-
-
Dingledine, R.1
Hopper, N.2
Kadianakis, G.3
Mathewson, N.4
-
34
-
-
84910610330
-
The bitcoin p2p network
-
Springer
-
DONET, J. A. D., PÉREZ-SOLA, C., AND HERRERAJOANCOMARTÍ, J. The bitcoin p2p network. In Financial Cryptography and Data Security. Springer, 2014, pp. 87–102.
-
(2014)
Financial Cryptography and Data Security
, pp. 87-102
-
-
Donet, J.A.D.1
Pérez-Sola, C.2
Herrerajoancomartí, J.3
-
37
-
-
84916608111
-
Majority is not enough: Bitcoin mining is vulnerable
-
Springer
-
EYAL, I., AND SIRER, E. G. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security. Springer, 2014, pp. 436–454.
-
(2014)
Financial Cryptography and Data Security
, pp. 436-454
-
-
Eyal, I.1
Sirer, E.G.2
-
38
-
-
84902673916
-
Analyzing the deployment of bitcoin’s p2p network under an as-level perspective
-
FELD, S., SCHÖNFELD, M., AND WERNER, M. Analyzing the deployment of bitcoin’s p2p network under an as-level perspective. Procedia Computer Science 32 (2014), 1121–1126.
-
(2014)
Procedia Computer Science
, vol.32
, pp. 1121-1126
-
-
Feld, S.1
Schönfeld, M.2
Werner, M.3
-
39
-
-
85076273093
-
-
Accessed: 2014-02-12
-
FINNEY, H. Bitcoin talk: Finney attack. https://bitcointalk.org/index.php?topic=3441.msg48384# msg48384, 2011. Accessed: 2014-02-12.
-
(2011)
Bitcoin Talk: Finney Attack
-
-
Finney, H.1
-
41
-
-
84978406507
-
Eclipse attacks on bitcoins peer-to-peer network (full version)
-
HEILMAN, E., KENDLER, A., ZOHAR, A., AND GOLDBERG, S. Eclipse attacks on bitcoins peer-to-peer network (full version). Tech. Rep. 2015/263, ePrint Cryptology Archive, http://eprint.iacr.org/2015/263.pdf, 2015.
-
(2015)
Tech. Rep. 2015/263, ePrint Cryptology Archive
-
-
Heilman, E.1
Kendler, A.2
Zohar, A.3
Goldberg, S.4
-
42
-
-
35248832638
-
Asymptotically efficient approaches to fault-tolerance in peer-to-peer networks
-
Springer
-
HILDRUM, K., AND KUBIATOWICZ, J. Asymptotically efficient approaches to fault-tolerance in peer-to-peer networks. In Distributed Computing. Springer, 2003, pp. 321–336.
-
(2003)
Distributed Computing
, pp. 321-336
-
-
Hildrum, K.1
Kubiatowicz, J.2
-
43
-
-
85034596949
-
-
January
-
IANA. Iana ipv4 address space registry. http://www.iana.org/assignments/ipv4-address-space/ ipv4-address-space.xhtml, January 2015.
-
(2015)
Iana Ipv4 Address Space Registry
-
-
-
44
-
-
77955419008
-
Secure peer sampling
-
JESI, G. P., MONTRESOR, A., AND VAN STEEN, M. Secure peer sampling. Computer Networks 54, 12 (2010), 2086–2098.
-
(2010)
Computer Networks
, vol.54
, Issue.12
, pp. 2086-2098
-
-
Jesi, G.P.1
Montresor, A.2
Van Steen, M.3
-
45
-
-
84910648996
-
Game-theoretic analysis of ddos attacks against bitcoin mining pools
-
Springer
-
JOHNSON, B., LASZKA, A., GROSSKLAGS, J., VASEK, M., AND MOORE, T. Game-theoretic analysis of ddos attacks against bitcoin mining pools. In Financial Cryptography and Data Security. Springer, 2014, pp. 72–86.
-
(2014)
Financial Cryptography and Data Security
, pp. 72-86
-
-
Johnson, B.1
Laszka, A.2
Grossklags, J.3
Vasek, M.4
Moore, T.5
-
46
-
-
84887938476
-
Two bitcoins at the price of one? Double-spending attacks on fast payments in bitcoin
-
KARAME, G., ANDROULAKI, E., AND CAPKUN, S. Two bitcoins at the price of one? double-spending attacks on fast payments in bitcoin. IACR Cryptology ePrint Archive 2012 (2012), 248.
-
(2012)
IACR Cryptology ePrint Archive
, vol.2012
, pp. 248
-
-
Karame, G.1
Androulaki, E.2
Capkun, S.3
-
49
-
-
84940409394
-
The economics of bitcoin mining, or bitcoin in the presence of adversaries
-
KROLL, J. A., DAVEY, I. C., AND FELTEN, E. W. The economics of bitcoin mining, or bitcoin in the presence of adversaries. In Proceedings of WEIS (2013), vol. 2013.
-
(2013)
Proceedings of WEIS
, vol.2013
-
-
Kroll, J.A.1
Davey, I.C.2
Felten, E.W.3
-
51
-
-
84954128379
-
-
Tech. rep., University of Maryland
-
MILLER, A., LITTON, J., PACHULSKI, A., GUPTA, N., LEVIN, D., SPRING, N., AND BHATTACHARJEE, B. Discovering bitcoin’s network topology and influential nodes. Tech. rep., University of Maryland, 2015.
-
(2015)
Discovering Bitcoin’S Network Topology and Influential Nodes
-
-
Miller, A.1
Litton, J.2
Pachulski, A.3
Gupta, N.4
Levin, D.5
Spring, N.6
Bhattacharjee, B.7
-
54
-
-
84866611140
-
Case study of the miner botnet
-
PLOHMANN, D., AND GERHARDS-PADILLA, E. Case study of the miner botnet. In Cyber Conflict (CYCON), 2012 4th International Conference on (2012), IEEE, pp. 1–16.
-
(2012)
Cyber Conflict (CYCON), 2012 4th International Conference on
, pp. 1-16
-
-
Plohmann, D.1
Gerhards-Padilla, E.2
-
55
-
-
85076324513
-
-
October
-
RIPE. Ripestat. https://stat.ripe.net/data/ announced-prefixes, October 2014.
-
(2014)
Ripestat
-
-
-
56
-
-
85076306645
-
-
RIPE. Latest delegations. ftp://ftp.ripe.net/pub/stats/ripencc/delegated-ripencc-extended-latest, 2015.
-
(2015)
Latest Delegations
-
-
-
59
-
-
84881256637
-
Sok: P2pwned-modeling and evaluating the resilience of peer-to-peer botnets
-
ROSSOW, C., ANDRIESSE, D., WERNER, T., STONE-GROSS, B., PLOHMANN, D., DIETRICH, C. J., AND BOS, H. Sok: P2pwned-modeling and evaluating the resilience of peer-to-peer botnets. In IEEE Symposium on Security and Privacy (2013), IEEE, pp. 97–111.
-
(2013)
IEEE Symposium on Security and Privacy
, pp. 97-111
-
-
Rossow, C.1
Andriesse, D.2
Werner, T.3
Stone-Gross, B.4
Plohmann, D.5
Dietrich, C.J.6
Bos, H.7
-
60
-
-
85065092524
-
On the phase space of block-hiding strategies
-
SHOMER, A. On the phase space of block-hiding strategies. IACR Cryptology ePrint Archive 2014 (2014), 139.
-
(2014)
IACR Cryptology ePrint Archive
, vol.2014
, pp. 139
-
-
Shomer, A.1
-
61
-
-
34547492967
-
Eclipse attacks on overlay networks: Threats and defenses
-
In
-
SINGH, A., NGAN, T.-W. J., DRUSCHEL, P., AND WALLACH, D. S. Eclipse attacks on overlay networks: Threats and defenses. In In IEEE INFOCOM (2006).
-
(2006)
IEEE INFOCOM
-
-
Singh, A.1
Ngan, T.-W.J.2
Druschel, P.3
Wallach, D.S.4
-
62
-
-
84947265806
-
Security considerations for peer-to-peer distributed hash tables
-
Springer
-
SIT, E., AND MORRIS, R. Security considerations for peer-to-peer distributed hash tables. In Peer-to-Peer Systems. Springer, 2002, pp. 261–269.
-
(2002)
Peer-to-Peer Systems
, pp. 261-269
-
-
Sit, E.1
Morris, R.2
-
63
-
-
77954925610
-
WalowDac: Analysis of a peer-to-peer botnet
-
STOCK, B., GOBEL, J., ENGELBERTH, M., FREILING, F. C., AND HOLZ, T. Walowdac: Analysis of a peer-to-peer botnet. In European Conference on Computer Network Defense (EC2ND) (2009), IEEE, pp. 13–20.
-
(2009)
European Conference on Computer Network Defense (EC2ND)
, pp. 13-20
-
-
Stock, B.1
Gobel, J.2
Engelberth, M.3
Freiling, F.C.4
Holz, T.5
-
64
-
-
79551699813
-
A survey of dht security techniques
-
URDANETA, G., PIERRE, G., AND STEEN, M. V. A survey of dht security techniques. ACM Computing Surveys (CSUR) 43, 2 (2011), 8.
-
(2011)
ACM Computing Surveys (CSUR)
, vol.43
, Issue.2
, pp. 8
-
-
Urdaneta, G.1
Pierre, G.2
Steen, M.V.3
-
65
-
-
84910624054
-
Empirical analysis of denial-of-service attacks in the bitcoin ecosystem
-
Springer
-
VASEK, M., THORNTON, M., AND MOORE, T. Empirical analysis of denial-of-service attacks in the bitcoin ecosystem. In Financial Cryptography and Data Security. Springer, 2014, pp. 57–71.
-
(2014)
Financial Cryptography and Data Security
, pp. 57-71
-
-
Vasek, M.1
Thornton, M.2
Moore, T.3
|