1 |
Gervais, A., Karame, G. O., Wüst, K., Glykantzis, V., Ritzdorf, H., and Capkun, S. "On the security and performance of proof of work blockchains." Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, pp. 3-16, October. 2016.
|
2 |
HEILMAN, E., KENDLER, A., ZOHAR, A., AND GOLDBERG, S., " Eclipse Attacks on Bitcoin's Peer-to-Peer Network.", In 24th USENIX Security Symposium, pp. 129-144, 2015
|
3 |
Sung Bok Jeon, "Analysis of BGP Routing Protocol's Vulnerability and it's improvement measures.", Department of Information & Technology, master thesis, sogang University , August, 2008.
|
4 |
Apostolaki, Maria, Aviv Zohar, and Laurent Vanbever. "Hijacking bitcoin: Routing attacks on cryptocurrencies." Security and Privacy (SP), 2017 IEEE Symposium on. IEEE, 2017.
|
5 |
S. Eskandari, D. Barrera, E. Stobert, and J. Clark. "A first look at the usability of bitcoin key management.", In Workshop on Usable Security (USEC), 2015.
|
6 |
Gentilal, Miraje, Paulo Martins, and Leonel Sousa. "TrustZone-backed bitcoin wallet." Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems. ACM, 2017.
|
7 |
Reason of Ethereum Hardfork, https://bitcoinmagazine.com/articles/op-ed-why-ethereums-hard-fork-will-cause-problems-coming-year/, last accessed 2017/09/13.
|
8 |
Notification of Ethereum Hardfork, https://blog.ethereum.org/2016/07/20/hard-fork-completed/, last accessed 2017/09/13.
|
9 |
BGP Hijacking, https://www.securework s.com/research/bgp-hijacking-for-cryptoc urrency-profit, last accessed 2017/09/13.
|
10 |
Bitfinex Coin Exchange Hacking, http://www.itworld.co.kr/news/100594, last acc essed 2017/09/13.
|
11 |
Yapizon Coin Exchange Hacking, http://www.boannews.com/media/view.asp?idx=54483&kind=1&search=title&find=%BA%F1%C6%AE%C4%DA%C0%CE, last accessed 2017/09/13.
|
12 |
BTMINE bitcoin malware, https://themerkle.com/top-3-types-of-bitcoin-mining-malware/, last accessed 2017/09/13.
|
13 |
BitCoinMiner bitcoin malware, http://blog.alyac.co.kr/54, last accessed 2017/09/13.
|
14 |
ethereum price, https://www.bithumb.com/, last accessed 2017/09/13.
|
15 |
bitcoin exchange manipulation, http://www.boannews.com/media/view.asp?idx=5 5031, last accessed 2017/09/13.
|
16 |
Satoshi Nakamoto, "Bitcoin:A peer-topeer electronic cash system.", 2008.
|
17 |
Kroll, Joshua A., Ian C. Davey, and Edward W. Felten. "The economics of Bitcoin mining, or Bitcoin in the presence of adversaries.", Proc. of WEIS. Vol. 2013. 2013.
|
18 |
Jerome Glenn et al., "World Future Report 2050". Kyobo Book, Korea, 2016.
|
19 |
Korea Institute of Finance and Information Technology., "Block Chain Technology Application Areas and Case Studies", KISA, Korea, 2016.
|
20 |
B. Lee and J.-H. Lee, "Blockchain based secure firmware update for embedded devices in an Internet of Things environment", Journal of Supercomputing, vol. 73, no. 3, pp. 1152-1167, 2017
DOI
|
21 |
B. Lee, Y.-J. Lim and J.-H. Lee, "Consensus algorithms in block-chain platforms", Proceedings of Symposium of the Korean Institute of communications and Information Sciences, pp. 386-387, 2017.
|
22 |
bitcoin wiki page, https://en.bitcoin.it/wiki/Double-spending, last accessed 2017/09/13.
|
23 |
SoHee Kim, JiYeon Yang and Yoonjeong Kim, "A Study on the Selfish Mining of Block Chain", Proceedings of Symposium of the Korean Institute of communications and Information Sciences, pp. 422-423, 2015.
|
24 |
I. Eyal, Emin G. Sirer, "Majority is not Enough: Bitcoin Mining is Vulnerable", In Financial Cryptography, pp. 436-454, 2014.
|
25 |
Bahack Lear, "Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft)." arXiv preprint arXiv:1312.7013, 2013.
|
26 |
HEILMAN, Ethan. One weird trick to stop selfish miners: Fresh bitcoins, a solution for the honest miner. In: International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, pp. 161-162, 2014.
|