Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
In recent work [1], we proposed a more threatening mining attack method, Selfish Mining-based Denial-of-Service Attack (SDoS), in which the adversary can easily make honest miners voluntarily choose to stop mining through a special mining strategy, resulting in the increasing revenue of the adversary.
Nov 23, 2023
Oct 20, 2023 · In our last study, we proposed a Selfish Mining-based Denial-of-Service Attack (SDoS), which can cause serious threats to the Bitcoin system.
Oct 20, 2023 · In our last study, we proposed a Selfish Mining-based Denial-of-Service Attack (SDoS), which can cause serious threats to the Bitcoin system.
In this paper, we focus on mining attacks targeting the Proof of Work (PoW) consensus mechanism in blockchain-based systems. Specifically, we model mining ...
People also ask
Our techniques can be adapted to protocol modifications to assess their susceptibility to selfish mining, by computing the optimal attack under different ...
This type of attack includes the selfish mining attack [4], and block withholding (BWH) attack [5], and the block denial of service (BDoS) attack [6].
The DPC attack differs from these works in the sense that its main goal is not to increase the adversary's mining share but to double spend with higher ...
May 17, 2023 · Abstract: The identification of selfish mining (SM) activity is critical in blockchain mining. In exchange for successfully mining blocks ...
Apr 29, 2023 · This paper proposed a technique to successfully avoid BDoS and selfish mining attacks. The existing infrastructure of blockchain technology ...
We study selfish mining attacks in longest-chain blockchains like. Bitcoin, but where the proof of work is replaced with efficient proof systems – like proofs ...
Missing: Denial- | Show results with:Denial-