區塊鏈安全問題歸類及頂會論文...
第一類:惡意造成網路延遲或者隔離發起的攻擊
1(15SECURITY)EclipseAttacks on Bitcoin's Peer-to-Peer Network.
2(15CCS)Tampering with the Delivery of Blocks and Transactions in Bitcoin
3(17DSN)TheBalance Attack or Why ForkableBlockchains are Ill-Suited for Consortium
4(17SP)Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
第二類:智慧合約安全性
5(15CCS)Demystifying Incentives in the Consensus Computer//浪費算力的惡意指令碼
6(16CCS)TheRing of Gyges: Investigating the Future of Criminal Smart Contracts//犯罪的智慧合約
7(16CCS)TownCrier: An Authenticated Data Feed for Smart Contracts//資料來源安全
[NDSS'18]TLS-N-Non-repudiation over TLS //CES簽名保障資料來源的安全
8(16CCS)MakingSmart Contracts Smarter //智慧合約漏洞
9(16SP)Hawk: The Blockchain Model of Cryptography and Privacy-Preserving SmartContract //智慧合約隱私和交易隱私
10(18NDSS)ZEUS_AnalyzingSafety of smart contracts //智慧合約漏洞檢測工具
11(18NDSS)Chainspace_ASharded Smart Contracts Platform //智慧合約效率擴充套件
12(18SECURITY)Enter the Hydra-Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts//智慧合約安全監測及預防
13[SECURITY'18]teEther-Gnawing at Ethereum to Automatically Exploit Smart Contracts//智慧合約漏洞檢測-bytecode level
14[SECURITY'18]Enter the Hydra-Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts //智慧合約容錯
第三類:共識協議的設計與改進
12(16NDSS)Equihash:Asymmetric Proof-of-Work Based on the Generalized Birthday Problem //ASIC-resistent
13(16SECURITY)Enhancing Bitcoin Security and Performance with Strong Consistency viaCollective Signing //ByzCoin
14(16CCS)The Honey Badger of BFT Protocols //不需要時間假設仍舊保持活性
15(16CCS)A Secure Sharding Protocol For Open Blockchains //隨機安全分片,效能高
16(17SECURITY)REM: Resource-Efficient Mining for Blockchains.//有用的工作
第四類:礦池
17(15SP)The Miner's Dilemma//礦池互相攻擊
18(17SECURITY)SmartPool: Practical Decentralized Pooled Mining//礦池中心化
19(17CCS)Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin //礦池攻擊
第五類:隱私問題,包括交易隱私、支付通道隱私等
20(17NDSS)P2P Mixing and Unlinkable Bitcoin Transactions //交易隱私
21(17CCS)Solidus-ConfidentialDistributed Ledger Transactions via PVORM//交易隱私
22(17CCS)PracticalUC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain //證書引發的隱私問題
23(17CCS)Bolt: Anonymous Payment Channels for Decentralized Currencies //支付通道隱私問題
24(17CCS)Concurrency and Privacy with Payment-Channel Networks//支付通道網路
25(17CCS)Revive: Rebalancing Off-Blockchain Payment Networks// 平衡鏈下支付通道
26(17CCS)Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services //保證公平交換
27(17NDSS)SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks
第六類:區塊鏈的應用場景
28(15CCS)Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins
29(17CCS)Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable CloudComputing//降低雲端計算服務商的數量為2
30(17SP)IkTurninga pki around with decentralized automated incentives//CA正確行為
31(18SP)OmniLedger_ASecure, Scale-Out, Decentralized Ledgervia Sharding //賬本分片
32(18'INFOCOM)CertChain Public and Efficient Certificate Audit Based on Blockchain for TLSConnections//基於區塊鏈實現證書可公開驗證
第九類:單
33(15CCS)Micropayments for Decentralized Currencies//降低交易成本使微支付可行
34(15SP)Bitcoin over Tor isn't a Good Idea //基於Tor增加BTC匿名性引發的攻擊
35(16CCS)On the Security and Performance of Proof of Work Blockchains//度量框架
36(15CCS)Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges//交易所可償還能力證明
37(16NDSS)Centrally Banked Cryptocurrencies//去中心化交易仍保留銀行
38(15SP)SoK:Research Perspectives and Challenges for Bitcoin and Cryptocurrencies //對第二代加密貨幣的綜述