An empirical study of consensus protocols' dos resilience

G Giuliari, A Sonnino, M Frei, F Streun… - Proceedings of the 19th …, 2024 - dl.acm.org
With the proliferation of blockchain technology in high-value sectors, consensus protocols
are becoming critical infrastructures. The rapid innovation cycle in Byzantine fault tolerant …

SoK: Public Randomness

A Kavousi, Z Wang, P Jovanovic - 2024 IEEE 9th European …, 2024 - ieeexplore.ieee.org
Public randomness is a fundamental component in many cryptographic protocols and
distributed systems and often plays a crucial role in ensuring their security, fairness, and …

Max Attestation Matters: Making Honest Parties Lose Their Incentives in Ethereum {PoS}

M Zhang, R Li, S Duan - 33rd USENIX Security Symposium (USENIX …, 2024 - usenix.org
We present staircase attack, the first attack on the incentive mechanism of the Proof-of-Stake
(PoS) protocol used in Ethereum 2.0 beacon chain. Our attack targets the penalty of the …

Resource allocation and consensus of blockchains in pervasive edge computing environments

Y Huang, J Zhang, J Duan, B Xiao… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Edge devices with sensing, storage, and communication resources are penetrating our daily
lives. These resources make it possible for edge devices to conduct data transactions (eg …

Bitcoin-enhanced proof-of-stake security: Possibilities and impossibilities

EN Tas, D Tse, F Gai, S Kannan… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Bitcoin is the most secure blockchain in the world, supported by the immense hash power of
its Proof-of-Work miners. Proof-of-Stake chains are energy-efficient, have fast finality but face …

[HTML][HTML] Long-Range attack detection on permissionless blockchains using Deep Learning

O Sanda, M Pavlidis, S Seraj, N Polatidis - Expert Systems with Applications, 2023 - Elsevier
Blockchain has been viewed as a breakthrough and an innovative technology due to its
privacy, security, immutability, and data integrity characteristics. The consensus layer of the …

Pikachu: Securing PoS blockchains from long-range attacks by checkpointing into Bitcoin PoW using Taproot

S Azouvi, M Vukolić - Proceedings of the 2022 ACM Workshop on …, 2022 - dl.acm.org
Blockchain systems based on a reusable resource, such as proof-of-stake (PoS), provide
weaker security guarantees than those based on proof-of-work. Specifically, they are …

How to rationally select your delegatee in pos

Y Zhang, Q Wang, S Chen, C Wang - arXiv preprint arXiv:2310.08895, 2023 - arxiv.org
This paper centers around a simple yet crucial question for everyday users: How should one
choose their delegated validators within proof-of-stake (PoS) protocols, particularly in the …

Permissionless consensus

A Lewis-Pye, T Roughgarden - arXiv preprint arXiv:2304.14701, 2023 - arxiv.org
Blockchain protocols typically aspire to run in the permissionless setting, in which nodes are
owned and operated by a large number of diverse and unknown entities, with each node …

Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures

A Hamdi, L Fourati, S Ayed - International Journal of Information Security, 2024 - Springer
Nowadays, blockchain has become increasingly popular due to its promise of supporting
critical business services in various areas. Blockchain systems, like Ethereum and …