Bitcoin and blockchain: Security and privacy

E Zaghloul, T Li, MW Mutka… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Blockchain is a technology that was proposed to enable the decentralized digital currency,
Bitcoin. Since its inception, blockchain has been widely used in many other areas, including …

A survey and comparison of peer-to-peer overlay network schemes

EK Lua, J Crowcroft, M Pias… - … Surveys & Tutorials, 2005 - ieeexplore.ieee.org
Over the Internet today, computing and communications environments are significantly more
complex and chaotic than classical distributed systems, lacking any centralized organization …

Eclipse attacks on {Bitcoin's}{peer-to-peer} network

E Heilman, A Kendler, A Zohar… - 24th USENIX security …, 2015 - usenix.org
We present eclipse attacks on bitcoin's peer-to-peer network. Our attack allows an adversary
controlling a sufficient number of IP addresses to monopolize all connections to and from a …

Low-resource eclipse attacks on ethereum's peer-to-peer network

Y Marcus, E Heilman, S Goldberg - Cryptology ePrint Archive, 2018 - eprint.iacr.org
We present eclipse attacks on Ethereum nodes that exploit the peer-to-peer network used
for neighbor discovery. Our attacks can be launched using only two hosts, each with a single …

[图书][B] Distributed systems

AS Tanenbaum, M Van Steen - 2017 - academia.edu
Distributed Systems Page 1 DS 2006; Ch1 16-Jan-06 Timo Alanko, 2006 1 Distributed
Systems Spring 2006 Timo Alanko 16-Jan-06 2 Sources of material • Tanenbaum, van …

Tapestry: A resilient global-scale overlay for service deployment

BY Zhao, L Huang, J Stribling, SC Rhea… - IEEE Journal on …, 2004 - ieeexplore.ieee.org
We present Tapestry, a peer-to-peer overlay routing infrastructure offering efficient, scalable,
location-independent routing of messages directly to nearby copies of an object or service …

A survey of peer-to-peer content distribution technologies

S Androutsellis-Theotokis, D Spinellis - ACM computing surveys (CSUR), 2004 - dl.acm.org
Distributed computer architectures labeled" peer-to-peer" are designed for the sharing of
computer resources (content, storage, CPU cycles) by direct exchange, rather than requiring …

Sybillimit: A near-optimal social network defense against sybil attacks

H Yu, PB Gibbons, M Kaminsky… - 2008 IEEE Symposium …, 2008 - ieeexplore.ieee.org
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable
to sybil attacks, where a malicious user pretends to have multiple identities (called sybil …

SCRIBE: A large-scale and decentralized application-level multicast infrastructure

M Castro, P Druschel, AM Kermarrec… - IEEE Journal on …, 2002 - ieeexplore.ieee.org
This paper presents Scribe, a scalable application-level multicast infrastructure. Scribe
supports large numbers of groups, with a potentially large number of members per group …

[PDF][PDF] N degrees of separation: multi-dimensional separation of concerns

P Tarr, H Ossher, W Harrison, SM Sutton Jr - Proceedings of the 21st …, 1999 - dl.acm.org
Done well, separation of concerns can provide many software engineering benefits,
including reduced complexity, im-proved reusability, and simpler evolution. The choice of …