Page 298 - 《软件学报》2021年第5期
P. 298

1522                                     Journal of Software  软件学报 Vol.32, No.5,  May 2021

                [41]    Lee S,  Kim  S. Short selling  attack:  A self-destructive  but profitable 51%  attack on PoS blockchains. IACR  Cryptology  ePrint
                     Archive, 2020-019, 2020.
                [42]    Santis AD, Micali S, Persiano G. Non-interactive zero-knowledge proof systems. In: Proc. of the CRYPTO. 1987. 52−72.
                [43]    Schwennesen B. Elliptic curve cryptography and government backdoors. 2016. https://services.math.duke.edu/~bray/Courses/89s-
                     MOU/2016/Papers/BAS_Paper3_EllipticCurveCryptography.pdf
                [44]    Aggarwal D, Brennen GK, Lee T, Santha M, Tomamichel M. Quantum attacks on Bitcoin, and how to protect against them. Ledger,
                     2018,3:68−90.
                [45]    Awan MK, Cortesi A. Blockchain transaction analysis using dominant sets. In: Proc. of the Computer Information Systems and
                     Industrial Management (CISIM). 2017. 229−239.
                [46]    Androulaki  E,  Karame  GO,  Roeschlin M, Scherer  T,  Capkun S.  Evaluating user privacy in Bitcoin. In: Proc. of the Financial
                     Cryptography and Data Security (FC). 2013. 34−51.
                [47]    Fuji R, Usuzaki S, Aburada K, Yamaba H, Katayama T, Park M, Shiratori N, Okazaki N. Investigation on sharing signatures of
                     suspected  malware files using blockchain technology.  In: Proc. of the Int’l  MultiConf. of  Engineers  and  Computer Scientists
                     (IMECS). 2019. 94−99.
                [48]    Zcash. Zcash official site. 2020. https://z.cash
                [49]    Wuille P. Segregated  witness  and its  impact on scalability. 2020.  http://diyhpl.us/wiki/transcripts/scalingbitcoin/hong-kong/
                     segregated-witness-and-its-impact-on-scalability/
                [50]    Géron A. Hands-on Machine Learning with Scikit-learn, Keras, and TensorFlow. 2nd ed., O’Reilly Media, Inc., 2019.
                [51]    Estehghari S, Desmedt Y. Exploiting the client vulnerabilities in Internet E-voting systems: Hacking Helios 2.0 as an example.
                     EVT/WOTE, 2010,10:1−9.
                [52]    Dai HN, Wang H, Xiao H, Li XR, Wang Q. On eavesdropping attacks in wireless networks. In: Proc. of the 2016 IEEE Int’l Conf.
                     on Computational Science and Engineering (CSE). IEEE, 2016. 138−141.
                [53]    Heilman E, Kendler A, Zohar A, Goldberg S. Eclipse attacks on Bitcoin’s peer-to-peer network. In: Proc. of the USENIX Security.
                     2015. 129−144.
                [54]    Apostolaki M, Zohar A, Vanbever L. Hijacking Bitcoin: Routing attacks on cryptocurrencies. In: Proc. of the IEEE S&P. 2017.
                     375−392.
                [55]    Sun YX, Edmundson A, Vanbever L, Li O. RAPTOR: Routing attacks on privacy in Tor. In: Proc. of the USENIX Security. 2015.
                     271−286.
                [56]    Elleithy KM, Blagovic D, Wang C,  Sideleau P. Denial of service attack techniques: Analysis, implementation and comparison.
                     Journal of Systemics, Cybernetics, and Informatics, 2005,3(1):66−71.
                [57]    Saad M, Thai MT,  Mohaisen A. POSTER:  Deterring DDoS attacks on  blockchain-based cryptocurrencies through mempool
                     optimization. In: Proc. of the ASIACCS. 2018. 809−811.
                [58]    Cointelegraph. Bitcoin exchange poloniex under severe DDoS attack again, users outraged. 2017. https://cointelegraph.com/news/
                     bitcoin-exchange-poloniex-under-severe-ddos-attack-again-users-outraged
                [59]    Mirkin M, Ji Y, Pang J, Klages-Mundt A, Eyal I, Juels A. BDoS: Blockchain denial-of-service attacks. arXiv Preprint arXiv:1912.
                     07497, 2019.
                [60]    Wikipedia. Lightning network. 2020. https://en.wikipedia.org/wiki/Lightning_Network
                [61]    Sun GZ, Wang  JT,  Gu Y.  Security  threat analysis of  blockchain technology.  Journal of Nanjing University  of  Posts and
                     Telecommunications (Natural Science Edition), 2019,39(5):48−62 (in Chinese with English abstract).
                [62]    Microsoft. Microsoft security development lifecycle (SDL). 2020. https://www.microsoft.com/en-us/securityengineering/sdl/
                [63]    Sutton M, Greene A, Amini P. Fuzzing: Brute Force Vulnerability Discovery. Addison-Wesley Professional, 2007.
                [64]    Dowd M, McDonald J, Schuh J. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities.
                     Addison-Wesley Professional, 2006.
                [65]    Klein T. A Bug Hunter’s Diary. No Starch Press, 2011.
                [66]    Roundy KA, Miller BP. Binary-code obfuscations in prevalent packer tools. ACM Computing Surveys, 2013,46(1):1−32.
   293   294   295   296   297   298   299   300   301   302   303