4.6 Article

Simulation Method for Blockchain Systems with a Public Chain

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Identifying Ethereum traffic based on an active node library and DEVp2p features

Xiaoyan Hu et al.

Summary: With the increasing demand for Ethereum network supervision, this paper proposes an efficient Ethereum traffic identification system, ETI, for an ISP to monitor its internal users on the Ethereum platform. ETI achieves high identification accuracy and time efficiency without using Deep Packet Inspection.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2022)

Article Computer Science, Cybernetics

Evolution of Ethereum Transaction Relationships: Toward Understanding Global Driving Factors From Microscopic Patterns

Dan Lin et al.

Summary: Researchers collected Ethereum transaction data and built network models, finding that the local and microscopic network structures are star-shaped, and the transaction frequency of addresses has a significant impact on the evolution of Ethereum transaction relationships. The first-layer nodes of microstructures play a dominant role in network evolution. The degree of addresses is effective in predicting the direction of new transactions.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2022)

Review Computer Science, Information Systems

Ethereum smart contract security research: survey and future research opportunities

Zeli Wang et al.

Summary: Blockchain technology, particularly smart contracts, has gained significant attention in various industries, with Ethereum standing out as a prominent player. However, the use of smart contracts in commercial settings poses security implications that need to be addressed through systematic research efforts. This paper reviews existing research on Ethereum smart contract security, focusing on malicious exploitation, vulnerabilities, and safety considerations in program execution environments while also identifying potential research opportunities for the future.

FRONTIERS OF COMPUTER SCIENCE (2021)

Article Telecommunications

A Distributed framework for detecting DDoS attacks in smart contract-based Blockchain-IoT Systems by leveraging Fog computing

Prabhat Kumar et al.

Summary: The advancement of blockchain technology and the increasing use of Internet of Things devices are reshaping the infrastructure of smart networks. To address the security challenges posed by these developments, a new framework combining artificial intelligence techniques and distributed storage has been proposed. This framework demonstrates superior performance in detecting rare attacks in IoT systems, providing a promising solution to enhance security in blockchain-IoT applications.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2021)

Article Computer Science, Hardware & Architecture

A survey of consensus algorithms in public blockchain systems for crypto-currencies

Md Sadek Ferdous et al.

Summary: Blockchain technology supporting cryptocurrencies has garnered unprecedented attention, but still faces challenges in terms of performance and security, with consensus algorithms being a crucial component. Through systematic analysis of various consensus algorithms and comprehensive classification of them in different public blockchain systems, it helps to understand the characteristics and trends of different blockchain systems.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)

Article Computer Science, Information Systems

Security reinforcement for Ethereum virtual machine

Fuchen Ma et al.

Summary: Smart contracts are more sensitive to security issues due to immutability, direct connection to payments, and new practices. Even with existing testing and verification tools, vulnerabilities in smart contracts remain a significant danger.

INFORMATION PROCESSING & MANAGEMENT (2021)

Article Computer Science, Information Systems

A Survey on Blockchain Technology: Evolution, Architecture and Security

Muhammad Nasir Mumtaz Bhutta et al.

Summary: Blockchain technology is revolutionizing modern society with its transparency, decentralization, and security properties, attracting attention from scholars, industrialists, and researchers. This technology is poised to transform how we live, interact, and conduct business.

IEEE ACCESS (2021)

Proceedings Paper Computer Science, Information Systems

Measurements, Analyses, and Insights on the Entire Ethereum Blockchain Network

Xi Tong Lee et al.

WEB CONFERENCE 2020: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2020) (2020)

Article Computer Science, Information Systems

Smart Contract: Attacks and Protections

Sarwar Sayeed et al.

IEEE ACCESS (2020)

Proceedings Paper Engineering, Electrical & Electronic

SimBlock: A Blockchain Network Simulator

Yusuke Aoki et al.

IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM 2019 WKSHPS) (2019)

Article Computer Science, Information Systems

Smart Contract Security: A Software Lifecycle Perspective

Yongfeng Huang et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Interdisciplinary Applications

Detecting Ponzi Schemes on Ethereum: Towards Healthier Blockchain Technology

Weili Chen et al.

WEB CONFERENCE 2018: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW2018) (2018)

Article Computer Science, Information Systems

Blockchain challenges and opportunities: a survey

Zibin Zheng et al.

INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES (2018)

Proceedings Paper Engineering, Electrical & Electronic

Introduction to Security and Privacy on the Blockchain

Harry Halpin et al.

2017 2ND IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW) (2017)

Proceedings Paper Computer Science, Information Systems

BLOCKBENCH: A Framework for Analyzing Private Blockchains

Tien Tuan Anh Dinh et al.

SIGMOD'17: PROCEEDINGS OF THE 2017 ACM INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA (2017)

Article Computer Science, Software Engineering

Verification of a Cryptographic Primitive: SHA-256

Andrew W. Appel

ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS (2015)

Proceedings Paper Computer Science, Information Systems

Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools

Benjamin Johnson et al.

FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014 (2014)