SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.
Aljosha JudmayerNicholas StifterAlexei ZamyatinItay TsabaryIttay EyalPeter GaziSarah MeiklejohnEdgar R. WeipplPublished in: Financial Cryptography Workshops (2021)
Keyphrases
- complexity theoretic
- watermarking scheme
- countermeasures
- traffic analysis
- malicious attacks
- watermarking algorithm
- denial of service attacks
- adverse selection
- watermarking technique
- computer security
- security threats
- terrorist attacks
- secure routing
- information systems
- security risks
- java card
- security mechanisms
- intrusion detection