|
[1]
|
Nakamoto, S. (2008) Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/bitcoin.pdf
|
|
[2]
|
Nofer, M., Gomber, P., Hinz, O. and Schiereck, D. (2017) Blockchain. Business & Information Systems Engineering, 59, 183-187. [Google Scholar] [CrossRef]
|
|
[3]
|
Kiayias, A. and Zindros, D. (2020) Proof-of-Work Sidechains. In: Bracciali, A., Clark, J., Pintore, F., Rønne, P. and Sala, M., Eds., FC 2019: Financial Cryptography and Data Security, Springer, Cham, 21-34. [Google Scholar] [CrossRef]
|
|
[4]
|
Jiang, N., Xu, D., Zhou, J., et al. (2020) Toward Optimal Par-ticipant Decisions with Voting-Based Incentive Model for Crowd Sensing. Information Sciences, 512, 1-17. [Google Scholar] [CrossRef]
|
|
[5]
|
Ye, C., Li, G., Cai, H., et al. (2018) Analysis of Security in Block-chain: Case Study in 51%-Attack Detecting. 2018 5th International Conference on Dependable Systems and Their Ap-plications (DSA), Dalian, 22-23 September 2018, 15-24. [Google Scholar] [CrossRef]
|
|
[6]
|
Eyal, I. and Sirer, E.G. (2014) Majority Is Not Enough: Bitcoin Mining Is Vulnerable. In: Christin, N. and Safavi-Naini, R., Eds., FC 2014: Financial Cryptography and Data Security, Springer, Berlin, 436-454. [Google Scholar] [CrossRef]
|
|
[7]
|
Bag, S., Ruj, S. and Sakurai, K. (2016) Bitcoin Block With-holding Attack: Analysis and Mitigation. IEEE Transactions on Information Forensics and Security, 12, 1967-1978. [Google Scholar] [CrossRef]
|
|
[8]
|
Nayak, K., Kumar, S., Miller, A. and Shi, E. (2016) Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack. 2016 IEEE European Symposium on Secu-rity and Privacy (EuroS&P), Saarbruecken, 21-24 March 2016, 305-320. [Google Scholar] [CrossRef]
|
|
[9]
|
Bonneau, J. (2016) Why Buy When You Can Rent? In: Clark, J., Meiklejohn, S., Ryan, P., Wallach, D., Brenner, M. and Rohloff, K., Eds., FC 2016: Financial Cryptography and Data Security, Springer, Berlin, 19-26. [Google Scholar] [CrossRef]
|
|
[10]
|
Marcus, Y., Heilman, E. and Goldberg, S. (2018) Low-Resource Eclipse Attacks on Ethereum’s Peer-to-Peer Network.
https://eprint.iacr.org/2018/236
|
|
[11]
|
Zhang, Y., Zhao, M., Li, T., et al. (2023) Achieving Optimal Rewards in Cryptocurrency Stubborn Mining with State Transition Analysis. Information Sciences, 625, 299-313. [Google Scholar] [CrossRef]
|
|
[12]
|
Liu, Y., Hei, Y., Xu, T. and Liu, J.W. (2020) An Evaluation of Un-cle Block Mechanism Effect on Ethereum Selfish and Stubborn Mining Combined with an Eclipse Attack. IEEE Access, 8, 17489-17499. [Google Scholar] [CrossRef]
|
|
[13]
|
Wang, Z., Liu, J., Wu, Q., et al. (2019) An Analytic Evalua-tion for the Impact of Uncle Blocks by Selfish and Stubborn Mining in an Imperfect Ethereum Network. Computers & Security, 87, Article ID: 101581. [Google Scholar] [CrossRef]
|
|
[14]
|
Sun, H., Ruan, N. and Su, C. (2020) How to Model the Bribery Attack: A Practical Quantification Method in Blockchain. In: Chen, L., Li, N., Liang, K. and Schneider, S., Eds., Com-puter Security—ESORICS 2020, Springer, Cham, 569-589. [Google Scholar] [CrossRef]
|
|
[15]
|
Gao, S., Li, Z., Peng, Z. and Xiao, B. (2019) Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, 11-15 November 2019, 833-850. [Google Scholar] [CrossRef]
|
|
[16]
|
Yang, G., Wang, Y., Wang, Z., et al. (2020) IPBSM: An Optimal Bribery Selfish Mining in the Presence of Intelligent and Pure Attackers. International Journal of Intelligent Systems, 35, 1735-1748. [Google Scholar] [CrossRef]
|
|
[17]
|
曾诗钦, 霍如, 黄韬, 等. 区块链技术研究综述: 原理, 进展与应用[J]. 通信学报, 2020, 41(1): 134-151.
|
|
[18]
|
田国华, 胡云瀚, 陈晓峰. 区块链系统攻击与防御技术研究进展[J]. 软件学报, 2021, 32(5): 1495-1525.
|
|
[19]
|
贺海武, 延安, 陈泽华. 基于区块链的智能合约技术与应用综述[J]. 计算机研究与发展, 2018, 55(11): 2452-2466.
|
|
[20]
|
钱鹏, 刘振广, 何钦铭, 等. 智能合约安全漏洞检测技术研究综述[J]. 软件学报, 2022, 33(8): 3059-3085.
|
|
[21]
|
江沛佩, 王骞, 陈艳姣, 等. 区块链网络安全保障: 攻击与防御[J]. 通信学报, 2021, 42(1): 151-162.
|