{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T21:02:15Z","timestamp":1765486935067,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179456","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"111-125","source":"Crossref","is-referenced-by-count":7,"title":["Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks"],"prefix":"10.1109","author":[{"given":"Muhammad","family":"Saad","sequence":"first","affiliation":[{"name":"PayPal"}]},{"given":"David","family":"Mohaisen","sequence":"additional","affiliation":[{"name":"PayPal"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2019.23252","article-title":"SABRE: protecting bitcoin against routing attacks","volume-title":"Annual Network and Distributed System Security Symposium, NDSS, San Diego, California, USA","author":"Apostolaki","year":"2019"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/sp.2017.29"},{"volume-title":"Cisco crosswork cloud","key":"ref3"},{"year":"2021","article-title":"Bgpstream","key":"ref4"},{"year":"2022","article-title":"Caida prefix-to-autonomous system (as) mappings","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.23919\/tma.2019.8784511"},{"article-title":"Disconnectnode","key":"ref7"},{"year":"2021","author":"Community","article-title":"Bitnodes: Discovering all reachable nodes in bitcoin","key":"ref8"},{"year":"2022","article-title":"Cryptocurrency market capitalization","key":"ref9"},{"year":"2020","article-title":"Ethernodes: Ethereum mainnet statistics","key":"ref10"},{"year":"2020","author":"Community","article-title":"Internet health report","key":"ref11"},{"year":"2021","author":"Community","article-title":"Ripple peer crawler","key":"ref12"},{"year":"2020","author":"Community","article-title":"Routeviews \u2013 university of oregon route views project","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/s42786-018-00002-6"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/p2p.2013.6688704"},{"key":"ref16","article-title":"Txprobe: Discovering bitcoin\u2019s network topology using orphan transactions","volume-title":"CoRR","volume":"abs\/1812.00942","author":"Delgado-Segura","year":"2018"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/icc.2018.8422620"},{"key":"ref18","first-page":"11","article-title":"Impact of man-in-the-middle attacks on ethereum","volume-title":"IEEE Symposium on Reliable Distributed Systems, SRDS, Salvador, Brazil.","author":"Ekparinya"},{"key":"ref19","first-page":"101","article-title":"Conman: A connection manipulation-based attack against bitcoin networking","volume-title":"Conference on Communications and Network Security","author":"Fan"},{"key":"ref20","first-page":"48","article-title":"AS hegemony: A robust metric for AS centrality","volume-title":"Special Interest Group on Data Communication","author":"Fontugne","year":"2017"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/978-3-319-76481-8_16","article-title":"The (thin) bridges of AS connectivity: Measuring dependency using AS hegemony","volume-title":"Passive and Active Measurement","author":"Fontugne","year":"2018"},{"key":"ref22","first-page":"291","article-title":"The bitcoin backbone protocol with chains of variable difficulty","volume-title":"International Cryptology Conference on Advances in Cryptology , Santa Barbara, CA, USA","author":"Garay"},{"key":"ref23","first-page":"439","article-title":"Decentralization in bitcoin and ethereum networks","volume-title":"International Conference on Financial Cryptography and Data Security, Nieuwpoort, Cura\u00e7ao","volume":"10957","author":"Gencer","year":"2018"},{"key":"ref24","first-page":"692","article-title":"Tampering with the delivery of blocks and transactions in bitcoin","volume-title":"Conference on Computer and Communications Security","author":"Gervais"},{"key":"ref25","first-page":"54","article-title":"BGP and inter-as economic relationships","volume-title":"International Conference on Networking","author":"Gregori","year":"2011"},{"key":"ref26","article-title":"The mathematics of bitcoin","volume-title":"CoRR","volume":"abs\/2003.00001","author":"Grunspan","year":"2020"},{"author":"Heilman","first-page":"129","article-title":"Eclipse attacks on bitcoin\u2019s peer-to-peer network","key":"ref27"},{"issue":"8","key":"ref28","first-page":"2340","article-title":"Small cluster in cyber physical systems: Network topology, interdependence and cascading failures","volume-title":"IEEE Trans. Parallel Distributed Syst.","volume":"26","author":"Huang","year":"2015"},{"key":"ref29","first-page":"91","article-title":"Measuring ethereum network peers","volume-title":"Internet Measurement Conference","author":"Kim"},{"key":"ref30","first-page":"195","article-title":"Be selfish and avoid dilemmas: Fork after withholding (FAW) attacks on bitcoin","volume-title":"SIGSAC Conference on Computer and Communications Security","author":"Kwon"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1145\/3487552.3487814"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.23919\/apnoms.2019.8893121"},{"year":"2020","author":"Magazine","article-title":"Bitcoin and erebus attacks","key":"ref33"},{"key":"ref34","first-page":"236","article-title":"Low-resource eclipse attacks on ethereum\u2019s peer-to-peer network","volume-title":"IACR Cryptol. ePrint Arch.","volume":"2018","author":"Marcus","year":"2018"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/noms47738.2020.9110354"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1145\/1159913.1159947"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/ICDCS.2019.00119"},{"year":"2022","author":"Saad","article-title":"Extended paper version","key":"ref38"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/SP40000.2020.00027"},{"key":"ref40","article-title":"Topology analysis of the XRP network","volume-title":"CoRR","volume":"abs\/2205.00869","author":"Tumas","year":"2022"},{"key":"ref41","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2015.23035","article-title":"Mind your blocks: On the stealthiness of malicious BGP hijacks","volume-title":"Annual Network and Distributed System Security Symposium, San Diego, California, USA","author":"Vervier"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2023,5,21]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179456.pdf?arnumber=10179456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T04:53:53Z","timestamp":1721451233000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179456\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179456","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}