Challenges, and Opportunities,"
IEEE Access, vol. 7, pp.
117134-117151, 2019.
[187] C. Criddle, "Bitcoin consumes 'more electricity than
Argentina'," BBC News,
https://www.bbc.com/news/technology-56012952,
February 10, 2021.
[188] Wikipedia, "David Chaum,"
https://en.wikipedia.org/wiki/David_Chaum, March 14,
2021.
[189] N. Atzei, M. Bartoletti and . T. Cimoli,
A Survey of
Attacks on Ethereum Smart Contracts (SoK), Berlin,
Heidelberg: In: Maffei M., Ryan M. (eds) Principles of
Security and Trust. POST 2017. Lecture Notes in
Computer Science, vol 10204. Springer, 2017.
[190] M. Bartoletti and L. Pompianu, "An Empirical Analysis
of Smart Contracts: Platforms, Applications, and Design
Patterns," in
In: Brenner M. et al. (eds) Financial
Cryptography and Data Security. FC 2017. Lecture
Notes in Computer Science, vol 10323. Springer, 2017.
[191] OWASP, "Top 10 Web Application Security Risks,"
https://owasp.org/www-project-top-ten/,
Accessed
March 18, 2021.
[192] I. Eyal and E. G. Sirer, "Majority is not enough: Bitcoin
mining is vulnerable,"
Communications of the ACM, vol.
61, no. 7, 2018.
[193] bitcoinwiki, "DPoS," Accessed March 21, 2021 from
https://en.bitcoinwiki.org/wiki/DPoS.
[194] A. Simmons, "New IOTA Pollen V0.2.2 records more
than 10,000
transactions per second," Accessed March
21, 2021 from https://www.crypto-news-flash.com/new-
iota-pollen-v0-2-2-records-more-than-10000-
transactions-per-second/, July 29, 2020.
[195] Wikipedia, "Sheep Marketplace," Accessed March 24,
2021 from
https://en.wikipedia.org/wiki/Sheep_Marketplace.
[196] X. Feng, Q. Wang, X. Zhu and S. Wen, "Bug Searching
in Smart Contract," Accessed March 25, 2021 from
https://arxiv.org/pdf/1905.00799.pdf, 2019.
[197] M. Apostolaki, A. Zohar and L. Vanbever, "Hijacking
Bitcoin: Routing Attacks on Cryptocurrencies," in
2017
IEEE Symposium on Security and Privacy, San Jose, CA,
USA, 2017.
[198] E. Heilman, A. Kendler, A. Zohar and S. Goldberg,
"Eclipse Attacks on Bitcoin’s Peer-to-Peer Network," in
24th USENIX Security Symposium, Washington D. C.,
USA, 2015.
[199] M. Tran, I. Choi, G. J. Moon, A. V. Vu and M. S. Kang,
"A Stealthier Partitioning Attack against Bitcoin Peer-to-
Peer Network," in
2020 IEEE Symposium on Security
and Privacy , San Francisco, CA, US, 2020.
[200] F. Tramer, D. Boneh and K. Paterson, "Remote Side-
Channel Attacks on Anonymous Transactions," in
29th
USENIX Security Symposium, 2020.
[201] steemit.com, "Proof of Weak Hands (PoWH) Coin
hacked, 866 eth stolen," Accessed April 6, 2021 from
https://steemit.com/cryptocurrency/@bitburner/proof-
of-weak-hands-powh-coin-hacked-866-eth-stolen, 2018.
[202] A. Akentiev, "Parity Multisig Hacked. Again," Accessed
April 6, 2021 from https://medium.com/chain-cloud-
company-blog/parity-multisig-hack-again-
b46771eaa838, November 8, 2017.
[203] L. Brent, A. Jurisevic and M. Kong, "Vandal: A Scalable
Security Analysis Framework for Smart Contracts".
[204] SpankChain, "We Got Spanked: What We Know So
Far,"
Accessed
April
9,
2021
from
https://medium.com/spankchain/we-got-spanked-what-
we-know-so-far-d5ed3a0f38fe, October 9, 2018 .
[205] R. Zhang and B. Preneel, "Lay
Down the Common
Metrics:
Evaluating
Proof-of-Work
Consensus
Protocols' Security," in
40th IEEE Symposium on
Security and Privacy, San Francisco, CA, USA, 2019.
[206] X. Dong, F. Wu, A. Faree and D. Guo, "Selfholding: A
combined attack model using selfish mining with block
withholding
attack,"
Computers
&
Security
87(11):101584, vol. 87, no. 11, 2020.
[207] B. Bambrough, "Bitcoin
Price Rockets After Elon
Musk’s Tesla Reveals It Bought $1.5 Billion Worth Of
Bitcoin," Forbes, February 8, 2021.
[208] D. Schmidt, "Delegated Proof of Stake," Benzinga, July
6, 2020.
[209] A. Hertig, "A Guide to Saving on Bitcoin’s High
Transaction Fees," coindesk, February 27, 2021.
[210] "What Is Bitcoin?," Academy Binance, Jun 11, 2021.
[211] J. Frankenfield, "IOTA (MIOTA)," Investopedia,
December 21, 2020.
Journal Pre-proof