-
Notifications
You must be signed in to change notification settings - Fork 0
/
references.bib
346 lines (293 loc) · 11.3 KB
/
references.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
@inproceedings{baumann2014exploring,
title={Exploring the Bitcoin Network.},
author={Baumann, Annika and Fabian, Benjamin and Lischke, Matthias},
booktitle={WEBIST (1)},
pages={369--374},
year={2014}
}
@INPROCEEDINGS{BlockPropOld,
author={C. {Decker} and R. {Wattenhofer}},
booktitle={IEEE P2P 2013 Proceedings},
title={Information propagation in the Bitcoin network},
year={2013},
volume={},
number={},
pages={1-10},
doi={10.1109/P2P.2013.6688704}}
@book{poisson,
title={Lectures on the Poisson process},
author={Last, G{\"u}nter and Penrose, Mathew},
volume={7},
year={2017},
publisher={Cambridge University Press}
}
@misc{BitcoinNetworkMonitor,
title = {{Bitcoin} Network Monitor},
howpublished = {\url{https://dsn.tm.kit.edu/bitcoin/}},
note = {Accessed: 2020-11-17}
}
@incollection{bcent,
title = "Chapter 7 - Graph Creation and Analysis for Linking Actors: Application to Social Data",
editor = "Robert Layton and Paul A. Watters",
booktitle = "Automating Open Source Intelligence",
publisher = "Syngress",
address = "Boston",
pages = "103 - 129",
year = "2016",
isbn = "978-0-12-802916-9",
doi = "https://doi.org/10.1016/B978-0-12-802916-9.00007-5",
url = "http://www.sciencedirect.com/science/article/pii/B9780128029169000075",
author = "Charles Perez and Rony Germon",
keywords = "graphs, networks, social media",
abstract = "Social network analysis is at the intersection of multiple fields. Historically, it is tightly related to sociology, psychology, mathematics, anthropology, and network science. It also forms the basis for using open source intelligence (OSINT) to uncover key individuals who operate criminal networks. In this chapter, basic techniques in graph theory and analysis are presented for OSINT, and a Twitter case study is outlined."
}
@article{simpy,
title={Introduction to discrete-event simulation and the simpy language},
author={Matloff, Norm},
journal={Davis, CA. Dept of Computer Science. University of California at Davis. Retrieved on August},
volume={2},
number={2009},
pages={1--33},
year={2008}
}
@misc{wang2019measurement,
title={Measurement and Analysis of the Bitcoin Networks: A View from Mining Pools},
author={Canhui Wang and Xiaowen Chu and Qin Yang},
year={2019},
eprint={1902.07549},
archivePrefix={arXiv},
primaryClass={cs.CR}
}
@article{eyal,
author = {Ittay Eyal and
Emin G{\"{u}}n Sirer},
title = {Majority is not Enough: Bitcoin Mining is Vulnerable},
journal = {CoRR},
volume = {abs/1311.0243},
year = {2013},
url = {http://arxiv.org/abs/1311.0243},
archivePrefix = {arXiv},
eprint = {1311.0243},
timestamp = {Mon, 13 Aug 2018 16:46:18 +0200},
biburl = {https://dblp.org/rec/bib/journals/corr/EyalS13},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{publish_n,
author = {Liu, Hanqing and Ruan, Na and Du, Rongtian and Jia, Weijia},
title = {On the Strategy and Behavior of Bitcoin Mining with N-attackers},
booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security},
series = {ASIACCS '18},
year = {2018},
isbn = {978-1-4503-5576-6},
location = {Incheon, Republic of Korea},
pages = {357--368},
numpages = {12},
url = {http://doi.acm.org/10.1145/3196494.3196512},
doi = {10.1145/3196494.3196512},
acmid = {3196512},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {bitcoin, mining, n-attackers, selfish mining},
}
@book{ibe2013markov,
title={Markov processes for stochastic modeling},
author={Ibe, Oliver},
year={2013},
publisher={Newnes}
}
@inproceedings{sybil,
title={The sybil attack},
author={Douceur, John R},
booktitle={International workshop on peer-to-peer systems},
pages={251--260},
year={2002},
organization={Springer}
}
@misc{networkmonitor,
title = {{DSN} Bitcoin Monitoring},
howpublished = {\url{https://dsn.tm.kit.edu/bitcoin/#propagation}},
note = {Accessed: 2020-03-31},
year = {2020},
author = {KIT}
}
@article{measurement,
author = {Adem Efe Gencer and
Soumya Basu and
Ittay Eyal and
Robbert van Renesse and
Emin G{\"{u}}n Sirer},
title = {Decentralization in Bitcoin and Ethereum Networks},
journal = {CoRR},
volume = {abs/1801.03998},
year = {2018},
url = {http://arxiv.org/abs/1801.03998},
archivePrefix = {arXiv},
eprint = {1801.03998},
timestamp = {Mon, 13 Aug 2018 16:48:27 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1801-03998.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@misc{gopalan,
title={Stability and Scalability of Blockchain Systems},
author={Aditya Gopalan and Abishek Sankararaman and Anwar Walid and Sriram Vishwanath},
year={2020},
eprint={2002.02567},
archivePrefix={arXiv},
primaryClass={cs.DC}
}
@misc{xiao_modeling,
title={Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain},
author={Yang Xiao and Ning Zhang and Wenjing Lou and Y. Thomas Hou},
year={2020},
eprint={2002.08912},
archivePrefix={arXiv},
primaryClass={cs.CR}
}
@misc{deepDiveSM,
author = {Qianlan Bai and Xinyan Zhou and Xing Wang and Yuedong Xu and Xin Wang and Qingsheng Kong},
title = {A Deep Dive into Blockchain Selfish Mining},
howpublished = {Cryptology ePrint Archive, Report 2018/1084},
year = {2018},
note = {\url{https://eprint.iacr.org/2018/1084}},
}
@article{sm_eth,
author = {Jianyu Niu and
Chen Feng},
title = {Selfish Mining in Ethereum},
journal = {CoRR},
volume = {abs/1901.04620},
year = {2019},
url = {http://arxiv.org/abs/1901.04620},
archivePrefix = {arXiv},
eprint = {1901.04620},
timestamp = {Fri, 29 Mar 2019 13:15:07 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-1901-04620.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{uncle_rewards,
author = {Fabian Ritz and
Alf Zugenmaier},
title = {The Impact of Uncle Rewards on Selfish Mining in Ethereum},
journal = {CoRR},
volume = {abs/1805.08832},
year = {2018},
url = {http://arxiv.org/abs/1805.08832},
archivePrefix = {arXiv},
eprint = {1805.08832},
timestamp = {Mon, 13 Aug 2018 16:47:14 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1805-08832.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{FAW,
title={Be Selfish and Avoid Dilemmas},
ISBN={9781450349468},
url={http://dx.doi.org/10.1145/3133956.3134019},
DOI={10.1145/3133956.3134019},
journal={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS ’17},
publisher={ACM Press},
author={Kwon, Yujin and Kim, Dohyun and Son, Yunmok and Vasserman, Eugene and Kim, Yongdae},
year={2017}
}
@article{multi_sm,
author = {Tin Leelavimolsilp and
Long Tran{-}Thanh and
Sebastian Stein},
title = {On the Preliminary Investigation of Selfish Mining Strategy with Multiple
Selfish Miners},
journal = {CoRR},
volume = {abs/1802.02218},
year = {2018},
url = {http://arxiv.org/abs/1802.02218},
archivePrefix = {arXiv},
eprint = {1802.02218},
timestamp = {Mon, 13 Aug 2018 16:48:42 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1802-02218.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@INPROCEEDINGS{stubborn_mining,
author={K. {Nayak} and S. {Kumar} and A. {Miller} and E. {Shi}},
booktitle={2016 IEEE European Symposium on Security and Privacy (EuroS P)},
title={Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack},
year={2016},
volume={},
number={},
pages={305-320},
keywords={cryptography;data mining;stubborn mining;network-level eclipse attacks;selfish mining attack;decentralized cryptocurrencies;Lead;Online banking;Peer-to-peer computing;Protocols;Cryptography;Computational modeling;Bitcoin;Selfish Mining},
doi={10.1109/EuroSP.2016.32},
ISSN={},
month={March},}
@article{optimal_sm,
author = {Ayelet Sapirshtein and
Yonatan Sompolinsky and
Aviv Zohar},
title = {Optimal Selfish Mining Strategies in Bitcoin},
journal = {CoRR},
volume = {abs/1507.06183},
year = {2015},
url = {http://arxiv.org/abs/1507.06183},
archivePrefix = {arXiv},
eprint = {1507.06183},
timestamp = {Mon, 13 Aug 2018 16:46:10 +0200},
biburl = {https://dblp.org/rec/bib/journals/corr/SapirshteinSZ15},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@InProceedings{1,
author="Barber, Simon
and Boyen, Xavier
and Shi, Elaine
and Uzun, Ersin",
editor="Keromytis, Angelos D.",
title="Bitter to Better --- How to Make Bitcoin a Better Currency",
booktitle="Financial Cryptography and Data Security",
year="2012",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="399--414",
abstract="Bitcoin is a distributed digital currency which has attracted a substantial number of users. We perform an in-depth investigation to understand what made Bitcoin so successful, while decades of research on cryptographic e-cash has not lead to a large-scale deployment. We ask also how Bitcoin could become a good candidate for a long-lived stable currency. In doing so, we identify several issues and attacks of Bitcoin, and propose suitable techniques to address them.",
isbn="978-3-642-32946-3"
}
@inproceedings{kiffer2018better,
title={A better method to analyze blockchain consistency},
author={Kiffer, Lucianna and Rajaraman, Rajmohan and Shelat, Abhi},
booktitle={Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security},
pages={729--744},
year={2018}
}
@inproceedings{pass2017analysis,
title={Analysis of the blockchain protocol in asynchronous networks},
author={Pass, Rafael and Seeman, Lior and Shelat, Abhi},
booktitle={Annual International Conference on the Theory and Applications of Cryptographic Techniques},
pages={643--673},
year={2017},
organization={Springer}
}
@inproceedings{gervais2016security,
title={On the security and performance of proof of work blockchains},
author={Gervais, Arthur and Karame, Ghassan O and W{\"u}st, Karl and Glykantzis, Vasileios and Ritzdorf, Hubert and Capkun, Srdjan},
booktitle={Proceedings of the 2016 ACM SIGSAC conference on computer and communications security},
pages={3--16},
year={2016}
}
@inproceedings{garay2015bitcoin,
title={The bitcoin backbone protocol: Analysis and applications},
author={Garay, Juan and Kiayias, Aggelos and Leonardos, Nikos},
booktitle={Annual International Conference on the Theory and Applications of Cryptographic Techniques},
pages={281--310},
year={2015},
organization={Springer}
}
@article{tschorsch,
author = {Tschorsch, Florian and Scheuermann, Bjorn},
year = {2016},
month = {03},
pages = {1-1},
title = {Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies},
volume = {18},
journal = {IEEE Communications Surveys and Tutorials},
doi = {10.1109/COMST.2016.2535718}
}
@inproceedings{Xiao2019,
title={Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain},
author={Yang Xiao and Ning Zhang and Wenjing Lou and Yiwei Thomas Hou},
year={2019}
}