{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:32:11Z","timestamp":1767339131035,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811366208"},{"type":"electronic","value":"9789811366215"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-6621-5_5","type":"book-chapter","created":{"date-parts":[[2019,2,19]],"date-time":"2019-02-19T13:04:38Z","timestamp":1550581478000},"page":"55-72","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["An Overview of Blockchain Security Analysis"],"prefix":"10.1007","author":[{"given":"Hai","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zigang","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,20]]},"reference":[{"key":"5_CR1","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"5_CR2","unstructured":"Zhao, G.: Blockchain: the cornerstone of the value Internet. Publishing House of Electronics Industry, Beijing (2016)"},{"key":"5_CR3","unstructured":"Yang, B., Chen, C.: Blockchain Principle, Design and Application. China Machine Press, Beijing (2017)"},{"issue":"2","key":"5_CR4","first-page":"87","volume":"3","author":"W Fang","year":"2018","unstructured":"Fang, W., Zhang, W., Pan, T., et al.: Cyber security in blockchain: threats and countermeasures. J. Cyber Secur. 3(2), 87\u2013104 (2018)","journal-title":"J. Cyber Secur."},{"key":"5_CR5","unstructured":"Distributed ledger technologies in securities post-trading. https:\/\/www.ecb.europa.eu\/pub\/pdf\/scpops\/ecbop172.en.pdf . Accessed 4 July 2018"},{"key":"5_CR6","unstructured":"IBM News. https:\/\/www.ibm.com\/news\/cn\/zh\/2016\/10\/19\/D468881I72849Y25.html . Accessed 4 July 2018"},{"key":"5_CR7","unstructured":"Benet, J.: IPFS - Content Addressed, Versioned, P2P File System. https:\/\/github.com\/ipfs\/papers\/raw\/master\/ipfs-cap2pfs\/ipfs-p2p-file-system.pdf . Accessed 4 July 2018"},{"key":"5_CR8","unstructured":"RedChain White Paper. https:\/\/cdn.thiwoo.com\/RedChain\/reeed_white.pdf . Accessed 4 July 2018"},{"key":"5_CR9","unstructured":"U Network: A Decentralized Protocol for Publishing and Valuing Online Content. https:\/\/u.network\/U_whitepaper_en.pdf . Accessed 4 July 2018"},{"key":"5_CR10","unstructured":"YOYOW White Paper. https:\/\/yoyow.org\/files\/white-paper3.pdf . Accessed 4 July 2018"},{"key":"5_CR11","unstructured":"BIHU White Paper. https:\/\/home.bihu.com\/whitePaper.pdf . Accessed 4 July 2018"},{"key":"5_CR12","unstructured":"BCSEC Security Trend Analysis. https:\/\/bcsec.org\/analyse . Accessed 4 July 2018"},{"key":"5_CR13","unstructured":"CHAITIN TECH, ConsenSys.: Blockchain Security Guide. https:\/\/chaitin.cn\/cn\/download\/blockchain_security_guide_20180507.pdf . Accessed 4 July 2018"},{"key":"5_CR14","unstructured":"Youbit Files for Bankruptcy After Second Hack This Year. https:\/\/www.ccn.com\/south-korean-exchange-youbit-declares-bankruptcy-after-second-hack-this-year . Accessed 4 July 2018"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Blockchain Security v1. https:\/\/bcsec.org\/report . Accessed 4 July 2018","DOI":"10.1016\/S1353-4858(18)30075-8"},{"key":"5_CR16","unstructured":"GLOBAL DDOS THREAT LANDSCAPE Q3 2017. https:\/\/www.incapsula.com\/ddos-report\/ddos-report-q3-2017.html . Accessed 4 July 2018"},{"key":"5_CR17","unstructured":"Bitfinex Attacked Statement. https:\/\/twitter.com\/bitfinex\/status\/940593291208331264 . Accessed 4 July 2018"},{"key":"5_CR18","unstructured":"MtGox Account Database Leaked. https:\/\/news.ycombinator.com\/item?id=2671612 . Accessed 4 July 2018"},{"key":"5_CR19","unstructured":"LulzSec Rogue Suspected of Bitcoin Hack. https:\/\/www.theguardian.com\/technology\/2011\/jun\/22\/lulzsec-rogue-suspected-of-bitcoin-hack . Accessed 4 July 2018"},{"key":"5_CR20","unstructured":"Bitcoin Trading Platform Mt.Gox Filed for Bankruptcy Protection. http:\/\/www.bbc.com\/zhongwen\/simp\/business\/2014\/02\/140228_bitcoin . Accessed 4 July 2018"},{"key":"5_CR21","unstructured":"Pool Distribution. https:\/\/btc.com\/stats\/pool?pool_mode=month . Accessed 4 July 2018"},{"key":"5_CR22","unstructured":"Smart Contract Wiki. https:\/\/github.com\/EthFans\/wiki\/wiki\/%E6%99%BA%E8%83%BD%E5%90%88%E7%BA%A6 . Accessed 4 July 2018"},{"key":"5_CR23","unstructured":"Parity Security Alert. https:\/\/paritytech.io\/security-alert . Accessed 4 July 2018"},{"key":"5_CR24","unstructured":"Heilman, E., Kendler, A., Zohar, A., et al.: Eclipse attacks on Bitcoin\u2019s peer-to-peer network. In: Usenix Conference on Security Symposium (2015)"},{"key":"5_CR25","unstructured":"BGP Hijack-btc. https:\/\/github.com\/nsg-ethz\/hijack-btc . Accessed 4 July 2018"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Matzutt, R., Hiller, J., Henze, M., et al.: A quantitative analysis of the impact of arbitrary blockchain content on bitcoin. In: 22nd International Conference on Financial Cryptography and Data Security. Springer, Cura\u00e7ao (2018)","DOI":"10.1007\/978-3-662-58387-6_23"},{"key":"5_CR27","unstructured":"Depth Long Text Interpretation of Blockchain and Supervision: \u201crecycling boxes\u201d, \u201cblack boxes\u201d and \u201csandboxes\u201d. https:\/\/www.pintu360.com\/a49882.html?s=87&o=1 . Accessed 4 July 2018"},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. Commun. ACM 61(7), 95\u2013102 (2018)","DOI":"10.1145\/3212998"},{"key":"5_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-662-44774-1_12","volume-title":"Financial Cryptography and Data Security","author":"E Heilman","year":"2014","unstructured":"Heilman, E.: One weird trick to stop selfish miners: fresh bitcoins, a solution for the honest miner (poster abstract). In: B\u00f6hme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 161\u2013162. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44774-1_12"},{"key":"5_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-662-48051-9_9","volume-title":"Financial Cryptography and Data Security","author":"L Valenta","year":"2015","unstructured":"Valenta, L., Rowan, B.: Blindcoin: blinded, accountable mixes for bitcoin. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) FC 2015. LNCS, vol. 8976, pp. 112\u2013126. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48051-9_9"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Bissias, G., Ozisik, A.P., Levine, B.N., et al.: Sybil-resistant mixing for bitcoin. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society. ACM (2015)","DOI":"10.1145\/2665943.2665955"},{"key":"5_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-662-48051-9_10","volume-title":"Financial Cryptography and Data Security","author":"S Meiklejohn","year":"2015","unstructured":"Meiklejohn, S., Orlandi, C.: Privacy-enhancing overlays in bitcoin. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) FC 2015. LNCS, vol. 8976, pp. 127\u2013141. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48051-9_10"},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"Sasson, E.B., Chiesa, A., Garman, C., et al.: Zerocash: decentralized anonymous payments from bitcoin. In: Security and Privacy, pp. 459\u2013474. IEEE (2014)","DOI":"10.1109\/SP.2014.36"}],"container-title":["Communications in Computer and Information Science","Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-6621-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,17]],"date-time":"2019-11-17T09:39:21Z","timestamp":1573983561000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-6621-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811366208","9789811366215"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-6621-5_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"20 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CNCERT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China Cyber Security Annual Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cncert2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conf.cert.org.cn\/English","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}