{"id":"https://openalex.org/W4400976857","doi":"https://doi.org/10.1145/3664476.3664509","title":"Unveiling Vulnerabilities in Bitcoin's Misbehavior-Score Mechanism: Attack and Defense","display_name":"Unveiling Vulnerabilities in Bitcoin's Misbehavior-Score Mechanism: Attack and Defense","publication_year":2024,"publication_date":"2024-07-25","ids":{"openalex":"https://openalex.org/W4400976857","doi":"https://doi.org/10.1145/3664476.3664509"},"language":"en","primary_location":{"id":"doi:10.1145/3664476.3664509","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3664509","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3664476.3664509?download=true","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3664476.3664509?download=true","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012910407","display_name":"Yuwen Zou","orcid":"https://orcid.org/0009-0001-0809-510X"},"institutions":[{"id":"https://openalex.org/I146655781","display_name":"University of Liverpool","ror":"https://ror.org/04xs57h96","country_code":"GB","type":"education","lineage":["https://openalex.org/I146655781"]},{"id":"https://openalex.org/I69356397","display_name":"Xi\u2019an Jiaotong-Liverpool University","ror":"https://ror.org/03zmrmn05","country_code":"CN","type":"education","lineage":["https://openalex.org/I69356397"]}],"countries":["CN","GB"],"is_corresponding":true,"raw_author_name":"Yuwen Zou","raw_affiliation_strings":["School of Advanced Technology, Xi'an Jiaotong-Liverpool University, China and Department of Computer Science, University of Liverpool, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Advanced Technology, Xi'an Jiaotong-Liverpool University, China and Department of Computer Science, University of Liverpool, United Kingdom","institution_ids":["https://openalex.org/I69356397","https://openalex.org/I146655781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058487069","display_name":"Wenjun Fan","orcid":"https://orcid.org/0000-0002-7363-9695"},"institutions":[{"id":"https://openalex.org/I69356397","display_name":"Xi\u2019an Jiaotong-Liverpool University","ror":"https://ror.org/03zmrmn05","country_code":"CN","type":"education","lineage":["https://openalex.org/I69356397"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenjun Fan","raw_affiliation_strings":["School of Advanced Technology, Xi'an Jiaotong-Liverpool University, China"],"affiliations":[{"raw_affiliation_string":"School of Advanced Technology, Xi'an Jiaotong-Liverpool University, China","institution_ids":["https://openalex.org/I69356397"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100524937","display_name":"Zhen Ma","orcid":"https://orcid.org/0009-0006-4348-1176"},"institutions":[{"id":"https://openalex.org/I69356397","display_name":"Xi\u2019an Jiaotong-Liverpool University","ror":"https://ror.org/03zmrmn05","country_code":"CN","type":"education","lineage":["https://openalex.org/I69356397"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Ma","raw_affiliation_strings":["School of Advanced Technology, Xi'an Jiaotong-Liverpool University, China"],"affiliations":[{"raw_affiliation_string":"School of Advanced Technology, Xi'an Jiaotong-Liverpool University, China","institution_ids":["https://openalex.org/I69356397"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5012910407"],"corresponding_institution_ids":["https://openalex.org/I146655781","https://openalex.org/I69356397"],"apc_list":null,"apc_paid":null,"fwci":0.7634,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.76825275,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.900600016117096,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7606723308563232},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.6573206186294556},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5836678147315979},{"id":"https://openalex.org/keywords/philosophy","display_name":"Philosophy","score":0.07546061277389526},{"id":"https://openalex.org/keywords/epistemology","display_name":"Epistemology","score":0.04904204607009888}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7606723308563232},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.6573206186294556},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5836678147315979},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.07546061277389526},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.04904204607009888}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3664476.3664509","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3664509","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3664476.3664509?download=true","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3664476.3664509","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3664509","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3664476.3664509?download=true","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4115898974","display_name":null,"funder_award_id":"TDF21/22-R24-177","funder_id":"https://openalex.org/F4320324032","funder_display_name":"Xi\u2019an Jiaotong-Liverpool University"},{"id":"https://openalex.org/G5539584389","display_name":null,"funder_award_id":"YZCXPT2022103","funder_id":"https://openalex.org/F4320324032","funder_display_name":"Xi\u2019an Jiaotong-Liverpool University"}],"funders":[{"id":"https://openalex.org/F4320321605","display_name":"Government of Jiangsu Province","ror":"https://ror.org/004svx814"},{"id":"https://openalex.org/F4320324032","display_name":"Xi\u2019an Jiaotong-Liverpool University","ror":"https://ror.org/03zmrmn05"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4400976857.pdf","grobid_xml":"https://content.openalex.org/works/W4400976857.grobid-xml"},"referenced_works_count":38,"referenced_works":["https://openalex.org/W13439346","https://openalex.org/W151187442","https://openalex.org/W813991061","https://openalex.org/W1444567531","https://openalex.org/W1847381862","https://openalex.org/W1907293129","https://openalex.org/W2013613544","https://openalex.org/W2062952310","https://openalex.org/W2127612127","https://openalex.org/W2132552804","https://openalex.org/W2164090669","https://openalex.org/W2284202716","https://openalex.org/W2287831134","https://openalex.org/W2547676993","https://openalex.org/W2562667804","https://openalex.org/W2604081004","https://openalex.org/W2611050176","https://openalex.org/W2624307925","https://openalex.org/W2792991436","https://openalex.org/W2901264294","https://openalex.org/W2903943296","https://openalex.org/W2926112089","https://openalex.org/W2927160209","https://openalex.org/W2955050922","https://openalex.org/W2973064633","https://openalex.org/W3011853658","https://openalex.org/W3015486462","https://openalex.org/W3085529854","https://openalex.org/W3094432677","https://openalex.org/W3095660977","https://openalex.org/W3095960217","https://openalex.org/W3153358647","https://openalex.org/W3177413563","https://openalex.org/W4211079457","https://openalex.org/W4213426662","https://openalex.org/W4297405248","https://openalex.org/W4312276563","https://openalex.org/W6735973171"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382997850","https://openalex.org/W2382290278"],"abstract_inverted_index":{"The":[0,83],"Bitcoin":[1,16,45,68,154],"network":[2,70],"is":[3],"susceptible":[4],"to":[5,9,38,66,78,106],"various":[6],"attacks":[7,43,49,57,77,89],"due":[8],"its":[10],"openness,":[11],"decentralization,":[12],"and":[13,23,47,97,112],"plaintext":[14],"connections.":[15],"created":[17],"a":[18],"misbehavior-score":[19,137],"mechanism":[20],"for":[21,58,108,119],"monitoring":[22],"tracking":[24],"peer":[25],"misconduct.":[26],"In":[27],"this":[28,35,126],"paper,":[29],"we":[30,72,140],"uncover":[31],"several":[32],"vulnerabilities":[33,134],"of":[34,93,117],"mechanism,":[36],"leading":[37],"potential":[39],"Bitcoin-Message-based":[40],"Denial-of-Service":[41],"(BitMsg-DoS)":[42],"on":[44,95],"nodes":[46,64,111],"Slander":[48,164],"by":[50,61,104],"maligning":[51],"innocent":[52],"nodes.":[53,121],"We":[54],"prototype":[55],"these":[56,124],"our":[59,76],"experiments":[60],"testing":[62],"real":[63],"connected":[65],"the":[67,79,88,114,132,136,142,152,163],"main":[69,81],"(while":[71],"do":[73],"not":[74],"exfiltrate":[75],"real-world":[80],"network).":[82],"experimental":[84,149],"results":[85],"show":[86],"that":[87],"exert":[90],"varying":[91],"degrees":[92],"impact":[94],"mining":[96,102,110],"non-mining":[98,120],"nodes,":[99],"notably":[100],"reducing":[101],"rates":[103],"up":[105],"half":[107],"affected":[109],"decreasing":[113],"synchronization":[115],"speed":[116],"blocks":[118],"To":[122],"address":[123],"drawbacks,":[125],"study":[127],"proposes":[128],"corresponding":[129],"countermeasures":[130],"targeting":[131],"identified":[133],"in":[135,151,161],"mechanism.":[138],"Furthermore,":[139],"explore":[141],"Peer-to-Peer":[143],"(P2P)":[144],"encrypted":[145],"transport":[146],"protocol":[147],"with":[148],"support":[150],"latest":[153],"Core":[155],"26.0,":[156],"but":[157],"find":[158],"it":[159],"insufficient":[160],"mitigating":[162],"attacks.":[165]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
