Page 299 - 《软件学报》2021年第5期
P. 299

田国华  等:区块链系统攻击与防御技术研究进展                                                         1523


                [67]    Dominic  L. BlockQuick: Super-light  client protocol for blockchain validation on  constrained devices. IACR  Cryptology  ePrint
                     Archive, 2019-579, 2019.
                [68]    Sermpezis  P, Kotronis V, Gigis  P, Dimitropoulos  X, Cicalese D, King A, Dainotti A.  ARTEMIS:  Neutralizing BGP  hijacking
                     within a minute. IEEE/ACM Trans. on Networking, 2018,26(6):2471−2486.
                [69]    Amadi EC, Eheduru GE, Eze FU, Ikerionwu C, Okafor KC. Anti-DDoS firewall: A zero-sum mitigation game model for distributed
                     denial of service attack using linear programming. In: Proc. of the 2017 IEEE Int’l Conf. on Knowledge-based Engineering and
                     Innovation (KBEI). IEEE, 2017. 27−36.
                [70]    Lamport L,  Shostak R,  Pease  M. The Byzantine  generals  problem. ACM Trans.  on  Programming Languages and  Systems
                     (TOPLAS), 1982,4(3):382−401.
                [71]    Castro  M,  Liskov  B. Practical Byzantine  fault tolerance. In: Proc. of the  USENIX Symp. on  Operating Systems  Design  and
                     Implementation (OSDI). 1999. 173−186.
                [72]    Microsoft. Ethereum proof-of-authority on  azure. 2018. https://azure.microsoft.com/en-us/blog/ethereum-proof-of-authority-on-
                     azure
                [73]    Ekparinya P, Gramoli V, Jourjon G. The attack of the clones against proof-of-authority. In: Proc. of the NDSS. 2020. https://dx.doi.
                     org/10.14722/ndss.2020.24082
                [74]    Bitconch.  A newly distributed  Web  protocol based on  an innovative proof reputation (PoR)  consensus  algorithm.  2020. https://
                     bitconch.io/download/BRWhitePaperEn.pdf
                [75]    Grigg I. EOS—An introduction. 2020. https://eos.io/documents/EOS_An_Introduction.pdf
                [76]    Zaccagni Z, Dantu R. Proof of review (PoR): A new consensus protocol for deriving trustworthiness of reputation through reviews.
                     IACR Cryptology ePrint Archive, 2020-475, 2020.
                [77]    Leonard K. A PoR/PoS-hybrid blockchain: Proof of reputation with nakamoto fallback. IACR Cryptology ePrint Archive, 2020-381,
                     2020.
                [78]    Krebsonsecurity. Who and what is coinhive? 2018. https://krebsonsecurity.com/2018/03/who-and-what-is-coinhive/
                [79]    Redman  J.  Small Ethereum clones getting attacked  by mysterious  ‘51 Crew’.  2016.  https://news.bitcoin.com/ethereum-clones-
                     susceptible-51-attacks/
                [80]    Paganini P. Bitcoin gold hit by double-spend attack, exchanges lose over $18 million. 2018. https://securityaffairs.co/wordpress/
                     72878/hacking/bitcoin-gold-double-spend.html
                [81]    Grunspan C, Pérez-Marco R. On profitability of selfish mining. arXiv Preprint arXiv:1805.08281, 2018.
                [82]    Kwon J. Tendermint: Consensus without mining. 2014. https://pdfs.semanticscholar.org/df62/a45f50aac8890453b6991ea115e996c
                     1646e.pdf
                [83]    Szilágyi P. EIP 225: Clique proof-of-authority consensus protocol. 2020. https://eips.ethereum.org/EIPS/eip-225
                [84]    Buterin V, Griffith V. Casper the friendly finality Gadget. arXiv Preprint arXiv:1710.09437, 2017.
                [85]    Buterin  V. Slasher: A punitive proof-of-stake  algorithm. 2014. https://blog.ethereum.org/2014/01/15/slasher-a-punitive-proof-of-
                     stake-algorithm/
                [86]    Anley C, Heasman J, Lindner F, Richarte G. The Shellcoder’s Handbook: Discovering and Exploiting Security Holes. 2nd ed.,
                     Wiley Publishing, Inc., 2007.
                [87]    Bitcoinwiki. Value overflow incident. 2016. https://en.bitcoin.it/wiki/Value_overflow_incident
                [88]    Hessenauer S. Batch overflow bug on Ethereum ERC20 token contracts and SafeMath. 2018. https://blog.matryx.ai/batch-overflow-
                     bug-on-ethereum-erc20-token-contracts-and-safemath-f9ebcc137434
                [89]    Alharby M, Moorsel AV. Blockchain based smart contracts: A systematic mapping study. In: Proc. of the Int’l Conf. on Artificial
                     Intelligence and Soft Computing. 2017. 125−140.
                [90]    Atzei N, Bartoletti M, Cimoli T. A survey of attacks on ethereum smart contracts SoK. In: Proc. of the Int’l Conf. on Principles of
                     Security and Trust. 2017. 164−186.
                [91]    Kieran E. KoET (king of the ether throne). 2020. https://github.com/kieranelby/KingOfTheEtherThrone
                [92]    Rodler M, Li WT, Karame GO, Davi L. Sereum: Protecting existing smart contracts against re-entrancy attacks. In: Proc. of the
                     NDSS. 2019. https://dx.doi.org/10.14722/ndss.2019.23413
   294   295   296   297   298   299   300   301   302   303   304