Reference : Revisiting Network-Level Attacks on Blockchain Network
Scientific congresses, symposiums and conference proceedings : Unpublished conference
Engineering, computing & technology : Computer science
Security, Reliability and Trust
http://hdl.handle.net/10993/38142
Revisiting Network-Level Attacks on Blockchain Network
English
Cao, Tong [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > >]
Yu, Jiangshan [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Decouchant, Jérémie mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Verissimo, Paulo [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
25-Jun-2018
Yes
No
International
DSN Workshop on Byzantine Consensus and Resilient Blockchains
25-06-2018
[en] blockchain ; network
[en] Many attacks presented on Bitcoin are facilitated
by its real world implementation, which is rather centralized.
In addition, communications between Bitcoin nodes are not
encrypted, which can be explored by an attacker to launch
attacks. In this paper, we give a brief overview of possible routing
attacks on Bitcoin. As future work, we will identify possible
central points in the Bitcoin network, evaluate potential attacks
on it, and propose solutions to mitigate the identified issues.
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Critical and Extreme Security and Dependability Research Group (CritiX)
FNR through PEARL grant FNR/P14/8149128.
Researchers ; Students ; General public
http://hdl.handle.net/10993/38142
FnR ; FNR8149128 > Paulo Esteves-Veríssimo > IISD > Strategic RTnD Program on Information Infrastructure Security and Dependability > 01/01/2015 > 31/12/2019 > 2014

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
bcrb18-cao.pdfAuthor preprint77.82 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.