|
A survey on Blockchain Technology and itsBog'liq Huaqun Xingjie - A Survey on blockchain Technology and its Security - 2022 MarchAccessed
April
11,
2021
from
https://bitcointalk.org/index.php?topic=1744115.0,
January 08, 2017.
[74] J. Solana, "$500K hack challenge backfires on
blockchain lottery SmartBillions," in Accessed April 11,
2021 from
https://calvinayre.com/2017/10/13/bitcoin/500k-hack-
challenge-backfires-blockchain-lottery-smartbillions/,
October 13, 2017.
[75] L. Brent, A. Jurisevic, M. Kong, E. Liu, F. Gauthier and
V. Gramoli, "Vandal: A Scalable Security Analysis
Framework for Smart Contracts," Accessed April 7,
2021 from ahttps://arxiv.org/pdf/1809.03981.pdf, 2018.
[76] A. Roan, "How Spankchain Got Hacked," Accessed
April 9, 2021 from https://medium.com/swlh/how-
spankchain-got-hacked-af65b933393c, March 27, 2020.
[77] P. Litke and J. Stewart, "BGP Hijacking for
Cryptocurrency Profit," Secureworks, 7 August 2014.
[78] J. Wilcke, "The Ethereum network is currently
undergoing a DoS attack," ethereum foundation blog,
September 22, 2016.
[79] Aruba, "10 Blockchain and New Age Security Attacks
You Should Know," Blogs, Aruba, January 22, 2019.
[80] Waqas,
"The
Pirate
Bay
Caught
Running
Cryptocurrency Mining Script," HackRead, September
17, 2017.
[81] K. McCarthy, "CBS's Showtime caught mining crypto-
coins in viewers' web browsers," The Register,
September 25, 2017.
[82] M. Beedham, "Hackers secretly ran cryptocurrency
mining malware on Indian government sites,"
https://thenextweb.com, September 17, 2018.
[83] T. Claburn, "Crypto-jackers enlist Google Tag Manager
to smuggle alt-coin miners," The Register, November
22, 2017.
[84] . M. Maunder , "WordPress Plugin Banned for Crypto
Mining," Wordfence, November 8, 2017.
[85] T. Mursch, "OVER 100,000 DRUPAL WEBSITES
VULNERABLE TO DRUPALGEDDON 2 (CVE-2018-
7600)," Bad Packets, June 4, 2018.
[86] T. Cantisano, "YouTube ads hijacked visitors computers
to mine cryptocurrency," Neowin, January 26, 2018.
[87] C. Osborne, "MikroTik routers enslaved in massive
Coinhive cryptojacking campaign," ZDNet, August 3,
2018.
[88] L. Kelion, "Starbucks cafe's wi-fi made computers mine
crypto-currency," BBC, December 13, 2017.
[89] C. Cimpanu, "IOTA Cryptocurrency Users Lose $4
Million
in
Clever
Phishing
Attack,"
in
Bleepingcomputer.
[90] L. Cuen, "IOTA Being Shut Off Is the Latest Chapter in
an Absurdist History," coindesk, February 26, 2020.
[91] L. Breidenbach, P. Daian, F. Tramer and A. Juels, "Enter
the Hydra: Towards Principled Bug Bounties and
Exploit-Resistant Smart Contracts," in 27th USENIX
Security Symposium, Baltimore, MD, USA, 2018.
[92] E. Hildenbrandt, M. Saxena, N. Rodrigues, X. Zhu, P.
Daian, D. Guth, B. Moore, D. Park, Y. Zhang, A.
S¸tefanescu and G. Ros¸u, "KEVM: A Complete Formal
Semantics of the Ethereum Virtual Machine," in 2018
IEEE 31st Computer Security Foundations Symposium
(CSF), Oxford, UK, 2018.
[93] L. Luu, "Oyente: An Analysis Tool for Smart Contracts,"
Accessed
April
5,
2021
from
https://loiluu.com/oyente.html, 2016.
[94] P. Tsankov, A. Dan, D. Drachsler-Cohen, A. Gervais, F.
Bünzli and M. Vechev, "Securify: Practical Security
Analysis of Smart Contracts," in he 2018 ACM SIGSAC
Journal Pre-proof
Conference on Computer and Communications Security
(CCS'18), October 2018.
[95] S. Kalra, S. Goel, M. Dhawan and S. Sharma, "ZEUS:
Analyzing Safety of Smart Contracts," in Network and
|
| |