Sok: A stratified approach to blockchain decentralization

C Ovezik, D Karakostas, A Kiayias - arXiv preprint arXiv:2211.01291, 2022 - arxiv.org
Decentralization has been touted as the principal security advantage which propelled
blockchain systems at the forefront of developments in the financial technology space. Its …

Scalability and Security of Blockchain-empowered Metaverse: A Survey

H Huang, Z Yin, Q Yang, T Li, X Luo… - IEEE Open Journal …, 2024 - ieeexplore.ieee.org
Metaverse brings unlimited space and tremendous potential since it is an integrated
application of multiple fundamental technologies such as artificial intelligence, blockchain …

Eclipse attack detection for blockchain network layer based on deep feature extraction

Q Dai, B Zhang, S Dong - Wireless Communications and …, 2022 - Wiley Online Library
An eclipse attack is a common method used to attack the blockchain network layer; however,
detecting eclipse attacks is challenging, and the performance of existing methods is …

[PDF][PDF] Partitioning Ethereum without Eclipsing It.

H Heo, S Woo, T Yoon, MS Kang, S Shin - NDSS, 2023 - ndss-symposium.org
We present a practical partitioning attack, which we call Gethlighting, that isolates an
Ethereum full node from the rest of the network for hours without having to occupy (or …

SEED emulator: An Internet Emulator for research and education

W Du, H Zeng, K Won - Proceedings of the 21st ACM Workshop on Hot …, 2022 - dl.acm.org
We have developed an open-source Internet Emulator, which is a Python library, consisting
of the classes for each essential element of the Internet, including autonomous system …

Revelio: A Network-Level Privacy Attack in the Lightning Network

T Von Arx, M Tran, L Vanbever - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
The Lightning Network (LN) is a widely-adopted off-chain protocol that not only addresses
Bitcoin's scaling problem but also enables anonymous payments. Prior attacks have shown …

Strengthening DeFi Security: A Static Analysis Approach to Flash Loan Vulnerabilities

KW Wu - arXiv preprint arXiv:2411.01230, 2024 - arxiv.org
The rise of Decentralized Finance (DeFi) has brought novel financial opportunities but also
exposed serious security vulnerabilities, with flash loans frequently exploited for price …

A practical heartbeat-based defense scheme against cloning Attacks in PoA blockchain

Y Hu, G Tian, A Jiang, S Liu, J Wei, J Wang… - Computer Standards & …, 2023 - Elsevier
Consensus mechanism, as the soul-building-block of decentralized settings, enables a
series of blockchain applications, such as Bitcoin and Ethereum. For better security and …

From slow propagation to partition: Analyzing bitcoin over anonymous routing

N Sakib, S Wuthier, K Zhang, X Zhou… - … on Blockchain and …, 2024 - ieeexplore.ieee.org
Cryptocurrency is designed for anonymous financial transactions to avoid centralized
control, censorship, and regulations. To protect anonymity in the underlying P2P networking …

Adaptive double-spending attacks on PoW-based blockchains

J Zheng, H Huang, Z Zheng… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Previous state-of-the-art studies have proposed various analytical models to understand the
double-spending attacks (DSA) occurred in Proof-of-Work (PoW) based Blockchains …