{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:39:15Z","timestamp":1773931155617,"version":"3.50.1"},"reference-count":204,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1836212"],"award-info":[{"award-number":["U1836212"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872041"],"award-info":[{"award-number":["61872041"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shandong Provincial Key Research and Development Program","award":["2021CXGC010106"],"award-info":[{"award-number":["2021CXGC010106"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/comst.2022.3204281","type":"journal-article","created":{"date-parts":[[2022,9,6]],"date-time":"2022-09-06T19:24:44Z","timestamp":1662492284000},"page":"2163-2192","source":"Crossref","is-referenced-by-count":43,"title":["Blockchain Meets Covert Communication: A Survey"],"prefix":"10.1109","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3704-6718","authenticated-orcid":false,"given":"Zhuo","family":"Chen","sequence":"first","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3277-3887","authenticated-orcid":false,"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5786-1512","authenticated-orcid":false,"given":"Peng","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8127-9282","authenticated-orcid":false,"given":"Can","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"given":"Feng","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"given":"Jialing","family":"He","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing, China"}]},{"given":"Dawei","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8561-5092","authenticated-orcid":false,"given":"Yan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Informatics, University of Oslo, Oslo, Norway"}]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.3390\/s21124078"},{"key":"ref172","doi-asserted-by":"crossref","first-page":"159","DOI":"10.12785\/ijcds\/090202","article-title":"Traceability of cryptocurrency transactions using blockchain analytics","volume":"9","author":"gagneja","year":"2020","journal-title":"Int J Comput Digit Syst"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61638-0_3"},{"key":"ref174","article-title":"Omni protocol specification (formerly mastercoin)","volume":"28","author":"willett","year":"2016"},{"key":"ref173","first-page":"463","article-title":"An empirical analysis of anonymity in Zcash","author":"kappos","year":"2018","journal-title":"Proc 27th USENIX Security Symp (USENIX Security)"},{"key":"ref176","first-page":"1793","article-title":"A mixing scheme using a decentralized signature protocol for privacy protection in bitcoin blockchain","volume":"18","author":"xiao","year":"2021","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"ref175","year":"2021","journal-title":"One-Input and two-Output Transactions"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2328665"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23415"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.3389\/frma.2021.656233"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1145\/3051457.3053980"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2992467"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9091338"},{"key":"ref33","first-page":"223","article-title":"Research on underwater bionic covert communication","author":"shen","year":"2020","journal-title":"Proc Int Conf Mach Learn Big Data Anal IoT Security Privacy"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2018.07.007"},{"key":"ref31","first-page":"318","article-title":"Audio steganography for secure data communication: A review","volume":"4","author":"ggct","year":"2019","journal-title":"Int J Sci Res Develop"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2018.8500167"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/app11041641"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/IMCEC.2018.8469335"},{"key":"ref35","first-page":"45","article-title":"A survey of wireless covert communications","volume":"12","author":"dai","year":"2020","journal-title":"Nanjing Xinxi Gongcheng Daxue Xuebao"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8892896"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660379"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00004"},{"key":"ref185","year":"2020","journal-title":"The 2020 State of Crypto Crime"},{"key":"ref184","author":"hopwood","year":"2016","journal-title":"Zcash Protocol Specification"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845213"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00022"},{"key":"ref189","year":"2021","journal-title":"Bitcoin Average Transaction Fee"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2749508"},{"key":"ref187","first-page":"2170","article-title":"Survey on privacy preserving techniques for blockchain technology","volume":"54","author":"zhu","year":"2017","journal-title":"J Comput Res Develop"},{"key":"ref186","first-page":"989","article-title":"Lightweight transaction tracing technology for Bitcoin","volume":"41","author":"gao","year":"2018","journal-title":"Chin J Comput"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3316481"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2950872"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/AINS.2017.8270420"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102784"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988579"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3050241"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102397"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2019.04.002"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983601"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2890507"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3389\/fbloc.2020.00007"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2659646"},{"key":"ref51","article-title":"Reconfigurable intelligent surface-aided joint radar and covert communications: Fundamentals, optimization, and challenges","author":"kang","year":"2022","journal-title":"arXiv 2203 02704"},{"key":"ref154","author":"gluhovsky","year":"2021","journal-title":"EIP-627 Whisper specification"},{"key":"ref153","author":"liu","year":"2020","journal-title":"Research on Information Hiding Methods Based on Blockchain Technology"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1002\/int.22327"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2019.00014"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58201-2_22"},{"key":"ref152","article-title":"Tithonus: A bitcoin based censorship resilient system","author":"recabarren","year":"2018","journal-title":"arXiv 1810 00279"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78618-2_5"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC53448.2021.9720480"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1145\/3384943.3409433"},{"key":"ref148","doi-asserted-by":"crossref","first-page":"597","DOI":"10.32604\/cmc.2020.011554","article-title":"A covert communication method using special bitcoin addresses generated by vanitygen","volume":"65","author":"zhang","year":"2020","journal-title":"Comput Mater Continua"},{"key":"ref149","first-page":"238","article-title":"BLOCCE: An improved blockchain-based covert communication approach","volume":"34","author":"song","year":"2020","journal-title":"J Chongqing Univ Tech Nat Sci"},{"key":"ref59","first-page":"1","article-title":"Covert channels in Internet protocols: A survey","author":"llamas","year":"2005","journal-title":"Proc 6th Annu Postgrad Symp Converg Telecommun Netw Broadcast (PGNET)"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4684-4730-9_5"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249475"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2014.11"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICITCS.2015.7292966"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2945320"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2818650"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3029902"},{"key":"ref40","first-page":"20","article-title":"Ensuring security and transparency in distributed communication in IoT ecosystems using blockchain technology: Protocols, applications and challenges","volume":"11","author":"ali","year":"2021","journal-title":"Int J Comput Digit Syst"},{"key":"ref167","first-page":"9","article-title":"Covert data transmission mechanism based on dynamic label in blockchain","volume":"47","author":"si","year":"2020","journal-title":"J Xidian Univ"},{"key":"ref166","first-page":"143","article-title":"Covert communication technology based on Bitcoin","volume":"6","author":"lv","year":"2021","journal-title":"Cyber Security"},{"key":"ref165","first-page":"67","article-title":"Research on a new network covert channel model in blockchain environment","volume":"40","author":"li","year":"2019","journal-title":"J Commun"},{"key":"ref164","article-title":"Research on command control channel of Botnet based on blockchain technology","author":"li","year":"0","journal-title":"Modern Computer"},{"key":"ref163","first-page":"256","article-title":"Broadcasting steganography in the blockchain","author":"xu","year":"2019","journal-title":"Proc Int Workshop Digit Watermark"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3100480"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3040389"},{"key":"ref160","first-page":"814","article-title":"DLchain: A covert channel over blockchain based on dynamic labels","author":"tian","year":"2019","journal-title":"Proc Int Conf Inf Commun Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1037\/h0024529"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2020.10.013"},{"key":"ref5","author":"sanders","year":"2017","journal-title":"Practical Packet Analysis Using Wireshark to Solve Real-World Network Problems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2016.83"},{"key":"ref159","first-page":"23","article-title":"Using Monero to realize covert communication","volume":"47","author":"lan","year":"2020","journal-title":"J Xidian Univ"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317620"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2017.83"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9739-8_17"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HPCS48598.2019.9188115"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3057333"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3119639"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3051602"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.117.2200065"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3054887"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4176"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3003020"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3072849"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2021.101390"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101777"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/IEEEGCC.2017.8447997"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3933-1"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2017.7918316"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/EIConRus.2017.7910590"},{"key":"ref77","first-page":"864","article-title":"SOMSteg-framework for covert channel, and its detection, within HTTP","volume":"24","author":"graniszewski","year":"2018","journal-title":"J Univers Comput Sci"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470087"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3058060.3058082"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2016.7473513"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134605"},{"key":"ref60","first-page":"11","article-title":"Survey on covert storage channel in computer network protocols: Detection and mitigation techniques","volume":"6","author":"elsadig","year":"2016","journal-title":"Int J Adv Comput Netw Security"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1336"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2015.7165963"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61996-8_29"},{"key":"ref64","article-title":"Network covert channels: Design, analysis, detection, and elimination","author":"cabuk","year":"2006"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.02.001"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.3390\/s21186268"},{"key":"ref67","first-page":"513","article-title":"An offline and efficient storage covert channel detection mechanism","volume":"6","author":"vishnoi","year":"2019","journal-title":"Int J Res Anal Rev"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.23919\/APSIPA.2018.8659780"},{"key":"ref69","author":"gunadi","year":"2017","journal-title":"Bro Covert Channel Detection (BroCCaDe) Framework Scope and Background"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1304-6_19"},{"key":"ref198","doi-asserted-by":"crossref","first-page":"2013","DOI":"10.32604\/cmc.2020.011219","article-title":"A distributed covert channel of the packet ordering enhancement model based on data compression","volume":"64","author":"zhang","year":"2020","journal-title":"Comput Mater Continua"},{"key":"ref199","first-page":"54","article-title":"Towards measuring anonymity","author":"diaz","year":"2002","journal-title":"Proc Int Workshop Privacy Enhanc Technol"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_8"},{"key":"ref194","article-title":"IPFs-content addressed, versioned, P2P file system","author":"benet","year":"2014","journal-title":"arXiv 1407 3561"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01143-0"},{"key":"ref196","article-title":"Performance analysis and optimization for jammer-aided multi-antenna UAV covert communication","author":"du","year":"2022","journal-title":"arXiv 2202 00973"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/3017680.3022454"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.06.008"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_31"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2980788"},{"key":"ref191","first-page":"110","article-title":"CoinJoin: Bitcoin privacy for the real world","volume":"3","author":"maxwell","year":"2013","journal-title":"Post on Bitcoin Forum"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2952265"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2017.00075"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.02.236"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996936"},{"key":"ref98","first-page":"2470","article-title":"Survey on key issues in networks covert channel","volume":"30","author":"li","year":"2019","journal-title":"J Softw"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030108"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2017.30"},{"key":"ref97","first-page":"1","article-title":"NetWarden: Mitigating network covert channels without performance loss","author":"xing","year":"2019","journal-title":"Proc 11th USENIX Workshop Hot Topics Cloud Comput (HotCloud)"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346885"},{"key":"ref81","first-page":"2039","article-title":"NetWarden: Mitigating network covert channels while preserving performance","author":"xing","year":"2020","journal-title":"Proc 29th USENIX Security Symp (USENIX Security)"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-019-00636-6"},{"key":"ref83","first-page":"120","article-title":"Covert timing channel method based on TCP timestamp option","volume":"16","author":"wang","year":"2015","journal-title":"Journal of PLA Univ of Sci and Tech"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8762033"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.11.001"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718779568"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.10.040"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62223-7_28"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.03.007"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3055767"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2937969"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_12"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/IMCEC.2018.8469669"},{"key":"ref204","first-page":"1","article-title":"Covert channel detection using machine learning","author":"\u00e7avu?o","year":"2020","journal-title":"Proc IEEE 28th Signal Process Commun Appl Conf (SIU)"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3178970"},{"key":"ref202","article-title":"DNS covert channel detection via Behavioral analysis: A machine learning approach","author":"saeli","year":"2020","journal-title":"arXiv 2010 01582"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-018-1841-4"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345663"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.03.033"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465128"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2904303"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.3390\/sym13050855"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS49365.2020.9213064"},{"key":"ref133","first-page":"66","article-title":"D-BitBot: A P2P duplex botnet model in bitcoin network","volume":"52","author":"zhou","year":"2020","journal-title":"J Harbin Inst Technol"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2015.56"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/DSC47296.2019.8937637"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2842460"},{"key":"ref136","first-page":"181","article-title":"BlockStack: A global naming and storage system secured by blockchains","author":"ali","year":"2016","journal-title":"Proc USENIX Annu Tech Conf (USENIX ATC)"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.19"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_23"},{"key":"ref137","year":"0","journal-title":"Bitcoin Transaction"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2989059"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.5195\/LEDGER.2018.101"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/SIBIRCON48586.2019.8957861"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900225"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_14"},{"key":"ref2","author":"deibert","year":"2009","journal-title":"Tracking Ghostnet Investigating A Cyber Espionage Network"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61078-4_7"},{"key":"ref1","author":"nakashima","year":"2014","journal-title":"Researchers Identify Sophisticated Chinese Cyberespionage Group"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/IC3INA48034.2019.8949606"},{"key":"ref109","author":"adair","year":"2010","journal-title":"Shadows in the Cloud Investigating Cyber Espionage 2 0"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3060285"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/3139923.3139925"},{"key":"ref106","first-page":"78","article-title":"act natural! Having a private chat on a public blockchain","author":"tiemann","year":"2021","journal-title":"Cryptology-eprint-archive"},{"key":"ref105","year":"2021","journal-title":"Bitcoin Transactions Historical Chart"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2886932"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2928178"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7096271"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_3"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-017-0379-8"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59013-0_36"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2656078"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IPTC.2011.8"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2011.6013582"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ElConRus51938.2021.9396545"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/EIConRus.2018.8317375"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2016.048"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ElConRus51938.2021.9396163"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.3389\/fbloc.2020.00016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICETAS.2017.8277839"},{"key":"ref117","first-page":"3","article-title":"Attacking with bitcoin: Using bitcoin to build resilient botnet armies","author":"kamenski","year":"2019","journal-title":"Proc Comput Intell Security Inf Syst Conf"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2936094"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography2030018"},{"key":"ref119","year":"2021","journal-title":"Analyzing the Pony C&C server hidden in bitcoin"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00219"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_1"},{"key":"ref116","first-page":"30","article-title":"High resistance botnet based on smart contract","volume":"7","author":"zhao","year":"2021","journal-title":"Chin J Netw Inf Secur"},{"key":"ref115","article-title":"Subliminal channels in blockchain applications for hidden botnet communication","author":"frkat","year":"2019"},{"key":"ref120","author":"eisenkraft","year":"2019","journal-title":"Pony&#x2019;s C&C servers hidden inside the Bitcoin blockchain"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.5195\/ledger.2016.34"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/SecTech.2014.17"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/9956928\/09878134.pdf?arnumber=9878134","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:17:40Z","timestamp":1670872660000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9878134\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":204,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/comst.2022.3204281","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}