Exploring the attack surface of blockchain: A comprehensive survey

M Saad, J Spaulding, L Njilla… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
In this paper, we systematically explore the attack surface of the Blockchain technology, with
an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the …

Exploring the attack surface of blockchain: A systematic overview

M Saad, J Spaulding, L Njilla, C Kamhoua… - arxiv preprint arxiv …, 2019 - arxiv.org
In this paper, we systematically explore the attack surface of the Blockchain technology, with
an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the …

The bitcoin backbone protocol: Analysis and applications

J Garay, A Kiayias, N Leonardos - Journal of the ACM, 2024 - dl.acm.org
Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we
extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone …

Bitcoin's academic pedigree

A Narayanan, J Clark - Communications of the ACM, 2017 - dl.acm.org
Bitcoin's academic pedigree Page 1 36 COMMUNICATIONS OF THE ACM |
DECEMBER 2017 | VOL. 60 | NO. 12 practice IMA GE B Y INKED PIXEL S DOI:10.1145/3132259 …

Spectre: A fast and scalable cryptocurrency protocol

Y Sompolinsky, Y Lewenberg, A Zohar - Cryptology ePrint Archive, 2016 - eprint.iacr.org
A growing body of research on Bitcoin and other permissionless cryptocurrencies that utilize
Nakamoto's blockchain has shown that they do not easily scale to process a high throughput …

[PDF][PDF] Poseidon: Mitigating volumetric ddos attacks with programmable switches

M Zhang, G Li, S Wang, C Liu, A Chen, H Hu… - the 27th Network and …, 2020 - par.nsf.gov
Distributed Denial-of-Service (DDoS) attacks have become a critical threat to the Internet.
Due to the increasing number of vulnerable Internet of Things (IoT) devices, attackers can …

The bitcoin backbone protocol with chains of variable difficulty

J Garay, A Kiayias, N Leonardos - Annual International Cryptology …, 2017 - Springer
Bitcoin's innovative and distributedly maintained blockchain data structure hinges on the
adequate degree of difficulty of so-called “proofs of work,” which miners have to produce in …

[PDF][PDF] Blockchain: A comparative study of consensus algorithms PoW, PoS, PoA, PoV

S Fahim, SK Rahman, S Mahmood - Int. J. Math. Sci. Comput, 2023 - researchgate.net
Since the inception of Blockchain, the computer database has been evolving into innovative
technologies. Recent technologies emerge, the use of Blockchain is also flourishing. All the …

Decentralized consensus for edge-centric internet of things: A review, taxonomy, and research issues

K Yeow, A Gani, RW Ahmad, JJPC Rodrigues… - IEEE Access, 2017 - ieeexplore.ieee.org
With the exponential rise in the number of devices, the Internet of Things (IoT) is geared
toward edge-centric computing to offer high bandwidth, low latency, and improved …

Proofs of space

S Dziembowski, S Faust, V Kolmogorov… - Annual Cryptology …, 2015 - Springer
Proofs of work (PoW) have been suggested by Dwork and Naor (Crypto'92) as protection to
a shared resource. The basic idea is to ask the service requestor to dedicate some non …