Page 299 - 《软件学报》2021年第5期
P. 299
田国华 等:区块链系统攻击与防御技术研究进展 1523
[67] Dominic L. BlockQuick: Super-light client protocol for blockchain validation on constrained devices. IACR Cryptology ePrint
Archive, 2019-579, 2019.
[68] Sermpezis P, Kotronis V, Gigis P, Dimitropoulos X, Cicalese D, King A, Dainotti A. ARTEMIS: Neutralizing BGP hijacking
within a minute. IEEE/ACM Trans. on Networking, 2018,26(6):2471−2486.
[69] Amadi EC, Eheduru GE, Eze FU, Ikerionwu C, Okafor KC. Anti-DDoS firewall: A zero-sum mitigation game model for distributed
denial of service attack using linear programming. In: Proc. of the 2017 IEEE Int’l Conf. on Knowledge-based Engineering and
Innovation (KBEI). IEEE, 2017. 27−36.
[70] Lamport L, Shostak R, Pease M. The Byzantine generals problem. ACM Trans. on Programming Languages and Systems
(TOPLAS), 1982,4(3):382−401.
[71] Castro M, Liskov B. Practical Byzantine fault tolerance. In: Proc. of the USENIX Symp. on Operating Systems Design and
Implementation (OSDI). 1999. 173−186.
[72] Microsoft. Ethereum proof-of-authority on azure. 2018. https://azure.microsoft.com/en-us/blog/ethereum-proof-of-authority-on-
azure
[73] Ekparinya P, Gramoli V, Jourjon G. The attack of the clones against proof-of-authority. In: Proc. of the NDSS. 2020. https://dx.doi.
org/10.14722/ndss.2020.24082
[74] Bitconch. A newly distributed Web protocol based on an innovative proof reputation (PoR) consensus algorithm. 2020. https://
bitconch.io/download/BRWhitePaperEn.pdf
[75] Grigg I. EOS—An introduction. 2020. https://eos.io/documents/EOS_An_Introduction.pdf
[76] Zaccagni Z, Dantu R. Proof of review (PoR): A new consensus protocol for deriving trustworthiness of reputation through reviews.
IACR Cryptology ePrint Archive, 2020-475, 2020.
[77] Leonard K. A PoR/PoS-hybrid blockchain: Proof of reputation with nakamoto fallback. IACR Cryptology ePrint Archive, 2020-381,
2020.
[78] Krebsonsecurity. Who and what is coinhive? 2018. https://krebsonsecurity.com/2018/03/who-and-what-is-coinhive/
[79] Redman J. Small Ethereum clones getting attacked by mysterious ‘51 Crew’. 2016. https://news.bitcoin.com/ethereum-clones-
susceptible-51-attacks/
[80] Paganini P. Bitcoin gold hit by double-spend attack, exchanges lose over $18 million. 2018. https://securityaffairs.co/wordpress/
72878/hacking/bitcoin-gold-double-spend.html
[81] Grunspan C, Pérez-Marco R. On profitability of selfish mining. arXiv Preprint arXiv:1805.08281, 2018.
[82] Kwon J. Tendermint: Consensus without mining. 2014. https://pdfs.semanticscholar.org/df62/a45f50aac8890453b6991ea115e996c
1646e.pdf
[83] Szilágyi P. EIP 225: Clique proof-of-authority consensus protocol. 2020. https://eips.ethereum.org/EIPS/eip-225
[84] Buterin V, Griffith V. Casper the friendly finality Gadget. arXiv Preprint arXiv:1710.09437, 2017.
[85] Buterin V. Slasher: A punitive proof-of-stake algorithm. 2014. https://blog.ethereum.org/2014/01/15/slasher-a-punitive-proof-of-
stake-algorithm/
[86] Anley C, Heasman J, Lindner F, Richarte G. The Shellcoder’s Handbook: Discovering and Exploiting Security Holes. 2nd ed.,
Wiley Publishing, Inc., 2007.
[87] Bitcoinwiki. Value overflow incident. 2016. https://en.bitcoin.it/wiki/Value_overflow_incident
[88] Hessenauer S. Batch overflow bug on Ethereum ERC20 token contracts and SafeMath. 2018. https://blog.matryx.ai/batch-overflow-
bug-on-ethereum-erc20-token-contracts-and-safemath-f9ebcc137434
[89] Alharby M, Moorsel AV. Blockchain based smart contracts: A systematic mapping study. In: Proc. of the Int’l Conf. on Artificial
Intelligence and Soft Computing. 2017. 125−140.
[90] Atzei N, Bartoletti M, Cimoli T. A survey of attacks on ethereum smart contracts SoK. In: Proc. of the Int’l Conf. on Principles of
Security and Trust. 2017. 164−186.
[91] Kieran E. KoET (king of the ether throne). 2020. https://github.com/kieranelby/KingOfTheEtherThrone
[92] Rodler M, Li WT, Karame GO, Davi L. Sereum: Protecting existing smart contracts against re-entrancy attacks. In: Proc. of the
NDSS. 2019. https://dx.doi.org/10.14722/ndss.2019.23413