A survey on ethereum systems security: Vulnerabilities, attacks, and defenses

H Chen, M Pendleton, L Njilla, S Xu - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Blockchain technology is believed by many to be a game changer in many application
domains. While the first generation of blockchain technology (ie, Blockchain 1.0) is almost …

A survey on security and privacy issues of bitcoin

M Conti, ES Kumar, C Lal, S Ruj - … communications surveys & …, 2018 - ieeexplore.ieee.org
Bitcoin is a popular cryptocurrency that records all transactions in a distributed append-only
public ledger called blockchain. The security of Bitcoin heavily relies on the incentive …

A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network

R Kumar, P Kumar, R Tripathi, GP Gupta, S Garg… - Journal of Parallel and …, 2022 - Elsevier
Abstract The Internet of Things (IoT) is emerging as a new technology for the development of
various critical applications. However, these applications are still working on centralized …

Bitcoin and beyond: A technical survey on decentralized digital currencies

F Tschorsch, B Scheuermann - IEEE Communications Surveys …, 2016 - ieeexplore.ieee.org
Besides attracting a billion dollar economy, Bitcoin revolutionized the field of digital
currencies and influenced many adjacent areas. This also induced significant scientific …

Blockchain technology, improvement suggestions, security challenges on smart grid and its application in healthcare for sustainable development

FA Khan, M Asif, A Ahmad, M Alharbi… - Sustainable Cities and …, 2020 - Elsevier
Blockchain technology has gained considerable attention for different types of stakeholders
due to its stable implementation in the field of digital currency like Bitcoin. Some users use …

Exploring the attack surface of blockchain: A systematic overview

M Saad, J Spaulding, L Njilla, C Kamhoua… - arXiv preprint arXiv …, 2019 - arxiv.org
In this paper, we systematically explore the attack surface of the Blockchain technology, with
an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the …

The miner's dilemma

I Eyal - 2015 IEEE symposium on security and privacy, 2015 - ieeexplore.ieee.org
An open distributed system can be secured by requiring participants to present proof of work
and rewarding them for participation. The Bit coin digital currency introduced this …

Blockchain and smart contracts for higher education registry in Brazil

LM Palma, MAG Vigil, FL Pereira… - International Journal of …, 2019 - Wiley Online Library
The validation of academic credits and issuance of academic degree certificates in the
Brazilian education system currently occurs in a semi or completely noncomputerized way …

Effective scheme against 51% attack on proof-of-work blockchain with history weighted information

X Yang, Y Chen, X Chen - 2019 IEEE International Conference …, 2019 - ieeexplore.ieee.org
Proof-of-Work (PoW) is a popular protocol used in Blockchain systems to resolve double-
spending problems. However, if an attacker has access to calculation hash power greater …

Can we stabilize the price of a cryptocurrency? Understanding the design of Bitcoin and its potential to compete with Central Bank money

Y Kitamura - Quest for Good Money: Past, Present and Future, 2022 - Springer
Abstract Bitcoin (Nakamoto, 2008) is an electronic cash system designed to work without
central management. Despite recent enthusiasm, Bitcoin (BTC) and other so-called …