{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:29:04Z","timestamp":1774538944021,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134019","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"195-209","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":185,"title":["Be Selfish and Avoid Dilemmas"],"prefix":"10.1145","author":[{"given":"Yujin","family":"Kwon","sequence":"first","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, Republic of Korea"}]},{"given":"Dohyun","family":"Kim","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, Republic of Korea"}]},{"given":"Yunmok","family":"Son","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, Republic of Korea"}]},{"given":"Eugene","family":"Vasserman","sequence":"additional","affiliation":[{"name":"Kansas State University, Manhattan, KS, USA"}]},{"given":"Yongdae","family":"Kim","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"DoS-resistant, Hop-Proof pool. https:\/\/bitcointalk.org\/index.php?topic=18313.14900. (2017) [Online","year":"2017","unstructured":"[1500 TH] p2pool: Decentralized, DoS-resistant, Hop-Proof pool. https:\/\/bitcointalk.org\/index.php?topic=18313.14900. (2017) [Online; accessed 3-May-2017]."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2229012.2229022"},{"key":"e_1_3_2_2_3_1","volume-title":"Theoretical Bitcoin Attacks with Less than Half of the Computational Power (draft). arXiv preprint arXiv:1312.7013","author":"Bahack Lear","year":"2013","unstructured":"Lear Bahack. 2013. Theoretical Bitcoin Attacks with Less than Half of the Computational Power (draft). arXiv preprint arXiv:1312.7013 (2013)."},{"key":"e_1_3_2_2_4_1","volume-title":"https:\/\/bitcoinchain.com\/pools. (2017). [Online","author":"Pools Bitcoin Mining","year":"2017","unstructured":"Bitcoin Mining Pools. https:\/\/bitcoinchain.com\/pools. (2017). [Online; accessed 03-May-2017]."},{"key":"e_1_3_2_2_5_1","volume-title":"No registration, CPPSRB.","author":"Eligius","year":"2014","unstructured":"Eligius: 0% Fee BTC, 105% PPS NMC, No registration, CPPSRB. (2014). https:\/\/bitcointalk.org\/?topic=441465.msg7282674. [Online; accessed 28-Oct-2016]."},{"key":"e_1_3_2_2_6_1","volume-title":"https:\/\/bitnodes.21.co\/. (2016). [Online","author":"BITNODES.","year":"2016","unstructured":"BITNODES. https:\/\/bitnodes.21.co\/. (2016). [Online; accessed 30-Sep-2016]."},{"key":"e_1_3_2_2_7_1","volume-title":"https:\/\/blockchain.info\/ko\/charts\/market-price?timespan=all. (2016). [Online","author":"Price Blockchain Market","year":"2016","unstructured":"Blockchain Market Price. https:\/\/blockchain.info\/ko\/charts\/market-price?timespan=all. (2016). [Online; accessed 30-Sep-2016]."},{"key":"e_1_3_2_2_8_1","volume-title":"SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. In Symposium on Security and Privacy. IEEE.","author":"Bonneau Joseph","year":"2015","unstructured":"Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A Kroll, and Edward W Felten. 2015. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. In Symposium on Security and Privacy. IEEE."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(13)70020-4"},{"key":"e_1_3_2_2_10_1","volume-title":"Selfish Mining: A 25% Attack Against the Bitcoin Network. (2013). https:\/\/bitcoinmagazine.com\/articles\/selfish-mining-a-25-attack-against-the-bitcoin-network-1383578440\/. [Online","author":"Buterin Vitalik","year":"2016","unstructured":"Vitalik Buterin. Selfish Mining: A 25% Attack Against the Bitcoin Network. (2013). https:\/\/bitcoinmagazine.com\/articles\/selfish-mining-a-25-attack-against-the-bitcoin-network-1383578440\/. [Online; accessed 31-Oct-2016]."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978408"},{"key":"e_1_3_2_2_12_1","volume-title":"arXiv preprint arXiv:1402.1718","author":"Courtois Nicolas T","year":"2014","unstructured":"Nicolas T Courtois and Lear Bahack. 2014.On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency. arXiv preprint arXiv:1402.1718 (2014)."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"e_1_3_2_2_14_1","volume-title":"http:\/\/dogecoin.com\/. (2016). [Online","author":"DOGECOIN.","year":"2016","unstructured":"DOGECOIN. http:\/\/dogecoin.com\/. (2016). [Online; accessed 30-Sep-2016]."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.13"},{"key":"e_1_3_2_2_16_1","volume-title":"Bitcoin-NG: A Scalable Blockchain Protocol. In Symposium on Networked Systems Design and Implementation. Usenix.","author":"Eyal Ittay","year":"2016","unstructured":"Ittay Eyal, Adem Efe Gencer, Emin G\u00fcn Sirer, and Robbert Van Renesse. 2016. Bitcoin-NG: A Scalable Blockchain Protocol. In Symposium on Networked Systems Design and Implementation. Usenix."},{"key":"e_1_3_2_2_17_1","volume-title":"How to Disincentivize Large Bitcoin Mining Pools. (2014). [Online","author":"Eyal Ittay","year":"2017","unstructured":"Ittay Eyal and Emin G\u00fcn Sirer. How to Disincentivize Large Bitcoin Mining Pools. (2014). [Online; accessed 1-May-2017]."},{"key":"e_1_3_2_2_18_1","volume-title":"Majority Is Not Enough: Bitcoin Mining Is Vulnerable. In International Conference on Financial Cryptography and Data Security. Springer.","author":"Eyal Ittay","year":"2014","unstructured":"Ittay Eyal and Emin G\u00fcn Sirer. 2014. Majority Is Not Enough: Bitcoin Mining Is Vulnerable. In International Conference on Financial Cryptography and Data Security. Springer."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"e_1_3_2_2_20_1","volume-title":"Double-spending Fast Payments in Bitcoin. In Conference on Computer and Communications Security. ACM.","author":"Karame Ghassan O","year":"2012","unstructured":"Ghassan O Karame, Elli Androulaki, and Srdjan Capkun. 2012. Double-spending Fast Payments in Bitcoin. In Conference on Computer and Communications Security. ACM."},{"key":"e_1_3_2_2_21_1","volume-title":"Security Symposium. Usenix.","author":"Kogias Eleftherios Kokoris","year":"2016","unstructured":"Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. 2016. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing. In Security Symposium. Usenix."},{"key":"e_1_3_2_2_22_1","volume-title":"https:\/\/litecoin.info\/Litecoin. (2016). [Online","year":"2016","unstructured":"Litecoin. https:\/\/litecoin.info\/Litecoin. (2016). [Online; accessed 30-Sep-2016]."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978389"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.34"},{"key":"e_1_3_2_2_25_1","unstructured":"Loi Luu Yaron Velner Jason Teutsch and Prateek Saxena. SMART POOL: Practical Decentralized Pooled Mining. (2017)."},{"key":"e_1_3_2_2_26_1","volume-title":"Protocols for Public Key Cryptosystems. In Symposium on Security and privacy. IEEE.","author":"Merkle Ralph C","year":"1980","unstructured":"Ralph C Merkle. 1980. Protocols for Public Key Cryptosystems. In Symposium on Security and privacy. IEEE."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.37"},{"key":"e_1_3_2_2_28_1","unstructured":"Andrew Miller James Litton Andrew Pachulski Neal Gupta Dave Levin Neil Spring and Bobby Bhattacharjee. Discovering Bitcoin's Public Topology and Influential Nodes. (2015)."},{"key":"e_1_3_2_2_29_1","unstructured":"Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. (2008)."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.32"},{"key":"e_1_3_2_2_31_1","volume-title":"https:\/\/www.coindesk.com\/double-spending-risk-bitcoin-network-fork\/. (2016). [Online","author":"Risk Remains After Double Spending","year":"2016","unstructured":"Double Spending Risk Remains After July 4th Bitcoin Fork. https:\/\/www.coindesk.com\/double-spending-risk-bitcoin-network-fork\/. (2016). [Online; accessed 30-Sep-2016]."},{"key":"e_1_3_2_2_32_1","volume-title":"https:\/\/en.bitcoin.it\/wiki\/Proof_of_work. (2016). [Online","author":"Work Proof","year":"2016","unstructured":"Proof of Work. https:\/\/en.bitcoin.it\/wiki\/Proof_of_work. (2016). [Online; accessed 30-Sep-2016]."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"crossref","unstructured":"J Ben Rosen. 1965. Existence and Uniqueness of Equilibrium Points for Concave n-person Games. Econometrica: Journal of the Econometric Society (1965).","DOI":"10.2307\/1911749"},{"key":"e_1_3_2_2_34_1","volume-title":"Analysis of Bitcoin Pooled Mining Reward Systems. arXiv preprint arXiv:1112.4980","author":"Rosenfeld Meni","year":"2011","unstructured":"Meni Rosenfeld. 2011. Analysis of Bitcoin Pooled Mining Reward Systems. arXiv preprint arXiv:1112.4980 (2011)."},{"key":"e_1_3_2_2_35_1","volume-title":"Optimal Selfish Mining Strategies in Bitcoin. arXiv preprint arXiv:1507.06183","author":"Sapirshtein Ayelet","year":"2015","unstructured":"Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2015. Optimal Selfish Mining Strategies in Bitcoin. arXiv preprint arXiv:1507.06183 (2015)."},{"key":"e_1_3_2_2_36_1","volume-title":"International Conference on Financial Cryptography and Data Security. Springer.","author":"Aviv Zohar Yonatan","year":"2015","unstructured":"Yonatan Sompolinsky} and Aviv Zohar. 2015. Secure high-rate transaction processing in Bitcoin. In International Conference on Financial Cryptography and Data Security. Springer."},{"key":"e_1_3_2_2_37_1","volume-title":"https:\/\/en.bitcoin.it\/wiki\/Stratum_mining_protocol. (2016). [Online","author":"Protocol Stratum Mining","year":"2016","unstructured":"Stratum Mining Protocol. https:\/\/en.bitcoin.it\/wiki\/Stratum_mining_protocol. (2016). [Online; accessed 30-Sep-2016]."},{"key":"e_1_3_2_2_38_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151","author":"Wood Gavin","year":"2014","unstructured":"Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151 (2014)."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52153-4_16"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134019","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134019","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:27Z","timestamp":1750212807000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134019"}},"subtitle":["Fork After Withholding (FAW) Attacks on Bitcoin"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":39,"alternative-id":["10.1145\/3133956.3134019","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134019","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}