ARTEMIS: Neutralizing BGP hijacking within a minute

P Sermpezis, V Kotronis, P Gigis… - … ACM transactions on …, 2018 - ieeexplore.ieee.org
Border gateway protocol (BGP) prefix hijacking is a critical threat to Internet organizations
and users. Despite the availability of several defense approaches (ranging from RPKI to …

A taxonomy of blockchain threats and vulnerabilities

A Alkhalifah, A Ng, ASM Kayes… - … for Cybersecurity and …, 2020 - taylorfrancis.com
Blockchain technology has become one of the most popular technologies for maintaining
digital transactions. From the foundation of Bitcoin to the now-predominant smart contract …

BGP security in partial deployment: Is the juice worth the squeeze?

R Lychev, S Goldberg, M Schapira - Proceedings of the ACM SIGCOMM …, 2013 - dl.acm.org
As the rollout of secure route origin authentication with the RPKI slowly gains traction among
network operators, there is a push to standardize secure path validation for BGP (ie, S* BGP …

A survey of BGP security issues and solutions

K Butler, TR Farley, P McDaniel… - Proceedings of the …, 2009 - ieeexplore.ieee.org
As the Internet's de facto interdomain routing protocol, the Border Gateway Protocol (BGP) is
the glue that holds the disparate parts of the Internet together. A major limitation of BGP is its …

Survey of security supervision on blockchain from the perspective of technology

Y Wang, G Gou, C Liu, M Cui, Z Li, G Xiong - Journal of Information Security …, 2021 - Elsevier
Due to decentralization, immutability, circulation, anonymity, blockchain technology has
become a hot topic but also a hotbed of various cyber-crimes. Many perpetrators attack …

Bgpy: The bgp python security simulator

J Furuness, C Morris, R Morillo, A Herzberg… - Proceedings of the 16th …, 2023 - dl.acm.org
The security of Border Gateway Protocol (BGP), and inter-domain routing in general,
remains a challenge, in spite of its well-known importance, repeated attacks and incidents …

[HTML][HTML] Security challenges and defense approaches for blockchain-based services from a full-stack architecture perspective

H Chen, X Luo, L Shi, Y Cao, Y Zhang - Blockchain: Research and …, 2023 - Elsevier
As an advantageous technique and service, the blockchain has shown great development
and application prospects. However, its security has also met great challenges, and many …

Blockchain–a promising solution to internet of things: A comprehensive analysis, opportunities, challenges and future research issues

AK Paul, X Qu, Z Wen - Peer-to-Peer Networking and Applications, 2021 - Springer
Blockchain (BC) technology is a promising answer for providing security and ensuring
protection in a distributed way. It has transformed the digital currency platform with the …

[HTML][HTML] 6G technology and taxonomy of attacks on blockchain technology

F Kausar, FM Senan, HM Asif, K Raahemifar - Alexandria Engineering …, 2022 - Elsevier
Blockchain technology is now being used in every aspect of human life. It appears like
everyone is racing to develop apps that run on top of the blockchain technology available …

B-DNS: A secure and efficient DNS based on the blockchain technology

Z Li, S Gao, Z Peng, S Guo, Y Yang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The Domain Name System (DNS) plays a crucial role in the Internet. However, it is
vulnerable to many attacks such as the cache poisoning attack and DDoS attack. Though …