[1]Conti M, Kumer S E, Lal C, et al. A survey on security and privacy issues of bitcoin[J]. IEEE Communications Surveys & Tutorials, 2018, 20(4): 34163452[2]Garay J, Kiayias A, Leonardos N. The bitcoin backbone protocol: Analysis and applications[C] Proc of Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2015: 281310[3]Garay J, Kiayias A, Leonardos N. The bitcoin backbone protocol with chains of variable difficulty[C] Proc of Annual Int Cryptology Conf. Berlin: Springer, 2017: 291323[4]Eyal I, Sirer E G. Majority is not enough: Bitcoin mining is vulnerable[C] Proc of the 18th Int Conf on Financial Cryptography and Data Security. Berlin: Springer, 2014: 436454[5]Heilman E, Kendler A, Zohar A, et al. Eclipse attacks on bitcoin’s peertopeer network[C] Proc of the 24th USENIX Security Symp. Berkeley, CA: USENIX Association, 2015: 129144[6]Saad M, Chen S, Mohaisen D. SyncAttack: Doublespending in bitcoin without mining power[C] Proc of the 2021 ACM Conf on Computer and Communications Security. New York: ACM, 2021: 16681685[7]Gao Shang, Li Zecheng, Peng Zhe, et al. Power adjusting and bribery racing: Novel mining attacks in the bitcoin system[C] Proc of the 2019 ACM Conf on Computer and Communications Security. New York: ACM, 2019: 833850[8]包象琳, 熊焰, 黄文超, 等.基于SmartVerif的比特币底层协议算力盗取漏洞发现[J]. 电子学报, 2021, 49(12): 23902398[9]Das P, Faust S, Loss J. A formal treatment of deterministic wallets[C] Proc of the 2019 ACM Conf on Computer and Communications Security. New York: ACM, 2019: 833850[10]Dabrowski A, Pfeffer K, Reichel M, et al. Better keep cash in your bootshardware wallets are the new single point of failure[C] Proc of the 2021 ACM CCS Workshop on Decentralized Finance and Security. New York: ACM, 2021: 18[11]Hu Yiwen, Wang Sihan, Tu Guanhua, et al. Security threats from bitcoin wallet smartphone applications: Vulnerabilities, attacks, and countermeasures[C] Proc of the 11th ACM Conf on Data and Application Security and Privacy. New York: ACM, 2021: 89100[12]Davif A B, Jannik D, Lucca H, et al. A formal analysis of 5G authentication[C] Proc of the 2018 ACM Conf on Computer and Communications Security. New York: ACM, 2018: 13831396[13]Vanhoef M, Piessens F. Key reinstallation attacks: Forcing nonce reuse in WPA2[C] Proc of the 2017 ACM Conf on Computer and Communications Security. New York: ACM, 2017: 13131328[14]Cremers C, Horvat M, Scott S, et al. Automated analysis and verification of TLS 1.3: 0rtt, resumption and delayed authentication[C] Proc of the 27th IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2016: 470485[15]Blanchet B. An efficient cryptographic protocol verifier based on prolog rules[C] Proc of the 14th IEEE Computer Security Foundations Workshop. Piscataway, NJ: IEEE, 2001: 8296[16]Armando A, David A B, Yohan B, et al. The AVISPA tool for the automated validation of internet security protocols and applications[C] Proc of the 17th Computer Aided Verification Int Conf. Berlin: Springer, 2005: 281285[17]Meier S, Schmidt B, Cremers C, et al. The TAMARIN prover for the symbolic analysis of security protocols[C] Proc of the 25th Int Conf on Computer Aided Verification. Berlin: Springer, 2013: 696701[18]Lowe G. A hierarchy of authentication specifications[C] Proc of the 10th Computer Security Foundations Workshop. Piscataway, NJ: IEEE, 1997: 3143[19]Dreier J, Kassem A, Lafourcade P. Formal analysis of ecash protocols[C] Proc of the 12th Int Joint Conf on eBusiness and Telecommunications. Piscataway, NJ: IEEE, 2015: 6575[20]Maria A, Aviv Z, Laurent V. Hijacking bitcoin: Routing attacks on cryptocurrencies[C] Proc of the 28th IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2017: 375392
|