A Malatras - Journal of Network and Computer Applications, 2015 - Elsevier
P2P overlay networks have attracted significant research interest due to their utility as virtualized abstractions of complex network infrastructures, optimized to satisfy specific …
Y Marcus, E Heilman, S Goldberg - Cryptology ePrint Archive, 2018 - eprint.iacr.org
We present eclipse attacks on Ethereum nodes that exploit the peer-to-peer network used for neighbor discovery. Our attacks can be launched using only two hosts, each with a single …
H Yu, PB Gibbons, M Kaminsky… - 2008 IEEE Symposium …, 2008 - ieeexplore.ieee.org
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sybil …
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm Check out the new USENIX Web site. Measurements and Mitigation of Peer-to-Peer-based …
With 5G network services around the corner, vehicular cloud networks providing computation capabilities have taken precedence over traditional costly cloud solutions …
Distributed hash tables (DHTs) have been actively studied in literature and many different proposals have been made on how to organize peers in a DHT. However, very few DHTs …
Peer-to-peer networks have been quite thoroughly measured over the past years, however it is interesting to note that the BitTorrent Mainline DHT has received very little attention even …
Ethereum is a decentralized Blockchain system that supports the execution of Turing- complete smart contracts. Although the security of the Ethereum ecosystem has been …
P2P mesh-pull live video streaming applications---such as Cool-Streaming, PPLive, and PPStream---have become popular in the recent years. In this paper, we examine the stream …