A survey on ransomware: Evolution, taxonomy, and defense solutions

H Oz, A Aris, A Levi, AS Uluagac - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
In recent years, ransomware has been one of the most notorious malware targeting end-
users, governments, and business organizations. It has become a very profitable business …

SoK: cryptojacking malware

E Tekiner, A Acar, AS Uluagac, E Kirda… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Emerging blockchain and cryptocurrency-based technologies are redefining the way we
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …

Blockchain meets covert communication: A survey

Z Chen, L Zhu, P Jiang, C Zhang, F Gao… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Covert communication enables covert information transmission in an undetectable way to
prevent the exposure of communication behaviors. Blockchain-based covert communication …

Survey on botnet detection techniques: Classification, methods, and evaluation

Y Xing, H Shu, H Zhao, D Li… - Mathematical Problems in …, 2021 - Wiley Online Library
With the continuous evolution of the Internet, as well as the development of the Internet of
Things, smart terminals, cloud platforms, and social platforms, botnets showing the …

Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions

T Zhang, B Li, Y Zhu, T Han, Q Wu - Computer Communications, 2023 - Elsevier
Traditional network covert channels have become insecure due to the continuous
improvement of traffic analysis techniques. As an emerging technology combined with …

Efficient construction of verifiable timed signatures and its application in scalable payments

X Zhou, D He, J Ning, M Luo… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Despite the myriad benefits offered by blockchain technology, most of them still face several
interrelated issues, such as limited transaction throughput, exorbitant transaction fees, and …

Graph-Based Covert Transaction Detection and Protection in Blockchain

Z Guo, X Li, J Liu, Z Zhang, M Li, J Hu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Covert communication is an method that plays an important role in secure data transmission.
The technology embeds covert information into data and propagates it through covert …

Lngate: Powering iot with next generation lightning micro-payments using threshold cryptography

A Kurt, S Mercan, O Shlomovits, E Erdin… - Proceedings of the 14th …, 2021 - dl.acm.org
Bitcoin has emerged as a revolutionary payment system with its decentralized ledger
concept however it has significant problems such as high transaction fees and long …

Enabling micro-payments on IoT devices using bitcoin lightning network

A Kurt, S Mercana, E Erdin… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Lightning Network (LN) addresses the scalability problem of Bitcoin by leveraging off-chain
transactions. Nevertheless, it is not possible to run LN on resource-constrained IoT devices …

Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus

M Gimenez-Aguilar, JM de Fuentes… - International Journal of …, 2023 - Springer
The permanent availability and relative obscurity of blockchains is the perfect ground for
using them for malicious purposes. However, the use of blockchains by malwares has not …