Blockchain system defensive overview for double-spend and selfish mining attacks: A systematic approach
Blockchain is a technology that ensures data security by verifying database of records
established in a decentralized and distributed network. Blockchain-based approaches have …
established in a decentralized and distributed network. Blockchain-based approaches have …
Bdos: Blockchain denial-of-service
Proof-of-work (PoW) cryptocurrency blockchains like Bitcoin secure vast amounts of money.
Their operators, called miners, expend resources to generate blocks and receive monetary …
Their operators, called miners, expend resources to generate blocks and receive monetary …
Cyclic arbitrage in decentralized exchanges
Decentralized Exchanges (DEXes) enable users to create markets for exchanging any pair
of cryptocurrencies. The direct exchange rate of two tokens may not match the cross …
of cryptocurrencies. The direct exchange rate of two tokens may not match the cross …
Performance evaluation, optimization and dynamic decision in blockchain systems: a recent overview
QL Li, YX Chang, Q Wang - arXiv preprint arXiv:2211.15907, 2022 - arxiv.org
With rapid development of blockchain technology as well as integration of various
application areas, performance evaluation, performance optimization, and dynamic decision …
application areas, performance evaluation, performance optimization, and dynamic decision …
On the profitability of selfish mining against multiple difficulty adjustment algorithms
M Davidson, T Diamond - Cryptology ePrint Archive, 2020 - eprint.iacr.org
The selfish mining attack allows cryptocurrency miners to mine more than their" fair share" of
blocks, stealing revenue from other miners while reducing the overall security of payments …
blocks, stealing revenue from other miners while reducing the overall security of payments …
Tree representation, growth rate of blockchain and reward allocation in Ethereum with multiple mining pools
It is interesting but difficult and challenging to study Ethereum with multiple mining pools.
One of the main difficulties comes from not only how to represent such a general tree with …
One of the main difficulties comes from not only how to represent such a general tree with …
A new theoretical framework of pyramid markov processes for blockchain selfish mining
In this paper, we provide a new theoretical framework of pyramid Markov processes to solve
some open and fundamental problems of blockchain selfish mining under a rigorous …
some open and fundamental problems of blockchain selfish mining under a rigorous …
Fairness and efficiency in dag-based cryptocurrencies
Bitcoin is a decentralised digital currency that serves as an alternative to existing transaction
systems based on an external central authority for security. Although Bitcoin has many …
systems based on an external central authority for security. Although Bitcoin has many …
Optimally deceiving a learning leader in stackelberg games
Recent results in the ML community have revealed that learning algorithms used to compute
the optimal strategy for the leader to commit to in a Stackelberg game, are susceptible to …
the optimal strategy for the leader to commit to in a Stackelberg game, are susceptible to …
Blockchain mining with multiple selfish miners
This paper studies a fundamental problem regarding the security of blockchain PoW
consensus on how the existence of multiple misbehaving miners influences the profitability …
consensus on how the existence of multiple misbehaving miners influences the profitability …