区块链安全问题归类及顶会论文...

第一类:恶意造成网络延迟或者隔离发起的攻击

1(15SECURITY)EclipseAttacks on Bitcoin's Peer-to-Peer Network.

2(15CCS)Tampering with the Delivery of Blocks and Transactions in Bitcoin

3(17DSN)TheBalance Attack or Why ForkableBlockchains are Ill-Suited for Consortium

4(17SP)Hijacking Bitcoin: Routing Attacks on Cryptocurrencies

第二类:智能合约安全性

5(15CCS)Demystifying Incentives in the Consensus Computer//浪费算力的恶意脚本

6(16CCS)TheRing of Gyges: Investigating the Future of Criminal Smart Contracts//犯罪的智能合约

7(16CCS)TownCrier: An Authenticated Data Feed for Smart Contracts//数据源安全

    [NDSS'18]TLS-N-Non-repudiation over TLS   //CES签名保障数据源的安全

8(16CCS)MakingSmart Contracts Smarter   //智能合约漏洞

9(16SP)Hawk: The Blockchain Model of Cryptography and Privacy-Preserving SmartContract   //智能合约隐私和交易隐私

10(18NDSS)ZEUS_AnalyzingSafety of smart contracts  //智能合约漏洞检测工具

11(18NDSS)Chainspace_ASharded Smart Contracts Platform //智能合约效率扩展

12(18SECURITY)Enter the Hydra-Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts//智能合约安全监测及预防

13[SECURITY'18]teEther-Gnawing at Ethereum to Automatically Exploit Smart Contracts//智能合约漏洞检测-bytecode level

14[SECURITY'18]Enter the Hydra-Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts //智能合约容错

第三类:共识协议的设计与改进

12(16NDSS)Equihash:Asymmetric Proof-of-Work Based on the Generalized Birthday Problem  //ASIC-resistent

13(16SECURITY)Enhancing Bitcoin Security and Performance with Strong Consistency viaCollective Signing  //ByzCoin

14(16CCS)The Honey Badger of BFT Protocols  //不需要时间假设仍旧保持活性

15(16CCS)A Secure Sharding Protocol For Open Blockchains //随机安全分片,性能高

16(17SECURITY)REM: Resource-Efficient Mining for Blockchains.//有用的工作

第四类:矿池

17(15SP)The Miner's Dilemma//矿池互相攻击

18(17SECURITY)SmartPool: Practical Decentralized Pooled Mining//矿池中心化

19(17CCS)Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW)                 Attacks on Bitcoin //矿池攻击

第五类:隐私问题,包括交易隐私、支付通道隐私等

20(17NDSS)P2P Mixing and Unlinkable Bitcoin Transactions //交易隐私

21(17CCS)Solidus-ConfidentialDistributed Ledger Transactions via PVORM//交易隐私

22(17CCS)PracticalUC-Secure Delegatable Credentials with Attributes and          Their Application to Blockchain  //证书引发的隐私问题

23(17CCS)Bolt: Anonymous Payment Channels for Decentralized Currencies //支付通道隐私问题

24(17CCS)Concurrency and Privacy with Payment-Channel Networks//支付通道网络

25(17CCS)Revive: Rebalancing Off-Blockchain Payment Networks// 平衡链下支付通道

26(17CCS)Zero-Knowledge Contingent Payments Revisited: Attacks and            Payments for Services //保证公平交换

27(17NDSS)SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks

第六类:区块链的应用场景

28(15CCS)Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins

29(17CCS)Betrayal, Distrust, and Rationality: Smart Counter-Collusion                Contracts for Verifiable CloudComputing//降低云计算服务商的数量为2

30(17SP)IkTurninga pki around with decentralized automated incentives//CA正确行为

31(18SP)OmniLedger_ASecure, Scale-Out, Decentralized Ledgervia Sharding //账本分片

32(18'INFOCOM)CertChain Public and Efficient Certificate Audit Based on Blockchain for TLSConnections//基于区块链实现证书可公开验证

第九类:单

33(15CCS)Micropayments for Decentralized Currencies//降低交易成本使微支付可行

34(15SP)Bitcoin over Tor isn't a Good Idea //基于Tor增加BTC匿名性引发的攻击

35(16CCS)On the Security and Performance of Proof of Work Blockchains//度量框架

36(15CCS)Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges//交易所可偿还能力证明

37(16NDSS)Centrally Banked Cryptocurrencies//去中心化交易仍保留银行

38(15SP)SoK:Research Perspectives and Challenges for Bitcoin and Cryptocurrencies //对第二代加密货币的综述

猜你喜欢

转载自blog.csdn.net/github_38683467/article/details/81033908