Towards Automatic Discovery of Denial of Service Weaknesses in Blockchain Resource Models

F Luo, H Lin, Z Li, X Luo, R Luo, Z He, S Song… - Proceedings of the …, 2024 - dl.acm.org
nial-of-Service (DoS) attacks at the execution layer represent one of the most severe threats
to blockchain systems, compromising availability by depleting the resources of victims. To …

Mobile Device Security: A Two-Layered Approach with Blockchain and Sensor Technology for Theft Prevention

N Malsa, R Jain, SB Goyal - Scalable Computing: Practice and Experience, 2024 - scpe.org
In the backdrop of the escalating incidents of mobile device theft and associated security
challenges, a resilient and innovative solution is imperative. The traditional security …

Adversarial Machine Learning for Blockchain Security

A Dhamiwal, S Mahajan - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
This paper explores the intersection of adversarial machine learning (AML) and blockchain
security, presenting a comprehensive analysis of the challenges and solutions in leveraging …

Blockchain Security: A Comparative Analysis of Threats and Countermeasures

E Abedini, A Jalaly Bidgoly, M Nickray - Computing and distributed systems, 2024 - jdcs.ir
Blockchain technology, as one of the transformative innovations of the last decade, has
garnered significant attention across diverse domains such as financial services, healthcare …

[PDF][PDF] Machine Learning-Enhanced Decentralized Finance (DeFi)

O Patel - researchgate.net
This paper ushers an investigation into such an alignment of Machine learning (ML)
algorithms in decentralized finance (DeFi) platforms, arguing the innovation's benefits of …