메뉴 건너뛰기




Volumn , Issue , 2015, Pages

Shadow-bitcoin: scalable simulation via direct execution of multi-threaded applications

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SOFTWARE; DENIAL-OF-SERVICE ATTACK; NETWORK SECURITY;

EID: 85084162397     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (53)

References (36)
  • 5
    • 85080611225 scopus 로고    scopus 로고
    • The Tor Project. https://www.torproject.org
    • The Tor Project. https://www.torproject.org/.
  • 6
    • 85080627334 scopus 로고    scopus 로고
    • Chain fork post-mortem
    • March
    • ANDRESEN, G. March 2013 Chain Fork Post-Mortem. BIP 50.
    • (2013) BIP , vol.50
    • Andresen, G.1
  • 7
    • 84945225920 scopus 로고    scopus 로고
    • Theoretical bitcoin attacks with less than half of the computational power (draft)
    • Tech. Rep. abs/1312.7013
    • BAHACK, L. Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft). Tech. Rep. abs/1312.7013, CoRR, 2013.
    • (2013) CoRR
    • Bahack, L.1
  • 14
    • 85119225770 scopus 로고    scopus 로고
    • Analyzing the effectiveness of dos attacks on tor
    • CONRAD, B., AND SHIRAZI, F. Analyzing the effectiveness of dos attacks on tor. In SIN (2014), pp. 355:355–355:358.
    • (2014) SIN , pp. 355355-355358
    • Conrad, B.1    Shirazi, F.2
  • 15
    • 84893243047 scopus 로고    scopus 로고
    • Information propagation in the bitcoin network
    • DECKER, C., AND WATTENHOFER, R. Information propagation in the bitcoin network. In IEEE P2P (2013).
    • (2013) IEEE P2P
    • Decker, C.1    Wattenhofer, R.2
  • 16
    • 85084161591 scopus 로고    scopus 로고
    • Portable multithreading: The signal stack trick for user-space thread creation
    • ENGELSCHALL, R. S. Portable multithreading: The signal stack trick for user-space thread creation. In USENIX ATC (2000).
    • (2000) USENIX ATC
    • Engelschall, R.S.1
  • 17
    • 85035148867 scopus 로고    scopus 로고
    • The miner’s dilemma
    • EYAL, I. The Miner’s Dilemma. In IEEE S&P (2015).
    • (2015) IEEE S&P
    • Eyal, I.1
  • 18
    • 84945212793 scopus 로고    scopus 로고
    • Majority is not enough: Bitcoin mining is vulnerable
    • EYAL, I., AND SIRER, E. G. Majority is not enough: Bitcoin mining is vulnerable. In FC (2014).
    • (2014) FC
    • Eyal, I.1    Sirer, E.G.2
  • 19
    • 84922420033 scopus 로고    scopus 로고
    • How low can you go: Balancing performance with anonymity in tor
    • GEDDES, J., JANSEN, R., AND HOPPER, N. How low can you go: Balancing performance with anonymity in Tor. In PETS (2013).
    • (2013) PETS
    • Geddes, J.1    Jansen, R.2    Hopper, N.3
  • 20
    • 85080584965 scopus 로고    scopus 로고
    • March
    • HEARN, M. Testnet in a box. https://bitcointalk.org/index.php?topic=4483.0, March 2011.
    • (2011) Testnet in A Box
    • Hearn, M.1
  • 23
    • 84970886453 scopus 로고    scopus 로고
    • Never been kist: Tor’s congestion management blossoms with kernel-informed socket transport
    • JANSEN, R., GEDDES, J., WACEK, C., SHERR, M., AND SYVERSON, P. Never been KIST: Tor’s congestion management blossoms with kernel-informed socket transport. In USENIX Security (2014).
    • (2014) USENIX Security
    • Jansen, R.1    Geddes, J.2    Wacek, C.3    Sherr, M.4    Syverson, P.5
  • 24
    • 85180760932 scopus 로고    scopus 로고
    • Shadow: Running tor in a box for accurate and efficient experimentation
    • JANSEN, R., AND HOPPER, N. Shadow: Running Tor in a box for accurate and efficient experimentation. In NDSS (2012).
    • (2012) NDSS
    • Jansen, R.1    Hopper, N.2
  • 25
    • 84883308148 scopus 로고    scopus 로고
    • Lira: Lightweight incentivized routing for anonymity
    • JANSEN, R., JOHNSON, A., AND SYVERSON, P. LIRA: Lightweight incentivized routing for anonymity. In NDSS (2013).
    • (2013) NDSS
    • Jansen, R.1    Johnson, A.2    Syverson, P.3
  • 27
    • 85180623308 scopus 로고    scopus 로고
    • The sniper attack: Anonymously deanonymizing and disabling the tor network
    • JANSEN, R., TSCHORSCH, F., JOHNSON, A., AND SCHEUERMANN, B. The Sniper Attack: Anonymously deanonymizing and disabling the Tor network. In NDSS (2014).
    • (2014) NDSS
    • Jansen, R.1    Tschorsch, F.2    Johnson, A.3    Scheuermann, B.4
  • 28
    • 85080613711 scopus 로고    scopus 로고
    • Tor IMux: Managing connections from two to infinity, and beyond
    • JOHN GEDDES, R. J., AND HOPPER, N. Tor IMUX: Managing connections from two to infinity, and beyond. In WPES (2014).
    • (2014) WPES
    • John Geddes, R.J.1    Hopper, N.2
  • 29
    • 84889028646 scopus 로고    scopus 로고
    • Users get routed: Traffic correlation on tor by realistic adversaries
    • JOHNSON, A., WACEK, C., JANSEN, R., SHERR, M., AND SYVERSON, P. Users get routed: Traffic correlation on tor by realistic adversaries. In ACM CCS (2013).
    • (2013) ACM CCS
    • Johnson, A.1    Wacek, C.2    Jansen, R.3    Sherr, M.4    Syverson, P.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.