Three birds with one stone: Efficient partitioning attacks on interdependent cryptocurrency networks

M Saad, D Mohaisen - 2023 IEEE Symposium on Security and …, 2023 - ieeexplore.ieee.org
The biased distribution of cryptocurrency nodes across Autonomous Systems (ASes)
increases the risk of spatial partitioning attacks, allowing an adversary to isolate nodes by …

On the peer degree distribution of the bitcoin p2p network

M Grundmann, M Baumstark… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
A recent spam wave of IP addresses in the Bitcoin P2P network allowed us to estimate the
degree distribution of reachable peers. The resulting distribution indicates that about half of …

Understanding the Security Risks of Decentralized Exchanges by Uncovering Unfair Trades in the Wild

J Chen, Y Wang, Y Zhou, W Ding… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
DEX, or decentralized exchange, is a prominent class of decentralized finance (DeFi)
applications on blockchains, attracting a total locked value worth tens of billions of USD …

Resilience of blockchain overlay networks

A Paphitis, N Kourtellis, M Sirivianos - International Conference on …, 2023 - Springer
Blockchain (BC) systems are highly distributed peer-to-peer networks that offer an
alternative to centralized services and promise robustness to coordinated attacks. However …

Stability of p2p networks under greedy peering (full version)

L Kiffer, R Rajaraman - arXiv preprint arXiv:2402.14666, 2024 - arxiv.org
Major cryptocurrency networks have relied on random peering choice rules for making
connections in their peer-to-peer networks. Generally, these choices have good properties …

DEthna: Accurate Ethereum Network Topology Discovery with Marked Transactions

C Zhao, Y Zhou, S Zhang, T Wang, QZ Sheng… - arXiv preprint arXiv …, 2024 - arxiv.org
In Ethereum, the ledger exchanges messages along an underlying Peer-to-Peer (P2P)
network to reach consistency. Understanding the underlying network topology of Ethereum …

Blockchain Economic Denial of Sustainability Attack: Exploiting Latency Optimization in Ethereum Transaction Forwarding

T Tsuchiya, L Zhou, K Qin, A Gervais… - arXiv preprint arXiv …, 2024 - arxiv.org
Strategies related to the blockchain concept of Extractable Value (MEV/BEV), such as
arbitrage, front-or back-running create an economic incentive for network nodes to reduce …

Highly Available Blockchain Nodes With N-Version Design

J Ron, C Soto-Valero, L Zhang… - … on Dependable and …, 2023 - ieeexplore.ieee.org
As all software, blockchain nodes are exposed to faults in their underlying execution stack.
Unstable execution environments can disrupt the availability of blockchain nodes' interfaces …

A New Consensus Mechanism for Blockchained Federated Learning Systems Using Optimistic Rollups

JP de Brito Gonçalves… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Edge computing brings a new paradigm in which the sharing of computing, storage, and
bandwidth resources as close as possible to the mobile devices or sensors generating a …

[PDF][PDF] Ethical challenges in blockchain network measurement research

Y Tang, K Li, Y Wang, J Chen - … of the Workshop on Ethics in …, 2023 - ndss-symposium.org
Public blockchains are the digital infrastructure that powers the multi-trillion-dollar economy
in cryptocurrencies. Understanding the security and performance of deployed blockchain …