Page 298 - 《软件学报》2021年第5期
P. 298
1522 Journal of Software 软件学报 Vol.32, No.5, May 2021
[41] Lee S, Kim S. Short selling attack: A self-destructive but profitable 51% attack on PoS blockchains. IACR Cryptology ePrint
Archive, 2020-019, 2020.
[42] Santis AD, Micali S, Persiano G. Non-interactive zero-knowledge proof systems. In: Proc. of the CRYPTO. 1987. 52−72.
[43] Schwennesen B. Elliptic curve cryptography and government backdoors. 2016. https://services.math.duke.edu/~bray/Courses/89s-
MOU/2016/Papers/BAS_Paper3_EllipticCurveCryptography.pdf
[44] Aggarwal D, Brennen GK, Lee T, Santha M, Tomamichel M. Quantum attacks on Bitcoin, and how to protect against them. Ledger,
2018,3:68−90.
[45] Awan MK, Cortesi A. Blockchain transaction analysis using dominant sets. In: Proc. of the Computer Information Systems and
Industrial Management (CISIM). 2017. 229−239.
[46] Androulaki E, Karame GO, Roeschlin M, Scherer T, Capkun S. Evaluating user privacy in Bitcoin. In: Proc. of the Financial
Cryptography and Data Security (FC). 2013. 34−51.
[47] Fuji R, Usuzaki S, Aburada K, Yamaba H, Katayama T, Park M, Shiratori N, Okazaki N. Investigation on sharing signatures of
suspected malware files using blockchain technology. In: Proc. of the Int’l MultiConf. of Engineers and Computer Scientists
(IMECS). 2019. 94−99.
[48] Zcash. Zcash official site. 2020. https://z.cash
[49] Wuille P. Segregated witness and its impact on scalability. 2020. http://diyhpl.us/wiki/transcripts/scalingbitcoin/hong-kong/
segregated-witness-and-its-impact-on-scalability/
[50] Géron A. Hands-on Machine Learning with Scikit-learn, Keras, and TensorFlow. 2nd ed., O’Reilly Media, Inc., 2019.
[51] Estehghari S, Desmedt Y. Exploiting the client vulnerabilities in Internet E-voting systems: Hacking Helios 2.0 as an example.
EVT/WOTE, 2010,10:1−9.
[52] Dai HN, Wang H, Xiao H, Li XR, Wang Q. On eavesdropping attacks in wireless networks. In: Proc. of the 2016 IEEE Int’l Conf.
on Computational Science and Engineering (CSE). IEEE, 2016. 138−141.
[53] Heilman E, Kendler A, Zohar A, Goldberg S. Eclipse attacks on Bitcoin’s peer-to-peer network. In: Proc. of the USENIX Security.
2015. 129−144.
[54] Apostolaki M, Zohar A, Vanbever L. Hijacking Bitcoin: Routing attacks on cryptocurrencies. In: Proc. of the IEEE S&P. 2017.
375−392.
[55] Sun YX, Edmundson A, Vanbever L, Li O. RAPTOR: Routing attacks on privacy in Tor. In: Proc. of the USENIX Security. 2015.
271−286.
[56] Elleithy KM, Blagovic D, Wang C, Sideleau P. Denial of service attack techniques: Analysis, implementation and comparison.
Journal of Systemics, Cybernetics, and Informatics, 2005,3(1):66−71.
[57] Saad M, Thai MT, Mohaisen A. POSTER: Deterring DDoS attacks on blockchain-based cryptocurrencies through mempool
optimization. In: Proc. of the ASIACCS. 2018. 809−811.
[58] Cointelegraph. Bitcoin exchange poloniex under severe DDoS attack again, users outraged. 2017. https://cointelegraph.com/news/
bitcoin-exchange-poloniex-under-severe-ddos-attack-again-users-outraged
[59] Mirkin M, Ji Y, Pang J, Klages-Mundt A, Eyal I, Juels A. BDoS: Blockchain denial-of-service attacks. arXiv Preprint arXiv:1912.
07497, 2019.
[60] Wikipedia. Lightning network. 2020. https://en.wikipedia.org/wiki/Lightning_Network
[61] Sun GZ, Wang JT, Gu Y. Security threat analysis of blockchain technology. Journal of Nanjing University of Posts and
Telecommunications (Natural Science Edition), 2019,39(5):48−62 (in Chinese with English abstract).
[62] Microsoft. Microsoft security development lifecycle (SDL). 2020. https://www.microsoft.com/en-us/securityengineering/sdl/
[63] Sutton M, Greene A, Amini P. Fuzzing: Brute Force Vulnerability Discovery. Addison-Wesley Professional, 2007.
[64] Dowd M, McDonald J, Schuh J. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities.
Addison-Wesley Professional, 2006.
[65] Klein T. A Bug Hunter’s Diary. No Starch Press, 2011.
[66] Roundy KA, Miller BP. Binary-code obfuscations in prevalent packer tools. ACM Computing Surveys, 2013,46(1):1−32.