2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS) 2019
DOI: 10.1109/icdcs.2019.00119
|View full text |Cite
|
Sign up to set email alerts
|

Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 39 publications
(22 citation statements)
references
References 18 publications
0
22
0
Order By: Relevance
“…In double spending multiple transactions with the same cryptocurrency are performed by a user [131,132]. This transaction is broadcast to each node in that network.…”
Section: Double Spendingmentioning
confidence: 99%
See 1 more Smart Citation
“…In double spending multiple transactions with the same cryptocurrency are performed by a user [131,132]. This transaction is broadcast to each node in that network.…”
Section: Double Spendingmentioning
confidence: 99%
“…This transaction is broadcast to each node in that network. This transaction needs to be confirmed by the nodes, this confirmation is time consumable [131]. This time between two transactions' initiation and confirmation can be a window for the attacker to quickly launch his/her attack [133,134].…”
Section: Double Spendingmentioning
confidence: 99%
“…Typically, the mining pool uses the stratum overlay protocol server that has a public IP address, which is vulnerable to routing attack and flood attacks due to the open public IP address. According to research by Apostolaki et al [69] and Saad et al [70], the impact of these BGP hijacking and routing attacks is severe such that the network hash rate can be reduced up to 50% due to the hijacking. Besides, the block propagation time of Bitcoin network can increase up to 20 mins by routing attacks.…”
Section: F Vdr Partitioning / Icn Attack (A 17 )mentioning
confidence: 99%
“…Proof‐of‐work . The PoW consensus protocol involves solving a computationally expensive challenge to elect a leader [21]. In PoW‐based systems, the leader is also called a miner, who solves the challenge, orders transactions in a block, and broadcasts the block to the network.…”
Section: Background and Preliminariesmentioning
confidence: 99%