Exploring the attack surface of blockchain: A comprehensive survey

M Saad, J Spaulding, L Njilla… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
In this paper, we systematically explore the attack surface of the Blockchain technology, with
an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the …

Exploring the attack surface of blockchain: A systematic overview

M Saad, J Spaulding, L Njilla, C Kamhoua… - arxiv preprint arxiv …, 2019 - arxiv.org
In this paper, we systematically explore the attack surface of the Blockchain technology, with
an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the …

Convergence of blockchain and edge computing for secure and scalable IIoT critical infrastructures in industry 4.0

Y Wu, HN Dai, H Wang - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Critical infrastructure systems are vital to underpin the functioning of a society and economy.
Due to the ever-increasing number of Internet-connected Internet-of-Things (IoT)/Industrial …

Sharper: Sharding permissioned blockchains over network clusters

MJ Amiri, D Agrawal, A El Abbadi - Proceedings of the 2021 international …, 2021 - dl.acm.org
Scalability is one of the main roadblocks to business adoption of blockchain systems.
Despite recent intensive research on using sharding techniques to enhance the scalability of …

Scalable byzantine consensus via hardware-assisted secret sharing

J Liu, W Li, GO Karame… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The surging interest in blockchain technology has revitalized the search for effective
Byzantine consensus schemes. In particular, the blockchain community has been looking for …

Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing

C Dong, Y Wang, A Aldweesh, P McCorry… - Proceedings of the …, 2017 - dl.acm.org
Cloud computing has become an irreversible trend. Together comes the pressing need for
verifiability, to assure the client the correctness of computation outsourced to the cloud …

Repucoin: Your reputation is your power

J Yu, D Kozhaya, J Decouchant… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Existing proof-of-work cryptocurrencies cannot tolerate attackers controlling more than 50
percent of the network's computing power at any time, but assume that such a condition …

Reputation-based byzantine fault-tolerance for consortium blockchain

K Lei, Q Zhang, L Xu, Z Qi - 2018 IEEE 24th international …, 2018 - ieeexplore.ieee.org
The Practical Byzantine Fault Tolerance algorithm (PBFT) has been highly applied in
consortium blockchain systems, however, this kind of consensus algorithm can hardly …

Hybrids on steroids: SGX-based high performance BFT

J Behl, T Distler, R Kapitza - … of the Twelfth European Conference on …, 2017 - dl.acm.org
With the advent of trusted execution environments provided by recent general purpose
processors, a class of replication protocols has become more attractive than ever: Protocols …

DAMYSUS: streamlined BFT consensus leveraging trusted components

J Decouchant, D Kozhaya, V Rahli, J Yu - Proceedings of the …, 2022 - dl.acm.org
Recently, streamlined Byzantine Fault Tolerant (BFT) consensus protocols, such as HotStuff,
have been proposed as a means to circumvent the inefficient view-changes of traditional …