{"id":"https://openalex.org/W2402902802","doi":"https://doi.org/10.5220/0005245600980105","title":"On Detection of Bitcoin Mining Redirection Attacks","display_name":"On Detection of Bitcoin Mining Redirection Attacks","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2402902802","doi":"https://doi.org/10.5220/0005245600980105","mag":"2402902802"},"language":"en","primary_location":{"id":"doi:10.5220/0005245600980105","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005245600980105","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0005245600980105","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085287860","display_name":"Nicolas T. Courtois","orcid":"https://orcid.org/0000-0003-0736-431X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Nicolas T. Courtois","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009818520","display_name":"Pinar Emirdag","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Pinar Emirdag","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5006631790","display_name":"Zhouyixing Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhouyixing Wang","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5085287860"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.16072466,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.93535573,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"98","last_page":"105"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.955299973487854,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.9340000152587891,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.7732304334640503},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7412999868392944},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6272566914558411},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5196334719657898},{"id":"https://openalex.org/keywords/ledger","display_name":"Ledger","score":0.5089888572692871},{"id":"https://openalex.org/keywords/currency","display_name":"Currency","score":0.46705448627471924},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4631236493587494},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4439714252948761},{"id":"https://openalex.org/keywords/digital-currency","display_name":"Digital currency","score":0.41620054841041565},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.16043731570243835},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13096165657043457},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08788147568702698}],"concepts":[{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.7732304334640503},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7412999868392944},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6272566914558411},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5196334719657898},{"id":"https://openalex.org/C91302708","wikidata":"https://www.wikidata.org/wiki/Q2732056","display_name":"Ledger","level":2,"score":0.5089888572692871},{"id":"https://openalex.org/C141121606","wikidata":"https://www.wikidata.org/wiki/Q8142","display_name":"Currency","level":2,"score":0.46705448627471924},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4631236493587494},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4439714252948761},{"id":"https://openalex.org/C48220719","wikidata":"https://www.wikidata.org/wiki/Q10836209","display_name":"Digital currency","level":3,"score":0.41620054841041565},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.16043731570243835},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13096165657043457},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08788147568702698},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C556758197","wikidata":"https://www.wikidata.org/wiki/Q580018","display_name":"Monetary economics","level":1,"score":0.0},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0005245600980105","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005245600980105","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0005245600980105","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005245600980105","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4365797016","https://openalex.org/W4399705208","https://openalex.org/W3215635167","https://openalex.org/W4280585582","https://openalex.org/W1950719656","https://openalex.org/W2913682208","https://openalex.org/W4313465241","https://openalex.org/W3194174502","https://openalex.org/W3184163161","https://openalex.org/W2907115098"],"abstract_inverted_index":{"In":[0,13,47,69,175,198],"this":[1,151,166,176],"paper":[2,177],"we":[3,178,200],"study":[4,201,229],"the":[5,86,93,113,126,180,214,223,230,248,253,258],"question":[6,181],"of":[7,66,83,88,95,99,128,144,158,182,194,213,250,257],"centralisation":[8],"in":[9,52,54,92,105,134,150,233],"bitcoin":[10,15,48,67,76,168,215],"digital":[11],"currency.":[12],"theory":[14],"has":[16,28,90],"been":[17],"designed":[18,117],"to":[19,42,56,124,138,162],"be":[20,36,266],"a":[21,96,121,171,183,191],"totally":[22],"decentralized":[23,172],"distributed":[24],"system.":[25,174],"Satoshi":[26],"Nakamoto":[27],"very":[29,245],"clearly":[30],"postulated":[31],"that":[32,156,188,242],"each":[33],"node":[34],"should":[35],"collecting":[37],"recent":[38],"transactions":[39,49,89,131],"and":[40,59,64,85,146,186,263],"trying":[41],"create":[43],"new":[44],"blocks":[45,135],"(Satoshi08).":[46],"are":[50,132,260],"aggregated":[51],"block":[53],"order":[55],"authenticate":[57],"them":[58],"form":[60],"an":[61,108],"official":[62],"ledger":[63],"history":[65],"transactions.":[68],"practice":[70],"as":[71,73],"soon":[72],"expensive":[74],"ASIC":[75],"miners":[77,137,159],"have":[78,228],"replaced":[79],"general-purpose":[80],"hardware,":[81],"production":[82],"bitcoins":[84],"validation":[87],"concentrated":[91],"hands":[94],"smaller":[97],"group":[98],"people.":[100,251],"Then":[101],"at":[102],"some":[103],"moment":[104,167],"early":[106],"2012":[107],"important":[109],"decision":[110,123],"was":[111,116],"taken:":[112],"Stratum":[114,231],"protocol":[115,232],"(Palatinus12)":[118],"which":[119,130,207],"took":[120],"deliberate":[122],"move":[125],"power":[127],"selecting":[129],"included":[133],"from":[136],"pool":[139],"managers.":[140],"The":[141],"growing":[142],"difficulty":[143],"mining":[145,225,237],"large":[147,192],"standard":[148],"deviation":[149],"process":[152],"(Rosenfeld13;":[153],"CourtoisBahack14)":[154],"made":[155],"majority":[157,249],"naturally":[160],"shifted":[161],"pooled":[163],"mining.":[164],"At":[165],"ceased":[169],"being":[170],"democratic":[173],"survey":[179],"51%":[184],"attacks":[185],"show":[187],"there":[189],"is":[190],"variety":[193],"plausible":[195],"attack":[196,205,259],"scenarios.":[197],"particular":[199],"one":[202],"particularly":[203],"subversive":[204,255],"scenario":[206],"depends":[208],"on":[209],"non-trivial":[210],"internal":[211],"details":[212],"hashing":[216],"process.":[217],"How":[218],"does":[219],"it":[220],"compare":[221],"with":[222],"current":[224],"practices?":[226],"We":[227],"four":[234],"popular":[235],"real-life":[236],"configurations.":[238],"Our":[239],"analysis":[240],"shows":[241],"pools":[243],"could":[244,264],"easily":[246],"cheat":[247],"However":[252],"most":[254],"versions":[256],"NOT":[261],"facilitated":[262],"potentially":[265],"detected.":[267]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
