{"id":"https://openalex.org/W4387429264","doi":"https://doi.org/10.1186/s42400-023-00182-9","title":"Evicting and filling attack for linking multiple network addresses of Bitcoin nodes","display_name":"Evicting and filling attack for linking multiple network addresses of Bitcoin nodes","publication_year":2023,"publication_date":"2023-10-07","ids":{"openalex":"https://openalex.org/W4387429264","doi":"https://doi.org/10.1186/s42400-023-00182-9"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-023-00182-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00182-9","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00182-9","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00182-9","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102564963","display_name":"Huashuang Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huashuang Yang","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110292528","display_name":"Jinqiao Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinqiao Shi","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102807148","display_name":"Yue Gao","orcid":"https://orcid.org/0009-0003-6302-2194"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yue Gao","raw_affiliation_strings":["Tsinghua University, Beijing, 100084, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, 100084, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066857796","display_name":"Xuebin Wang","orcid":"https://orcid.org/0000-0002-0809-6014"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuebin Wang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102319542","display_name":"Yanwei Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanwei Sun","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068447061","display_name":"Ruisheng Shi","orcid":"https://orcid.org/0000-0003-2490-6934"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruisheng Shi","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101880222","display_name":"Dongbin Wang","orcid":"https://orcid.org/0000-0002-8290-1376"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongbin Wang","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5102807148"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":1.3565,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.85630667,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":"6","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9829999804496765,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7246307134628296},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6845995187759399},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6550570130348206},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5848316550254822},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.5670456886291504},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.43299150466918945},{"id":"https://openalex.org/keywords/sybil-attack","display_name":"Sybil attack","score":0.4220532774925232},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.41157642006874084},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.4107131361961365},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.12143772840499878},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08592173457145691},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08531129360198975}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7246307134628296},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6845995187759399},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6550570130348206},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5848316550254822},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.5670456886291504},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.43299150466918945},{"id":"https://openalex.org/C2777505653","wikidata":"https://www.wikidata.org/wiki/Q4470796","display_name":"Sybil attack","level":3,"score":0.4220532774925232},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.41157642006874084},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.4107131361961365},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.12143772840499878},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08592173457145691},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08531129360198975},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-023-00182-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00182-9","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00182-9","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ef3405e3223943a6a2d95bedfb4ae597","is_oa":true,"landing_page_url":"https://doaj.org/article/ef3405e3223943a6a2d95bedfb4ae597","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 6, Iss 1, Pp 1-20 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-023-00182-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00182-9","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00182-9","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4387429264.pdf"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W154851090","https://openalex.org/W1454642304","https://openalex.org/W1879677957","https://openalex.org/W1988699025","https://openalex.org/W2022932831","https://openalex.org/W2072266282","https://openalex.org/W2127612127","https://openalex.org/W2755153065","https://openalex.org/W2791124241","https://openalex.org/W2889004650","https://openalex.org/W3005879580","https://openalex.org/W3111243266","https://openalex.org/W3138536154","https://openalex.org/W3209085765","https://openalex.org/W3214441905","https://openalex.org/W4283691828"],"related_works":["https://openalex.org/W2340192855","https://openalex.org/W2741062270","https://openalex.org/W2326507185","https://openalex.org/W4378651134","https://openalex.org/W2165491783","https://openalex.org/W2783409857","https://openalex.org/W2993833576","https://openalex.org/W2318209665","https://openalex.org/W2352722562","https://openalex.org/W2949755366"],"abstract_inverted_index":{"Abstract":[0],"Bitcoin":[1,71,76,249,273],"is":[2,266],"a":[3,82,215],"decentralized":[4],"P2P":[5],"cryptocurrency.":[6],"It":[7],"supports":[8],"users":[9],"to":[10,17,40,124,167,269],"use":[11,109],"pseudonyms":[12],"instead":[13],"of":[14,75,137,146,192,206,255,281,290],"network":[15,29,38,47,56,66,211],"addresses":[16,77,86,97,110,129,136,191],"send":[18],"and":[19,78,87,121,130,162,173,183,219,233,244,257,275,287],"receive":[20],"transactions":[21,89,132],"at":[22],"the":[23,37,46,54,73,92,119,126,138,144,158,169,179,193,207,226,230,264,279,284],"data":[24],"layer,":[25],"hiding":[26],"users\u2019":[27],"real":[28,248],"identities.":[30],"Traditional":[31],"transaction":[32,44],"tracing":[33],"attack":[34,60,123,142,217,222,231,238,265],"cuts":[35],"through":[36,224],"layer":[39,67],"directly":[41],"associate":[42],"each":[43],"with":[45,196],"address":[48],"that":[49,228,263],"issued":[50],"it,":[51],"thus":[52],"revealing":[53],"sender\u2019s":[55],"identity.":[57],"But":[58],"this":[59,115,237,291],"can":[61,107,156,199],"be":[62,81,200],"mitigated":[63],"by":[64],"Bitcoin\u2019s":[65,147],"privacy":[68],"protections.":[69],"Since":[70],"protects":[72],"unlinkability":[74],"there":[79],"may":[80],"many-to-one":[83],"relationship":[84],"between":[85,128,171,181],"nodes,":[88],"sent":[90,133],"from":[91,102,134],"same":[93,139,194,208],"node":[94,112,195],"via":[95],"different":[96,103,135,190,210],"are":[98,205],"seen":[99],"as":[100,111,176,178],"coming":[101],"nodes":[104,243,246],"because":[105],"attackers":[106],"only":[108],"identifiers.":[113],"In":[114,152],"paper,":[116],"we":[117,261],"proposed":[118,288],"evicting":[120,174],"filling":[122,184],"expose":[125],"correlations":[127],"cluster":[131],"node.":[140],"The":[141],"exploited":[143],"unisolation":[145],"incoming":[148,172],"connection":[149,160,164],"processing":[150],"mechanism.":[151],"particular,":[153],"an":[154,252],"attacker":[155],"utilize":[157],"shared":[159],"pool":[161],"deterministic":[163],"eviction":[165],"strategy":[166],"infer":[168],"correlation":[170,180],"connections,":[175],"well":[177],"releasing":[182],"connections.":[185],"Based":[186],"on":[187,239],"inferred":[188],"results,":[189],"these":[197],"connections":[198],"linked":[201],"together,":[202],"whether":[203],"they":[204],"or":[209],"types.":[212],"We":[213,235,277],"designed":[214],"multi-step":[216],"procedure,":[218],"set":[220],"reasonable":[221],"parameters":[223],"analyzing":[225],"factors":[227],"affect":[229],"efficiency":[232],"accuracy.":[234],"mounted":[236],"both":[240],"our":[241],"self-run":[242],"multi-address":[245],"in":[247],"network,":[250],"achieving":[251],"average":[253],"accuracy":[254],"96.9%":[256],"82%,":[258],"respectively.":[259],"Furthermore,":[260],"found":[262],"also":[267],"applicable":[268],"Zcash,":[270],"Litecoin,":[271],"Dogecoin,":[272],"Cash,":[274],"Dash.":[276],"analyzed":[278],"cost":[280],"network-wide":[282],"attacks,":[283],"application":[285],"scenario,":[286],"countermeasures":[289],"attack.":[292]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
