Page 297 - 《软件学报》2021年第5期
P. 297

田国华  等:区块链系统攻击与防御技术研究进展                                                         1521


                [10]    Bitcoin Stack Exchange. What is a Finney attack? 2020. https://bitcoin.stackexchange.com/questions/4942/what-is-a-finney-attack
                [11]    Yuan C.  Defense scheme during hard  bifurcation in  block chain. Modern Computer,  2019(9):3−7,13 (in Chinese with English
                     abstract).
                [12]    Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. 2020. https://bitcoin.org/bitcoin.pdf
                [13]    Ma A, Pan X, Wu L, Guo JF, Huang QW. A survey of the basic technology and application of block chain. Journal of Information
                     Security Research, 2017,3(11):968−980 (in Chinese with English abstract).
                [14]    Liu YZ, Liu JW, Zhang ZY, Xu TG, Yu H. Overview on blockchain consensus mechanisms. Journal of Cryptologic Research, 2019,
                     6(4):395−432 (in Chinese with English abstract).
                [15]    Huang JF, Liu J. Survey on blockchain research. Journal of Beijing University of Posts and Telecommunications, 2018,41(2):1−8
                     (in Chinese with English abstract).
                [16]    He HW, Yan A, Chen ZH. A  survey  of  smart contract  technology and application  based on  blockchain.  Journal  of  Computer
                     Research and Development, 2018,55(11):2452−2466 (in Chinese with English abstract).
                [17]    Ethereum. Ethereum official site. 2020. https://ethereum.org
                [18]    Melanie S. Blockchain: Blueprint for a New Economy. O’Reilly Media, Inc., 2015.
                [19]    R3 CEV. R3 official site. 2020. https://www.r3.com
                [20]    China Ledger. China ledger official site. 2020. http://www.chinaledger.com
                [21]    Cisco. Cisco official site. 2020. https://www.cisco.com
                [22]    Hyperledger. Hyperledger official site. 2020. https://www.hyperledger.org
                [23]    Katz J, Lindell Y. Introduction to Modern Cryptography. 2nd ed., Chapman and Hall/CRC, 2014.
                [24]    Berndt S, Liśkiewicz M. Algorithm substitution attacks from a steganographic perspective. In: Proc. of the CCS. 2017. 1649−1660.
                [25]    Decker C, Wattenhofer R. Bitcoin transaction malleability and MtGox. In: Proc. of the ESORICS. 2014. 313−326.
                [26]    Douceur JR. The Sybil attack. In: Proc. of the IPTPS. 2002. 251−260.
                [27]    Bonneau J. Why buy when you can rent? Bribery attacks on Bitcoin-style consensus. In: Proc. of the Financial Cryptography and
                     Data Security (FC). 2016. 19−26.
                [28]    King S, Nadal S. PPCoin: Peer-to-peer crypto-currency with proof-of-stake. 2012. http://people.cs.georgetown.edu/~clay/classes/
                     fall2017/835/papers/peercoin-paper.pdf
                [29]    Houy N. It will cost you nothing to ‘kill’ a proof-of-stake crypto-currency. 2014. https://papers.ssrn.com/sol3/papers.cfm?abstract_
                     id=2393940
                [30]    CryptoWiki. Proof-of-work system. 2020. http://cryptowiki.net/index.php?title=Proof-of-work_system
                [31]    360 Core Security. Hacker forged computational power to steal multiple digital currencies (in Chinese). https://blogs.360.cn/post/
                [32]    Bag S, Ruj S, Sakurai K. Bitcoin block withholding attack: Analysis and mitigation. IEEE Trans. on Information Forensics and
                     Security, 2017,12(8):1967−1978.
                [33]    Narayanan A, Bonneau J, Felten EW, Miller A, Goldfeder S, Clark J. Bitcoin and Cryptocurrency Technologies: A Comprehensive
                     Introduction. Princeton University Press, 2016.
                [34]    Thomas K, Pullman J, Yeo K, Raghunathan A, Kelley PG, Invernizzi L, Benko B, Pietraszek T, Patel S, Boneh D, Bursztein E.
                     Protecting accounts from credential stuffing with password breach alerting. In: Proc. of the USENIX Security. 2019. 1556−1571.
                [35]    Bilge L, Dumitras T. Investigating zero-day attacks. 2013. https://www.usenix.org/system/files/login/articles/02_bilge_6-13_online.
                     pdf
                [36]    Anderson R. Secuirty Engineering: A Guide to Building Dependable Distributed Systems. 2nd ed., Wiley Publishing, Inc., 2008.
                [37]    Hadnagy C. Social Engineering: The Art of Human Hacking. John Wiley&Sons, 2010.
                [38]    Jin C, Wang XY, Tan HY. Dynamic attack tree and its applications on Trojan horse detection. In: Proc. of the Multimedia and
                     Information Technology (MMIT). 2010. 56−59.
                [39]    Grustniy L. Rakhni Trojan: To encrypt and to mine. 2018. https://www.kaspersky.com/blog/rakhni-miner-cryptor/22988/
                [40]    Barber S, Boyen X, Shi E, Uzun E. Bitter to better-how to make Bitcoin a better currency. In: Proc. of the Financial Cryptography
                     and Data Security (FC). 2012. 399−414.
   292   293   294   295   296   297   298   299   300   301   302