{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T22:18:11Z","timestamp":1771366691495,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:00:00Z","timestamp":1659484800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:00:00Z","timestamp":1659484800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s12083-022-01360-1","type":"journal-article","created":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T22:02:43Z","timestamp":1659564163000},"page":"2430-2443","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Revisiting FAW attack in an imperfect PoW blockchain system"],"prefix":"10.1007","volume":"15","author":[{"given":"Haoran","family":"Zhu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2975-8857","authenticated-orcid":false,"given":"Xiaolin","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Jelena","family":"Mi\u0161i\u0107","sequence":"additional","affiliation":[]},{"given":"Vojislav B.","family":"Mi\u0161i\u0107","sequence":"additional","affiliation":[]},{"given":"Runkai","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,3]]},"reference":[{"key":"1360_CR1","unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system.\u00a0Decentralized Bus Rev 21260"},{"key":"1360_CR2","unstructured":"https:\/\/ethereum.org\/en\/. Accessed Oct\u00a02021"},{"key":"1360_CR3","doi-asserted-by":"crossref","unstructured":"Kwon Y, Kim D, Son Y, Vasserman E, Kim Y (2017)\u00a0Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin. ACM CCS 2017, Dallas, TX, USA, pp 195\u2013209","DOI":"10.1145\/3133956.3134019"},{"key":"1360_CR4","unstructured":"Rosenfeld M (2014) Analysis of hashrate-based double spending,\u201d arXiv preprint arXiv:1402.2009"},{"key":"1360_CR5","first-page":"436","volume":"2014","author":"I Eyal","year":"2014","unstructured":"Eyal I, Sirer EG (2014) Majority Is Not Enough: Bitcoin Mining Is Vulnerable, Financial Cryptography,\u00a0Berlin. Heidelberg 2014:436\u2013454","journal-title":"Heidelberg"},{"key":"1360_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101956","volume":"97","author":"R Yang","year":"2020","unstructured":"Yang R, Chang X, Misic J, Misic V (2020) Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views. Comput Secur 97:101956","journal-title":"Comput Secur"},{"key":"1360_CR7","doi-asserted-by":"crossref","unstructured":"Ke J, Jiang H, Song X, Zhao S, Wang H, Xu Q (2018)\u00a0Analysis on the Block Reward of Fork After Withholding (FAW),\u201d NSysS 2018, Dhaka, Bangladesh, December 2018. pp 16\u201331","DOI":"10.1007\/978-3-030-02744-5_2"},{"key":"1360_CR8","unstructured":"Courtois NT, Bahack L (2014) On subversive miner strategies and block withholding attack in bitcoin digital currency\u201d. arXiv preprint arXiv:1402.1718"},{"key":"1360_CR9","doi-asserted-by":"crossref","unstructured":"Yang R, Chang X, Mi\u0161i\u0107 J, Mi\u0161i\u0107 VB, Kang H (2021)\u00a0On Selfholding Attack Impact on Imperfect PoW Blockchain Networks. IEEE Trans Netw Sci Eng","DOI":"10.1109\/TNSE.2021.3103558"},{"key":"1360_CR10","unstructured":"https:\/\/tokenview.com\/en\/minePoolList. Accessed Oct\u00a02021"},{"key":"1360_CR11","unstructured":"https:\/\/btc.com\/stats\/pool?pool_mode=year. Accessed Oct\u00a02021"},{"key":"1360_CR12","unstructured":"https:\/\/etherscan.io\/stat\/miner\/1?range=7&blocktype=blocks. Accessed Oct\u00a02021"},{"key":"1360_CR13","unstructured":"Buterin V (2014) A next-generation smart contract and decentralized application platform,\u201d white paper. 3(37)"},{"key":"1360_CR14","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1016\/j.future.2017.08.020","volume":"107","author":"X Li","year":"2020","unstructured":"Li X, Jiang P, Chen T, Luo X, Wen Q (2020) A survey on the security of blockchain systems. Future Gener Comput Syst 107:841\u2013853","journal-title":"Future Gener Comput Syst"},{"issue":"3","key":"1360_CR15","doi-asserted-by":"publisher","first-page":"1977","DOI":"10.1109\/COMST.2020.2975999","volume":"22","author":"M Saad","year":"2020","unstructured":"Saad M, Spaulding J, Njilla L, Kamhoua C, Shetty S, Nyang D, Mohaisen D (2020) Exploring the Attack Surface of Blockchain: A Comprehensive Survey. IEEE Commun Surv Tutorials 22(3):1977\u20132008","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"10","key":"1360_CR16","doi-asserted-by":"publisher","first-page":"10288","DOI":"10.1109\/JIOT.2020.3004273","volume":"7","author":"E Zaghloul","year":"2020","unstructured":"Zaghloul E, Li T, Mutka M, Ren J (2020) Bitcoin and Blockchain: Security and Privacy. IEEE Internet Things J 7(10):10288\u201310313","journal-title":"IEEE Internet Things J"},{"key":"1360_CR17","doi-asserted-by":"crossref","unstructured":"Chen H, Pendleton M, Njilla L, Xu S (2020)\u00a0A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defense. ACM Comput Surv 53(3):67:1\u201367:43","DOI":"10.1145\/3391195"},{"key":"1360_CR18","doi-asserted-by":"crossref","unstructured":"Chang SY, Park Y, Wuthier S, Chen CW (2019)\u00a0Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners. ACNS 241\u2013258","DOI":"10.1007\/978-3-030-21568-2_12"},{"key":"1360_CR19","doi-asserted-by":"crossref","unstructured":"Gao S, Li Z, Peng Z, Xiao B (2019)\u00a0Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System. CCS 833\u2013850","DOI":"10.1145\/3319535.3354203"},{"issue":"3","key":"1360_CR20","doi-asserted-by":"publisher","first-page":"3079","DOI":"10.1109\/TNSM.2021.3073414","volume":"18","author":"H Kang","year":"2021","unstructured":"Kang H, Chang X, Yang R, Mi\u0161i\u0107 J, Mi\u0161i\u0107 VB (2021) Understanding selfish mining in imperfect bitcoin and ethereum networks with extended forks. IEEE Trans Netw Service Manag 18(3):3079\u20133091","journal-title":"IEEE Trans Netw Service Manag"},{"key":"1360_CR21","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.peva.2016.07.001","volume":"104","author":"J G\u00f6bel","year":"2016","unstructured":"G\u00f6bel J, Keeler H, Krzesinski A, Taylor P (2016) Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay. Perform Evaluation 104:23\u201341","journal-title":"Perform Evaluation"},{"key":"1360_CR22","doi-asserted-by":"crossref","unstructured":"Carlsten M, Kalodner H, Weinberg SM, Narayanan A (2016)\u00a0On the Instability of Bitcoin Without the Block Reward. CCS 154\u2013167","DOI":"10.1145\/2976749.2978408"},{"key":"1360_CR23","doi-asserted-by":"crossref","unstructured":"Ritz F, Zugenmaier A (2018)\u00a0The Impact of Uncle Rewards on Selfish Mining in Ethereum. EuroS&P Workshops 50\u201357","DOI":"10.1109\/EuroSPW.2018.00013"},{"key":"1360_CR24","doi-asserted-by":"crossref","unstructured":"Feng C, Niu J (2019) Selfish Mining in Ethereum. ICDCS 1306\u20131316","DOI":"10.1109\/ICDCS.2019.00131"},{"key":"1360_CR25","doi-asserted-by":"crossref","unstructured":"Misic J, Misic VB, Chang X (2019)\u00a0On Ledger Inconsistency Time in Bitcoin's Blockchain Delivery Network. GLOBECOM 1\u20136","DOI":"10.1109\/GLOBECOM38437.2019.9013943"},{"key":"1360_CR26","unstructured":"https:\/\/www.blockchain.com\/charts\/n-orphaned-blocks. Accessed Oct\u00a02021"},{"key":"1360_CR27","unstructured":"https:\/\/etherchain.org\/charts. Accessed Oct\u00a02021"},{"key":"1360_CR28","unstructured":"https:\/\/www.maplesoft.com\/. Assessed Oct\u00a02021"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01360-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-022-01360-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01360-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,25]],"date-time":"2022-08-25T07:28:59Z","timestamp":1661412539000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-022-01360-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,3]]},"references-count":28,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["1360"],"URL":"https:\/\/doi.org\/10.1007\/s12083-022-01360-1","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,3]]},"assertion":[{"value":"11 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}