CAO, Tong ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Yu, Jiangshan; Monash University
DECOUCHANT, Jérémie ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Luo, Xiapu; The Hong Kong Polytechnic University
VERISSIMO, Paulo ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
External co-authors :
yes
Language :
English
Title :
Exploring the Monero Peer-to-Peer Network
Publication date :
February 2020
Event name :
Financial Cryptography and Data Security 2020
Event date :
from 10-02-2020 to 14-02-2020
Main work title :
Financial Cryptography and Data Security 2020, Sabah, 10-14 February 2020
Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin’s peer-to-peer network. In: USENIX Security Symposium (2015)
Marcus, Y., Heilman, E., Goldberg, S.: Low-resource eclipse attacks on Ethereum’s peer-to-peer network. IACR Cryptology ePrint Archive 2018/236 (2018)
Apostolaki, M., Zohar, A., Vanbever, L.: Hijacking bitcoin: routing attacks on cryptocurrencies. In: IEEE Security and Privacy (SP) (2017)
Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: SoK: research perspectives and challenges for bitcoin and cryptocurrencies. In: 2015 IEEE Symposium on Security and Privacy (SP), May 2015
Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in bitcoin P2P network. In: ACM CCS (2014)
Biryukov, A., Tikhomirov, S.: Deanonymization and linkability of cryptocurrency transactions based on network analysis. In: EuroS&P (2019)
Natoli, C., Yu, J., Gramoli, V., Veríssimo, P.J.E.: Deconstructing blockchains: a comprehensive survey on consensus, membership and structure. CoRR (2019)
Möser, M., et al.: An empirical analysis of traceability in the monero blockchain. PoPETs 2018(3), 143–163 (2018)
Kumar, A., Fischer, C., Tople, S., Saxena, P.: A traceability analysis of Monero’s blockchain. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 153–173. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66399-9 9
Yu, Z., Au, M.H., Yu, J., Yang, R., Xu, Q., Lau, W.F.: New empirical traceability analysis of cryptonote-style blockchains. In: Goldberg, I., Moore, T. (eds.) FC 2019. LNCS, vol. 11598, pp. 133–149. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-32101-7 9
Yu, J., Au, M.H.A., Veríssimo, P.: Re-thinking untraceability in the cryptonote-style blockchain. In: IEEE Computer Security Foundations Symposium (CSF) (2019)
Wijaya, D.A., Liu, J., Steinfeld, R., Liu, D., Yu, J.: On the unforkability of Monero. In: ACM Asia Conference on Information, Computer and Communications Security (ASIACCS) (2019)
Nayak, K., Kumar, S., Miller, A., Shi, E.: Stubborn mining: generalizing selfish mining and combining with an eclipse attack (2016)
Natoli, C., Gramoli, V.: The balance attack or why forkable blockchains are ill-suited for consortium. In: DSN (2017)
Ekparinya, P., Gramoli, V., Jourjon, G.: Impact of man-in-the-middle attacks on Ethereum. In: SRDS (2018)
Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: IEEE P2P (2013)
Koshy, D.: An Analysis of Anonymity in Bitcoin Using P2P Network Traffic. Pennsylvania State University (2013)
Neudecker, T., Andelfinger, P., Hartenstein, H.: Timing analysis for inferring the topology of the bitcoin peer-to-peer network. In: IEEE UIC (2016)
MoneroHash: Monerohash-monero mining pool (2018). https://monerohash.com/nodes-distribution.html. Accessed 23 Dec 2018–30 Dec 2018
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)
Bitnodes: Bitnodes (2018). https://bitnodes.earn.com/nodes/. Accessed 23 Dec 2018–30 Dec 2018
Ethernodes: Ethernodes (2018). https://www.ethernodes.org/network/1. Accessed 23 Dec 2018–30 Dec 2018
Neudecker, T.: Characterization of the bitcoin peer-to-peer network (2015–2018) (2019). http://dsn.tm.kit.edu/bitcoin/publications/bitcoin network characterizat ion.pdf
Kim, S.K., Ma, Z., Murali, S., Mason, J., Miller, A., Bailey, M.: Measuring ethereum network peers. In: ACM IMC (2018)
Singh, A., Castro, M., Druschel, P., Rowstron, A.: Defending against eclipse attacks on overlay networks. In: Proceedings of the 11th Workshop on ACM SIGOPS European Workshop. EW 11 (2004)
Croman, K., et al.: On scaling decentralized blockchains-(A position paper). In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 106–125. Springer, Heidelberg (2016). https://doi. org/10.1007/978-3-662-53357-4 8
Miller, A., et al.: Discovering bitcoin’s public topology and influential nodes (2015)
Grundmann, M., Neudecker, T., Hartenstein, H.: Exploiting transaction accumulation and double spends for topology inference in bitcoin. In: Zohar, A., et al. (eds.) FC 2018. LNCS, vol. 10958, pp. 113–126. Springer, Heidelberg (2019). https://doi. org/10.1007/978-3-662-58820-8 9
Delgado-Segura, S., et al.: TxProbe: discovering bitcoin’s network topology using orphan transactions. CoRR (2018)
Fanti, G., Viswanath, P.: Deanonymization in the bitcoin P2P network. In: NIPS (2017)