Page 297 - 《软件学报》2021年第5期
P. 297
田国华 等:区块链系统攻击与防御技术研究进展 1521
[10] Bitcoin Stack Exchange. What is a Finney attack? 2020. https://bitcoin.stackexchange.com/questions/4942/what-is-a-finney-attack
[11] Yuan C. Defense scheme during hard bifurcation in block chain. Modern Computer, 2019(9):3−7,13 (in Chinese with English
abstract).
[12] Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. 2020. https://bitcoin.org/bitcoin.pdf
[13] Ma A, Pan X, Wu L, Guo JF, Huang QW. A survey of the basic technology and application of block chain. Journal of Information
Security Research, 2017,3(11):968−980 (in Chinese with English abstract).
[14] Liu YZ, Liu JW, Zhang ZY, Xu TG, Yu H. Overview on blockchain consensus mechanisms. Journal of Cryptologic Research, 2019,
6(4):395−432 (in Chinese with English abstract).
[15] Huang JF, Liu J. Survey on blockchain research. Journal of Beijing University of Posts and Telecommunications, 2018,41(2):1−8
(in Chinese with English abstract).
[16] He HW, Yan A, Chen ZH. A survey of smart contract technology and application based on blockchain. Journal of Computer
Research and Development, 2018,55(11):2452−2466 (in Chinese with English abstract).
[17] Ethereum. Ethereum official site. 2020. https://ethereum.org
[18] Melanie S. Blockchain: Blueprint for a New Economy. O’Reilly Media, Inc., 2015.
[19] R3 CEV. R3 official site. 2020. https://www.r3.com
[20] China Ledger. China ledger official site. 2020. http://www.chinaledger.com
[21] Cisco. Cisco official site. 2020. https://www.cisco.com
[22] Hyperledger. Hyperledger official site. 2020. https://www.hyperledger.org
[23] Katz J, Lindell Y. Introduction to Modern Cryptography. 2nd ed., Chapman and Hall/CRC, 2014.
[24] Berndt S, Liśkiewicz M. Algorithm substitution attacks from a steganographic perspective. In: Proc. of the CCS. 2017. 1649−1660.
[25] Decker C, Wattenhofer R. Bitcoin transaction malleability and MtGox. In: Proc. of the ESORICS. 2014. 313−326.
[26] Douceur JR. The Sybil attack. In: Proc. of the IPTPS. 2002. 251−260.
[27] Bonneau J. Why buy when you can rent? Bribery attacks on Bitcoin-style consensus. In: Proc. of the Financial Cryptography and
Data Security (FC). 2016. 19−26.
[28] King S, Nadal S. PPCoin: Peer-to-peer crypto-currency with proof-of-stake. 2012. http://people.cs.georgetown.edu/~clay/classes/
fall2017/835/papers/peercoin-paper.pdf
[29] Houy N. It will cost you nothing to ‘kill’ a proof-of-stake crypto-currency. 2014. https://papers.ssrn.com/sol3/papers.cfm?abstract_
id=2393940
[30] CryptoWiki. Proof-of-work system. 2020. http://cryptowiki.net/index.php?title=Proof-of-work_system
[31] 360 Core Security. Hacker forged computational power to steal multiple digital currencies (in Chinese). https://blogs.360.cn/post/
[32] Bag S, Ruj S, Sakurai K. Bitcoin block withholding attack: Analysis and mitigation. IEEE Trans. on Information Forensics and
Security, 2017,12(8):1967−1978.
[33] Narayanan A, Bonneau J, Felten EW, Miller A, Goldfeder S, Clark J. Bitcoin and Cryptocurrency Technologies: A Comprehensive
Introduction. Princeton University Press, 2016.
[34] Thomas K, Pullman J, Yeo K, Raghunathan A, Kelley PG, Invernizzi L, Benko B, Pietraszek T, Patel S, Boneh D, Bursztein E.
Protecting accounts from credential stuffing with password breach alerting. In: Proc. of the USENIX Security. 2019. 1556−1571.
[35] Bilge L, Dumitras T. Investigating zero-day attacks. 2013. https://www.usenix.org/system/files/login/articles/02_bilge_6-13_online.
pdf
[36] Anderson R. Secuirty Engineering: A Guide to Building Dependable Distributed Systems. 2nd ed., Wiley Publishing, Inc., 2008.
[37] Hadnagy C. Social Engineering: The Art of Human Hacking. John Wiley&Sons, 2010.
[38] Jin C, Wang XY, Tan HY. Dynamic attack tree and its applications on Trojan horse detection. In: Proc. of the Multimedia and
Information Technology (MMIT). 2010. 56−59.
[39] Grustniy L. Rakhni Trojan: To encrypt and to mine. 2018. https://www.kaspersky.com/blog/rakhni-miner-cryptor/22988/
[40] Barber S, Boyen X, Shi E, Uzun E. Bitter to better-how to make Bitcoin a better currency. In: Proc. of the Financial Cryptography
and Data Security (FC). 2012. 399−414.