[1] |
EYAL I , SIRER E G . Majority is not enough:bitcoin mining is vulnerable[C]// Proceedings of International Conference on Financial Cryptography and Data Security. 2014: 436-454.
|
[2] |
HEILMAN E , KENDLER A , ZOHAR A ,et al. Eclipse attacks on{Bitcoin’s}{peer-to-peer} network[C]// Proceedings of 24th USENIX Security Symposium (USENIX Security 15). 2015: 129-144.
|
[3] |
SAPIRSHTEIN A , SOMPOLINSKY Y , ZOHAR A . Optimal selfish mining strategies in bitcoin[C]// Proceedings of International Conference on Financial Cryptography and Data Security. 2016: 515-532.
|
[4] |
NAYAK K , KUMAR S , MILLER A ,et al. Stubborn mining:generalizing selfish mining and combining with an eclipse attack[C]// Pro- ceedings of 2016 IEEE European Symposium on Security and Privacy (EuroS&P). 2016: 305-320.
|
[5] |
DONG X , WU F , FAREE A ,et al. Selfholding:a combined attack model using selfish mining with block withholding attack[J]. Computers & Security, 2019,87:101584.
|
[6] |
ALBRECHER H , GOFFARD P O . On the profitability of selfish blockchain mining under consideration of ruin[J]. arXiv preprint arXiv:2010.12577, 2020.
|
[7] |
ZUR R B , EYAL I , TAMAR A . Efficient mdp analysis for selfishmining in blockchains[C]// Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. 2020: 113-131.
|
[8] |
MOTLAGH S G , MI?I? J , MI?I? V B . The impact of selfish mining on bitcoin network performance[J]. IEEE Transactions on Network Science and Engineering, 2021,8(1): 724-735.
|
[9] |
LI Q , CHANG Y , WU X ,et al. A new theoretical framework of pyramid markov processes for blockchain selfish mining[J]. Journal of Systems Science and Systems Engineering, 2021,30(6): 667-711.
|
[10] |
HEILMAN E , . One weird trick to stop selfish miners:Fresh bitcoins,a solution for the honest miner[C]// Proceedings of International Conference on Financial Cryptography and Data Security. 2014: 161-162.
|
[11] |
SOLAT S , POTOP-BUTUCARU M . Brief announcement:Zeroblock:Timestamp-free prevention of block-withholding attack in bitcoin[C]// Proceedings of International Symposium on Stabilization,Safety,and Security of Distributed Systems. 2017: 356-360.
|
[12] |
CHICARINO V , ALBUQUERQUE C , JESUS E ,et al. On the detection of selfish mining and stalker attacks in blockchain networks[J]. Annals of Telecommunications, 2020,75(3): 143-152.
|
[13] |
GERVAIS A , KARAME G O , WüST K ,et al. On the security and performance of proof of work blockchains[C]// Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016: 3-16.
|
[14] |
WANG W , HOANG D T , HU P ,et al. A survey on consensus mechanisms and mining strategy management in blockchain networks[J]. IEEE Access, 2019,7: 22328-22370.
|
[15] |
G?BEL J , KEELER H P , KRZESINSKI A E ,et al. Bitcoin blockchain dynamics:The selfish-mine strategy in the presence of propagation delay[J]. Performance Evaluation, 2016,104: 23-41.
|
[16] |
SAAD M , NJILLA L , KAMHOUA C ,et al. Countering selfish mining in blockchains[C]// Proceedings of 2019 International Conference on Computing,Networking and Communications (ICNC). 2019: 360-364.
|
[17] |
HOU C , ZHOU M , JI Y ,et al. Squirrl:Automating attack analysis on blockchain incentive mechanisms with deep reinforcement learning[J]. arXiv preprint arXiv:1912.01798, 2019.
|
[18] |
DECKER C , WATTENHOFER R . Information propagation in the bitcoin network[C]// Proceedings of IEEE P2P 2013. 2013: 1-10.
|
[19] |
BITCOINFEES . Bitcoinfees/feesim:model-based bitcoin fee estimation[EB].
|
[20] |
YCHARTS . Bitcoin average transactions per block[EB].
|
[21] |
BAG S , RUJ S , SAKURAI K . Bitcoin block withholding attack:analysis and mitigation[J]. IEEE Transactions on Information Forensics and Security, 2016,12(8): 1967-1978.
|
[22] |
GUTTERIDGE D . Japanese cryptocurrency monacoin hit by selfish mining attack[EB].
|
[23] |
G?BEL J , KRZESINSKI A E . Increased block size and bitcoin blockchain dynamics[C]// Proceedings of 2017 27th International Telecommunication Networks and Applications Conference (ITNAC). 2017: 1-6.
|
[24] |
BTC.COM. Poolstate-2021[EB].
|
[25] |
HAYES A S . Cryptocurrency value formation:an empirical study leading to a cost of production model for valuing bitcoin[J]. Telematics and Informatics, 2017,34(7): 1308-1321.
|
[26] |
COURTOIS N T , GRAJEK M , NAIK R . Optimizing SHA256 in bitcoin mining[C]// Proceedings of International Conference on Cryptography and Security Systems. 2014: 131-144.
|
[27] |
CORON J S , DODIS Y , MALINAUD C ,et al. Merkle-damg?rd revisited:how to construct a hash function[C]// Proceedings of Annual International Cryptology Conference. 2005: 430-448.
|