{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:41:45Z","timestamp":1729654905286,"version":"3.28.0"},"reference-count":55,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/sp.2017.29","type":"proceedings-article","created":{"date-parts":[[2017,6,26]],"date-time":"2017-06-26T16:34:26Z","timestamp":1498494866000},"page":"375-392","source":"Crossref","is-referenced-by-count":247,"title":["Hijacking Bitcoin: Routing Attacks on Cryptocurrencies"],"prefix":"10.1109","author":[{"given":"Maria","family":"Apostolaki","sequence":"first","affiliation":[]},{"given":"Aviv","family":"Zohar","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Vanbever","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/INM.2015.7140490"},{"key":"ref38","first-page":"796","article-title":"Stubborn mining: Generalizing selfish mining and combining with an eclipse attack","volume":"2015","author":"nayak","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/ICNP.2006.320179"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1145\/1015467.1015488"},{"key":"ref31","first-page":"129","article-title":"Eclipse attacks on bitcoin's peer-to-peer network","author":"heilman","year":"2015","journal-title":"24th USENIX Security Symposium (USENIX Security 15)"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1145\/1851275.1851195"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1007\/978-3-540-75551-7_11"},{"year":"0","author":"miller","journal-title":"Discovering bitcoin's public topology and influential nodes","key":"ref36"},{"year":"0","author":"kroll","journal-title":"CiteSeer","article-title":"The economics of bitcoin mining, or bitcoin in the presence of adversaries","key":"ref35"},{"key":"ref34","first-page":"279","article-title":"Enhancing bitcoin security and performance with strong consistency via collective signing","author":"kogias","year":"2016","journal-title":"25th USENIX Security Symposium (USENIX Security 16)"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/2810103.2813655"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/MSP.2014.49"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1145\/2043164.2018439","author":"gill","year":"2011","journal-title":"Ser SIGCOMM '11"},{"year":"0","journal-title":"Bitcoin Blockchain Statistics","key":"ref2"},{"year":"0","journal-title":"A next-generation smart contract and decentralized application platform","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/P2P.2013.6688704"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/1653662.1653708"},{"year":"2014","author":"decker","journal-title":"Bitcoin Transaction Malleability and MtGox","first-page":"313","key":"ref21"},{"year":"2014","author":"eyal","journal-title":"Financial Cryptography and Data Security","first-page":"436","key":"ref24"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1109\/SP.2015.13","article-title":"The miner's dilemma","author":"eyal","year":"2015","journal-title":"2015 IEEE Symposium on Security and Privacy IEEE"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/978-3-662-46803-6_10","author":"garay","year":"2015","journal-title":"Advances in Cryptology-EUROCRYPT 2015"},{"year":"2004","author":"feamster","journal-title":"WPES","key":"ref25"},{"year":"2015","author":"sun","journal-title":"Usenix Security","article-title":"RAPTOR: Routing attacks on privacy in TOR","key":"ref50"},{"year":"2015","author":"tonk","journal-title":"Large scale BGP hijack out of India","key":"ref51"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.1109\/TNET.2010.2066284"},{"year":"2007","author":"zhang","journal-title":"ser CoNEXT '07","key":"ref54"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.1145\/2670518.2673869"},{"year":"2015","author":"tonk","journal-title":"Massive route leak causes internet slowdown","key":"ref52"},{"year":"0","journal-title":"RIPE RIS Raw Data","key":"ref10"},{"year":"0","journal-title":"Routeviews Prefix to AS mappings Dataset (pfx2as) for IPv4 and IPv6","key":"ref11"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1145\/1266977.1266980"},{"year":"0","journal-title":"Scapy","key":"ref12"},{"year":"0","journal-title":"The Relay Network","key":"ref13"},{"year":"0","journal-title":"ZCash","key":"ref14"},{"year":"2013","author":"antonopoulos","journal-title":"Mastering Bitcoin O'Reilly Media Inc","article-title":"The bitcoin network","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/1282380.1282411"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/2382196.2382254"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1109\/SP.2015.14","article-title":"Sok:Research perspectives and challenges for bitcoin and cryptocurrencies","author":"bonneau","year":"2015","journal-title":"Security and Privacy (SP) 2015 IEEE Symposium on IEEE"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/2656877.2656890"},{"year":"0","journal-title":"co\/","key":"ref4"},{"year":"0","journal-title":"Bitnodes","key":"ref3"},{"year":"0","journal-title":"Dyn Research Pakistan hijacks YouTube","key":"ref6"},{"year":"0","journal-title":"CAIDA Macroscopic Internet Topology Data Kit","key":"ref5"},{"year":"0","journal-title":"FIBRE","key":"ref8"},{"year":"0","journal-title":"FalconTrak","key":"ref7"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/978-3-662-47854-7_32","author":"sompolinsky","year":"2015","journal-title":"Financial Cryptography and Data Security"},{"year":"0","journal-title":"Litecoin","key":"ref9"},{"key":"ref46","first-page":"18:1","article-title":"Peering: An as for us","author":"schlinker","year":"2014","journal-title":"Proceedings of the 13th ACM Workshop on Hot Topics in Networks ser HotNets-XIII"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1109\/SP.2014.36"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1145\/2398776.2398779"},{"year":"2016","author":"schnelli","journal-title":"BIP 151 Peer-to-Peer Communication Encryption","key":"ref47"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.17487\/rfc1771"},{"year":"0","author":"pilosov","journal-title":"DEFCON 16","article-title":"Stealing The Internet. An Internet-Scale Man In The Middle Attack","key":"ref41"},{"key":"ref44","article-title":"Optimal selfish mining strategies in bitcoin","volume":"abs 1507 6183","author":"sapirshtein","year":"2015","journal-title":"CoRR"},{"year":"2014","author":"rosenfeld","journal-title":"Analysis of hashrate-based double-spending","key":"ref43"}],"event":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2017,5,22]]},"location":"San Jose, CA, USA","end":{"date-parts":[[2017,5,26]]}},"container-title":["2017 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7957740\/7958557\/07958588.pdf?arnumber=7958588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T23:45:14Z","timestamp":1569541514000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7958588\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":55,"URL":"http:\/\/dx.doi.org\/10.1109\/sp.2017.29","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}