{"id":"https://openalex.org/W2604248381","doi":"https://doi.org/10.1515/popets-2017-0028","title":"Hardening Stratum, the Bitcoin Pool Mining Protocol","display_name":"Hardening Stratum, the Bitcoin Pool Mining Protocol","publication_year":2017,"publication_date":"2017-07-01","ids":{"openalex":"https://openalex.org/W2604248381","doi":"https://doi.org/10.1515/popets-2017-0028","mag":"2604248381"},"language":"en","primary_location":{"id":"doi:10.1515/popets-2017-0028","is_oa":true,"landing_page_url":"https://doi.org/10.1515/popets-2017-0028","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2017/3/article-p57.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://content.sciendo.com/downloadpdf/journals/popets/2017/3/article-p57.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013297791","display_name":"Ruben Recabarren","orcid":null},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ruben Recabarren","raw_affiliation_strings":["Florida Int\u2019l University , Miami , FL 33199"],"affiliations":[{"raw_affiliation_string":"Florida Int\u2019l University , Miami , FL 33199","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070758536","display_name":"Bogdan C\u0103rbunar","orcid":"https://orcid.org/0000-0002-4950-9751"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bogdan Carbunar","raw_affiliation_strings":["Florida Int\u2019l University , Miami , FL 33199"],"affiliations":[{"raw_affiliation_string":"Florida Int\u2019l University , Miami , FL 33199","institution_ids":["https://openalex.org/I19700959"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5013297791"],"corresponding_institution_ids":["https://openalex.org/I19700959"],"apc_list":null,"apc_paid":null,"fwci":10.6188,"has_fulltext":false,"cited_by_count":48,"citation_normalized_percentile":{"value":0.98172145,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"2017","issue":"3","first_page":"57","last_page":"74"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.9810000061988831,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9729999899864197,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6730285882949829},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6086763143539429},{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.5986635088920593},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5637032985687256},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5339182019233704},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5065604448318481},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4288642406463623},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4248563051223755},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4172956049442291}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6730285882949829},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6086763143539429},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.5986635088920593},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5637032985687256},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5339182019233704},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5065604448318481},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4288642406463623},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4248563051223755},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4172956049442291},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/popets-2017-0028","is_oa":true,"landing_page_url":"https://doi.org/10.1515/popets-2017-0028","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2017/3/article-p57.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:0d6e566fcfd74774a81caa24e1ce98d7","is_oa":true,"landing_page_url":"https://doaj.org/article/0d6e566fcfd74774a81caa24e1ce98d7","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings on Privacy Enhancing Technologies, Vol 2017, Iss 3, Pp 57-74 (2017)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/popets-2017-0028","is_oa":true,"landing_page_url":"https://doi.org/10.1515/popets-2017-0028","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2017/3/article-p57.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6100000143051147,"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2604248381.pdf","grobid_xml":"https://content.openalex.org/works/W2604248381.grobid-xml"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W154851090","https://openalex.org/W346087624","https://openalex.org/W1454642304","https://openalex.org/W1589846406","https://openalex.org/W1851144268","https://openalex.org/W1879677957","https://openalex.org/W1907293129","https://openalex.org/W2013686672","https://openalex.org/W2022932831","https://openalex.org/W2043007983","https://openalex.org/W2057248704","https://openalex.org/W2070670160","https://openalex.org/W2127612127","https://openalex.org/W2473007119","https://openalex.org/W2520539619","https://openalex.org/W2950226614","https://openalex.org/W2950744594"],"related_works":["https://openalex.org/W4366411693","https://openalex.org/W3211641817","https://openalex.org/W3164717803","https://openalex.org/W4389915954","https://openalex.org/W3123387860","https://openalex.org/W3109867883","https://openalex.org/W4291291739","https://openalex.org/W4321377877","https://openalex.org/W2915579847","https://openalex.org/W2907143025"],"abstract_inverted_index":{"Abstract":[0],"Stratum,":[1],"the":[2,48,155,166,177,193,211,229],"de-facto":[3],"mining":[4,22,42,55,160,167,208,248],"communication":[5],"protocol":[6,205],"used":[7],"by":[8,89],"blockchain":[9],"based":[10],"cryptocurrency":[11],"systems,":[12],"enables":[13],"miners":[14],"to":[15,34,72,104,125,141,221],"reliably":[16],"and":[17,37,51,61,91,106,157,164,179,185,200,213],"efficiently":[18],"fetch":[19],"jobs":[20],"from":[21,189,207,250],"pool":[23,178,244],"servers.":[24],"In":[25],"this":[26],"paper":[27],"we":[28,102,146],"exploit":[29],"Stratum\u2019s":[30],"lack":[31],"of":[32,54,159,203,239],"encryption":[33,119],"develop":[35,80],"passive":[36],"active":[38,83,222],"attacks":[39,112,199,223],"on":[40,47,98,241],"Bitcoin\u2019s":[41],"protocol,":[43],"with":[44,176],"important":[45],"implications":[46],"privacy,":[49],"security":[50,158],"even":[52,76,137,224],"safety":[53],"equipment":[56,209],"owners.":[57],"We":[58,79,95,162,195,215],"introduce":[59,163],"StraTap":[60],"ISP":[62],"Log":[63],"attacks,":[64],"that":[65,85,114,153,172,186,217,246],"infer":[66],"miner":[67,73,135,174],"earnings":[68,136],"if":[69],"given":[70,139],"access":[71,140],"communications,":[74],"or":[75,191],"their":[77,92],"logs.":[78],"BiteCoin,":[81],"an":[82,131,226],"attack":[84],"hijacks":[86],"shares":[87,175],"submitted":[88],"miners,":[90],"associated":[93],"payouts.":[94],"build":[96],"BiteCoin":[97],"WireGhost,":[99],"a":[100,149,170,236,242],"tool":[101],"developed":[103],"hijack":[105],"surreptitiously":[107],"maintain":[108],"Stratum":[109,116,151,204],"connections.":[110],"Our":[111],"reveal":[113],"securing":[115],"through":[117],"pervasive":[118],"is":[120,219],"not":[121],"only":[122,142],"undesirable":[123],"(due":[124],"large":[126],"overheads),":[127],"but":[128],"also":[129],"ineffective:":[130],"adversary":[132,227],"can":[133],"predict":[134],"when":[138,225],"packet":[143],"timestamps.":[144],"Instead,":[145],"devise":[147],"Bedrock,":[148],"minimalistic":[150],"extension":[152],"protects":[154],"privacy":[156],"participants.":[161],"leverage":[165],"cookie":[168],"concept,":[169],"secret":[171],"each":[173],"includes":[180],"in":[181,210],"its":[182],"puzzle":[183],"computations,":[184],"prevents":[187],"attackers":[188],"reconstructing":[190],"hijacking":[192],"puzzles.":[194],"have":[196],"implemented":[197],"our":[198],"collected":[201],"138MB":[202],"traffic":[206,249],"US":[212],"Venezuela.":[214],"show":[216],"Bedrock":[218,234],"resilient":[220],"breaks":[228],"crypto":[230],"constructs":[231],"it":[232],"uses.":[233],"imposes":[235],"daily":[237],"overhead":[238],"12.03s":[240],"single":[243],"server":[245],"handles":[247],"16,000":[251],"miners.":[252]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":6}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
