{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T08:04:29Z","timestamp":1771661069738,"version":"3.50.1"},"publisher-location":"Cham","reference-count":54,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030801281","type":"print"},{"value":"9783030801298","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80129-8_50","type":"book-chapter","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T09:04:22Z","timestamp":1625475862000},"page":"722-742","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Security in Distributed Ledger Technology: An Analysis of Vulnerabilities and Attack Vectors"],"prefix":"10.1007","author":[{"given":"Efthimios-Enias","family":"Gojka","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Niclas","family":"Kannengie\u00dfer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Benjamin","family":"Sturm","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jan","family":"Bartsch","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ali","family":"Sunyaev","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"50_CR1","doi-asserted-by":"crossref","unstructured":"Kannengie\u00dfer, N., Lins, S., Dehling, T., Sunyaev, A.: Trade-offs between distributed ledger technology characteristics. ACM Comput. Surv. 53(2), 1\u201337 (2020)","DOI":"10.1145\/3379463"},{"key":"50_CR2","unstructured":"Lin, I.-C., Liao, T.-C.: A survey of blockchain security issues and challenges. In: 18th International Conference on Evaluation and Assessment in Software Engineering, pp. 653\u2013659. London, UK (2014)"},{"key":"50_CR3","unstructured":"Voell, Z.: Ethereum Classic Hit by Third 51% Attack in a Month. https:\/\/www.coindesk.com\/ethereum-classic-blockchain-subject-to-yet-another-51-attack. Accessed on 30 Dec 2020"},{"key":"50_CR4","unstructured":"Canellis, D.: Bitcoin Gold hit by 51% attacks, $72K in cryptocurrency double-spent. https:\/\/thenextweb.com\/hardfork\/2020\/01\/27\/bitcoin-gold-51-percent-attack-blockchain-reorg-cryptocurrency-binance-exchange\/. Accessed on 27 01 2020"},{"key":"50_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/978-3-319-56614-6_22","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2017","author":"R Pass","year":"2017","unstructured":"Pass, R., Seeman, L., Shelat, A.: Analysis of the blockchain protocol in asynchronous networks. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10211, pp. 643\u2013673. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-56614-6_22"},{"key":"50_CR6","unstructured":"Kiayias, A., Panagiotakos, G.: Speed-Security Tradeoffs in Blockchain Protocols. IACR Cryptology ePrint Archive 2015(1019) (2015)"},{"key":"50_CR7","doi-asserted-by":"crossref","unstructured":"Aoki, Y., Otsuki, K., Kaneko, T., Banno, R., Shudo, K.: SimBlock: a blockchain network simulator. In: IEEE INFOCOM: IEEE Conference on Computer Communications Workshops, pp. 325\u2013329. Paris, France (2019)","DOI":"10.1109\/INFCOMW.2019.8845253"},{"key":"50_CR8","doi-asserted-by":"crossref","unstructured":"Tosh, D.K., Shetty, S., Liang, X., Kamhoua, C.A., Kwiat, K.A., Njilla, L.: Security implications of blockchain cloud with analysis of block withholding attack. In: 17th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 458\u2013467. Madrid, Spain (2017)","DOI":"10.1109\/CCGRID.2017.111"},{"key":"50_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1007\/978-3-319-70697-9_14","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"R Pass","year":"2017","unstructured":"Pass, R., Shi, E.: The sleepy model of consensus. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10625, pp. 380\u2013409. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70697-9_14"},{"key":"50_CR10","doi-asserted-by":"crossref","unstructured":"Karame, G.: On the security and scalability of bitcoin's blockchain. In: ACM Conference on Computer and Communications Security, pp. 1861\u20131862. Vienna, Austria (2016)","DOI":"10.1145\/2976749.2976756"},{"key":"50_CR11","doi-asserted-by":"crossref","unstructured":"Kiffer, L., Rajaraman, R., Shelat, A.: A better method to analyze blockchain consistency. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 729\u2013744, Toronto, Canada (2018)","DOI":"10.1145\/3243734.3243814"},{"key":"50_CR12","doi-asserted-by":"crossref","unstructured":"Smetanin, S., Ometov, A., Kannengie\u00dfer, N., Sturm, B., Komarov, M., Sunyaev, A.: Modeling of distributed ledgers: challenges and future perspectives. In: 22nd IEEE International Conference on Business Informatics. Antwerp, Belgium (2020)","DOI":"10.1109\/CBI49978.2020.00025"},{"key":"50_CR13","doi-asserted-by":"crossref","unstructured":"Eyal, I., G\u00fcn Sirer, E.: Majority is not enough; bitcoin mining is vulnerable. In: International Conference on Financial Cryptography and Data Security, pp. 463\u2013454. Christ Church, Barbados (2014)","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"50_CR14","unstructured":"Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin's peer-to-peer network. In: 24th USENIX Security Symposium, pp. 129\u2013144, Washington, D.C., USA (2015)"},{"key":"50_CR15","doi-asserted-by":"crossref","unstructured":"Gervais, A., Karame, G.O., W\u00fcst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: ACM Conference on Computer and Communications Security, pp. 3\u201316. Vienna, Austria (2016).","DOI":"10.1145\/2976749.2978341"},{"key":"50_CR16","doi-asserted-by":"publisher","first-page":"28712","DOI":"10.1109\/ACCESS.2019.2901858","volume":"7","author":"E Deirmentzoglou","year":"2019","unstructured":"Deirmentzoglou, E., Papakyriakopoulos, G., Patsakis, C.: A survey on long-range attacks for proof of stake protocols. IEEE Access 7, 28712\u201328725 (2019)","journal-title":"IEEE Access"},{"key":"50_CR17","unstructured":"Buterin, V.: Ethereum: A next generation smart contract & decentralized application platform. https:\/\/blockchainlab.com\/pdf\/Ethereum_white_paper-a_next_generation_smart_contract_and_decentralized_application_platform-vitalik-buterin.pdf. Accessed on 15 March 2020"},{"key":"50_CR18","unstructured":"Popov, S.: The Tangle. https:\/\/www.semanticscholar.org\/paper\/The-tangle-Popov\/feb18bc2793e907e9404ffe36e442162cd2b2688. Accessed on 03 March 2020"},{"key":"50_CR19","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System, https:\/\/bitcoin.org\/bitcoin.pdf. Accessed on 02 Jan 2020"},{"key":"50_CR20","unstructured":"Ethereum: Ethereum Proof of Stake FAQ. https:\/\/eth.wiki\/en\/concepts\/proof-of-stake-faqs. Accessed 03 Oct 2020"},{"key":"50_CR21","unstructured":"Decentralized Systems Lab: Fake Stake attacks on chain-based Proof-of-Stake cryptocurrencies. Medium, 22 Jan. (2019). Accessed on 144 March 2020"},{"key":"50_CR22","unstructured":"Bitcointalk: Best practice for fast transaction acceptance - how high is the risk?. https:\/\/bitcointalk.org\/index.php?topic=3441.msg48384. Accessed on 14 March 2020"},{"key":"50_CR23","doi-asserted-by":"crossref","unstructured":"Wohlin, C.: Guidelines for snowballing in systematic literature studies and a replication in software engineering. In: 18th International Conference on Evaluation and Assessment in Software Engineering, pp. 1\u201310. London, UK (2014)","DOI":"10.1145\/2601248.2601268"},{"key":"50_CR24","unstructured":"Baliga, A., Understanding Blockchain Consensus Models. https:\/\/www.persistent.com\/wp-content\/uploads\/2018\/02\/wp-understanding-blockchain-consensus-models.pdf. Accessed on 03 April 2020"},{"key":"50_CR25","unstructured":"Frankenfield, J.: Consensus Mechanism (Cryptocurrency). https:\/\/www.investopedia.com\/terms\/c\/consensus-mechanism-cryptocurrency.asp. Accessed on 18 Nov 2019"},{"issue":"2","key":"50_CR26","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270\u2013299 (1984)","journal-title":"J. Comput. Syst. Sci."},{"key":"50_CR27","doi-asserted-by":"crossref","unstructured":"Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Pychol. 3(2), 77\u2013101 (2006)","DOI":"10.1191\/1478088706qp063oa"},{"key":"50_CR28","unstructured":"Bahack, L.: Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft). http:\/\/arxiv.org\/pdf\/1312.7013v1. Accessed on 03 March 2020"},{"issue":"8","key":"50_CR29","doi-asserted-by":"publisher","first-page":"1967","DOI":"10.1109\/TIFS.2016.2623588","volume":"12","author":"S Bag","year":"2017","unstructured":"Bag, S., Ruj, S., Sakurai, K.: Bitcoin block withholding attack: analysis and mitigation. IEEE Trans. Inf. Forensics Secur. 12(8), 1967\u20131978 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"50_CR30","doi-asserted-by":"crossref","unstructured":"Conti, M., Sandeep Kumar, E., Lal, C., Ruj, S.: A survey on security and privacy issues of bitcoin. IEEE Commun. Surv. Tutor. 20(4), 3416\u20133452 (2018)","DOI":"10.1109\/COMST.2018.2842460"},{"key":"50_CR31","doi-asserted-by":"crossref","unstructured":"Karame, G.O., Androulaki, E., Capkun, S.: Double-spending fast payments in Bitcoin. In: ACM Conference on Computer and Communications Security, pp. 906\u2013917. Raleigh, NC, USA (2012)","DOI":"10.1145\/2382196.2382292"},{"key":"50_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-319-63688-7_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2017","author":"A Kiayias","year":"2017","unstructured":"Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: A provably secure proof-of-stake blockchain protocol. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10401, pp. 357\u2013388. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63688-7_12"},{"key":"50_CR33","doi-asserted-by":"crossref","unstructured":"de Roode, G., Ullah, I., Havinga, P.J.M.: How to break IOTA heart by replaying? In: IEEE Global Communications Conference, Abu Dhabi, UAE (2018)","DOI":"10.1109\/GLOCOMW.2018.8644437"},{"key":"50_CR34","unstructured":"Rebstock, J.: Replay Attacks in IOTA. https:\/\/github.com\/joseph14\/iota-transaction-spammer-webapp\/blob\/master\/replay%20attack.md. Accessed on 15 March 2020"},{"key":"50_CR35","unstructured":"Gate.io: ETC 51% Attack Successful. https:\/\/www.gate.io\/article\/16735 Accessed on 02 Feb 2020"},{"key":"50_CR36","doi-asserted-by":"crossref","unstructured":"Niu, J., Feng, C.: Selfish mining in Ethereum. In: IEEE International Conference on Distributed Computing, Dallas, TX, USA (2019)","DOI":"10.1109\/ICDCS.2019.00131"},{"key":"50_CR37","doi-asserted-by":"crossref","unstructured":"Nayak, K., Kumar, S., Miller, A., Shi, E.: Stubborn mining: generalizing selfish mining and combining with an eclipse attack. In: IEEE European Symposium on Security and Privacy, pp. 305\u2013320. Saarbrucken, Germany (2016)","DOI":"10.1109\/EuroSP.2016.32"},{"key":"50_CR38","doi-asserted-by":"crossref","unstructured":"Zhang, S., Lee, J.-H.: Eclipse-based stake-bleeding attacks in PoS blockchain systems. In: ACM International Symposium on Blockchain and Secure Critical Infrastructure, pp. 67\u201372. Auckland, New Zealand (2019)","DOI":"10.1145\/3327960.3332391"},{"key":"50_CR39","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Juels, A.: Proofs of work and bread pudding protocols. In: Joint Working Conference on Secure Information Networks: Communications and Multimedia Security, pp. 258\u2013272. Leuven, Belgium (1999)","DOI":"10.1007\/978-0-387-35568-9_18"},{"key":"50_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"JR Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251\u2013260. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45748-8_24"},{"key":"50_CR41","unstructured":"Natoli, C., Gramoli, V.: The Balance Attack Against Proof-Of-Work Blockchains: The R3 Testbed as an Example. http:\/\/arxiv.org\/pdf\/1612.09426v1 Accessed on 06 March 2020"},{"key":"50_CR42","doi-asserted-by":"crossref","unstructured":"Apostolaki, M., Zohar, A., Vanbever, L.: hijacking bitcoin: routing attacks on cryptocurrencies. In: IEEE Symposium on Security and Privacy, pp. 375\u2013392. San Jose, CA, USA (2017)","DOI":"10.1109\/SP.2017.29"},{"key":"50_CR43","unstructured":"Marcus, Y., Heilman, E., Goldberg, S.: Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network (2018)"},{"key":"50_CR44","doi-asserted-by":"crossref","unstructured":"Andola, N., Raghav, Gogoi, M., Venkatesan, S., Verma, S.: Vulnerabilities on hyperledger fabric. Pervasive Mobile Comput. 59, 101050 (2019)","DOI":"10.1016\/j.pmcj.2019.101050"},{"key":"50_CR45","unstructured":"LaurentMT: Bitcoin \u2019spam attack\u2019 stressed network for at least 18 months. https:\/\/medium.com\/@laurentmt\/good-whalehunting-d3cc3861bd6b. Accessed on 05 June 2020"},{"key":"50_CR46","doi-asserted-by":"crossref","unstructured":"Ekparinya, P., Gramoli, V., Jourjon, G.: Impact of man-in-the-middle attacks on ethereum. In: 37th Symposium on Reliable Distributed Systems, pp. 11\u201320. Salvador, Brazil (2018)","DOI":"10.1109\/SRDS.2018.00012"},{"key":"50_CR47","unstructured":"Lee, S., Kim, S.: Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment. IACR Cryptology ePrint Archive (2019)"},{"key":"50_CR48","doi-asserted-by":"crossref","unstructured":"Azouvi, S., Danezis, G., Nikolaenko, V.: Winkle - Foiling Long-Range Attacks in Proof-of-Stake Systems. IACR Cryptology ePrint Archive (2019)","DOI":"10.1145\/3419614.3423260"},{"key":"50_CR49","doi-asserted-by":"crossref","unstructured":"Swathi, P., Modi, C., Patel, D.: Preventing sybil attack in blockchain using distributed behavior monitoring of miners. In: 10th International Conference on Computing. Communication and Networking Technologies, pp. 1\u20136. Kanpur, India (2019)","DOI":"10.1109\/ICCCNT45670.2019.8944507"},{"key":"50_CR50","doi-asserted-by":"crossref","unstructured":"Gervais, A., Ritzdorf, H., Karame, G.O., Capkun, S.: Tampering with the delivery of blocks and transactions in bitcoin. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 692\u2013705. Denver, Colorado, USA (2015)","DOI":"10.1145\/2810103.2813655"},{"key":"50_CR51","unstructured":"LeMahieu, C.: Nano: A Feeless Distributed Cryptocurrency Network. https:\/\/nano.org\/media\/Nano_Whitepaper_en.pdf. Accessed on 12 June 2020"},{"key":"50_CR52","doi-asserted-by":"crossref","unstructured":"Yang, X., Chen, Y., Chen, X.: Effective scheme against 51% attack on proof-of-work blockchain with history weighted information. In: IEEE International Conference on Blockchain, pp. 261\u2013265. Atlanta, GA, USA (2019)","DOI":"10.1109\/Blockchain.2019.00041"},{"key":"50_CR53","doi-asserted-by":"crossref","unstructured":"Fan, B., Andersen, D.G., Kaminsky, M., Mitzenmacher, M.D.: Cuckoo filter: practically better than bloom. In: 10th ACM International on Conference on Emerging Networking Experiments and Technologies, pp. 75\u201388. Sydney, Australia (2014)","DOI":"10.1145\/2674005.2674994"},{"key":"50_CR54","unstructured":"Grash\u00f6fer, J., Jacob, F., Hartenstein, H.: Towards application of cuckoo filters in network security monitoring. In: 14th International Conference on Network and Service Management, pp. 373\u2013377. Rome, Italy (2018)"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80129-8_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:13:53Z","timestamp":1771658033000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80129-8_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030801281","9783030801298"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80129-8_50","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"6 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}