{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T13:16:13Z","timestamp":1771679773076,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2016K1A1A2912757"],"award-info":[{"award-number":["NRF-2016K1A1A2912757"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484561","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"988-1005","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality"],"prefix":"10.1145","author":[{"given":"Muhammad","family":"Saad","sequence":"first","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"given":"Afsah","family":"Anwar","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"given":"Srivatsan","family":"Ravi","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles , CA, USA"}]},{"given":"David","family":"Mohaisen","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Anonymous. 2020. Improved Bitcoin Core To Counter HashSplit. https:\/\/anonymous.4open.science\/r\/56e77487-0470--4e10-b634-b13e939863c0\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23252"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.29"},{"key":"e_1_3_2_1_4_1","volume-title":"Preventing the 51%-attack: a stochastic analysis of two phase proof of work in bitcoin","author":"Bastiaan Martijn","unstructured":"Martijn Bastiaan. 2015. Preventing the 51%-attack: a stochastic analysis of two phase proof of work in bitcoin. University of Twente. http:\/\/fmt.cs.utwente.nl\/files\/sprojects\/268.pdf."},{"key":"e_1_3_2_1_5_1","unstructured":"ChainQuery. 2020. bitcoin-cli getchaintips -- ChainQuery. https:\/\/chainquery.com\/bitcoin-cli\/getchaintips. (Accessed on 03\/29\/2021)."},{"key":"e_1_3_2_1_6_1","unstructured":"Bitcoin Community. 2019. Six Confirmation Practice in Bitcoin. https:\/\/en.bitcoin.it\/wiki\/Confirmation."},{"key":"e_1_3_2_1_7_1","volume-title":"Bitnodes: Discovering All Reachable Nodes In Bitcoin. https:\/\/bitnodes.earn.com\/","author":"Community Bitnodes","year":"2020","unstructured":"Bitnodes Community. 2020. Bitnodes: Discovering All Reachable Nodes In Bitcoin. https:\/\/bitnodes.earn.com\/"},{"key":"e_1_3_2_1_8_1","unstructured":"Matt Corallo. 2018. Bitcoin Improvement Proposal 152. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0152.mediawiki"},{"key":"e_1_3_2_1_9_1","volume-title":"FastKitten: Practical Smart Contracts on Bitcoin. In Security Symposium, Nadia Heninger and Patrick Traynor (Eds.). USENIX, 801--818","author":"Das Poulami","year":"2019","unstructured":"Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Host\u00e1 kov\u00e1, Patrick Jauernig, Sebastian Faust, and Ahmad-Reza Sadeghi. 2019. FastKitten: Practical Smart Contracts on Bitcoin. In Security Symposium, Nadia Heninger and Patrick Traynor (Eds.). USENIX, 801--818. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/das"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"e_1_3_2_1_11_1","first-page":"716","article-title":"Securing Bitcoin-like Backbone Protocols against a Malicious Majority of Computing Power","volume":"2016","author":"Duong Tuyet","year":"2016","unstructured":"Tuyet Duong, Lei Fan, Thomas Veale, and Hong-Sheng Zhou. 2016. Securing Bitcoin-like Backbone Protocols against a Malicious Majority of Computing Power. IACR Cryptology ePrint Archive, Vol. 2016 (2016), 716. http:\/\/eprint.iacr.org\/2016\/716","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--45472--5_28"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--63688--7_10"},{"key":"e_1_3_2_1_14_1","volume-title":"Decentralization in Bitcoin and Ethereum Networks. CoRR","author":"Gencer Adem Efe","year":"2018","unstructured":"Adem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert van Renesse, and Emin G\u00fc n Sirer. 2018. Decentralization in Bitcoin and Ethereum Networks. CoRR, Vol. abs\/1801.03998 (2018). arxiv: 1801.03998 http:\/\/arxiv.org\/abs\/1801.03998"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213006"},{"key":"e_1_3_2_1_17_1","volume-title":"Double spend races. CoRR","author":"Grunspan Cyril","year":"2017","unstructured":"Cyril Grunspan and Ricardo P\u00e9 rez-Marco. 2017. Double spend races. CoRR, Vol. abs\/1702.02867 (2017). arxiv: 1702.02867 http:\/\/arxiv.org\/abs\/1702.02867"},{"key":"e_1_3_2_1_18_1","volume-title":"On profitability of selfish mining. CoRR","author":"Grunspan Cyril","year":"2018","unstructured":"Cyril Grunspan and Ricardo P\u00e9 rez-Marco. 2018. On profitability of selfish mining. CoRR, Vol. abs\/1805.08281 (2018). arxiv: 1805.08281 http:\/\/arxiv.org\/abs\/1805.08281"},{"key":"e_1_3_2_1_19_1","volume-title":"USENIX Security Symposium. 129--144","author":"Heilman Ethan","year":"2015","unstructured":"Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse Attacks on Bitcoin's Peer-to-Peer Network. In USENIX Security Symposium. 129--144. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/heilman"},{"key":"e_1_3_2_1_20_1","volume-title":"Profitable Double-Spending Attacks. CoRR","author":"Jang Jehyuk","year":"2019","unstructured":"Jehyuk Jang and Heung-No Lee. 2019. Profitable Double-Spending Attacks. CoRR, Vol. abs\/1903.01711 (2019). arxiv: 1903.01711 http:\/\/arxiv.org\/abs\/1903.01711"},{"key":"e_1_3_2_1_21_1","unstructured":"JBaczuk. 2021. bitcoind - Specific explanation of \"timeout\" configuration option in Bitcoin - Bitcoin Stack Exchange. https:\/\/bit.ly\/3tWbJCg. (Accessed on 03\/25\/2021)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243814"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134019"},{"key":"e_1_3_2_1_24_1","volume-title":"A New Theoretical Framework of Pyramid Markov Processes for Blockchain Selfish Mining. CoRR","author":"Li Quan-Lin","year":"2020","unstructured":"Quan-Lin Li, Yan-Xia Chang, Xiaole Wu, and Guoqing Zhang. 2020. A New Theoretical Framework of Pyramid Markov Processes for Blockchain Selfish Mining. CoRR, Vol. abs\/2007.01459 (2020). arxiv: 2007.01459 https:\/\/arxiv.org\/abs\/2007.01459"},{"key":"e_1_3_2_1_25_1","volume-title":"Security Symposium,. USENIX, 783--800","author":"Matetic Sinisa","year":"2019","unstructured":"Sinisa Matetic, Karl W\u00fc st, Moritz Schneider, Kari Kostiainen, Ghassan Karame, and Srdjan Capkun. 2019. BITE: Bitcoin Lightweight Client Privacy using Trusted Execution. In Security Symposium,. USENIX, 783--800. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/matetic"},{"key":"e_1_3_2_1_26_1","unstructured":"Andrew Miller James Litton Andrew Pachulski Neal Gupta Dave Levin Neil Spring and Bobby Bhattacharjee. 2015. Discovering Bitcoin's public topology and influential nodes.(2015)."},{"key":"e_1_3_2_1_27_1","unstructured":"AntPool Mining. 2020. AntPoolHashRate. https:\/\/www.bitcoinmining.com\/images\/bitcoin-mining-pool-hash-rate-distribution.png"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC50000.2020.9219639"},{"key":"e_1_3_2_1_29_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.44"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354237"},{"key":"e_1_3_2_1_32_1","first-page":"454","article-title":"Analysis of the Blockchain Protocol in Asynchronous Networks","volume":"2016","author":"Pass Rafael","year":"2016","unstructured":"Rafael Pass, Lior Seeman, and Abhi Shelat. 2016. Analysis of the Blockchain Protocol in Asynchronous Networks. IACR Cryptology ePrint Archive, Vol. 2016 (2016), 454. http:\/\/eprint.iacr.org\/2016\/454","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_33_1","unstructured":"Poolin. 2021. Pool Stats Bitcoin Mining Pools. https:\/\/btc.com\/stats\/pool. (Accessed on 03\/29\/2021)."},{"key":"e_1_3_2_1_34_1","unstructured":"Ling Ren. 2019. Analysis of Nakamoto Consensus. Cryptology ePrint Archive Report 2019\/943. https:\/\/eprint.iacr.org\/2019\/943."},{"key":"e_1_3_2_1_35_1","volume-title":"Analysis of Hashrate-Based Double Spending. CoRR","author":"Rosenfeld Meni","year":"2009","unstructured":"Meni Rosenfeld. 2014. Analysis of Hashrate-Based Double Spending. CoRR, Vol. abs\/1402.2009 (2014). arxiv: 1402.2009 http:\/\/arxiv.org\/abs\/1402.2009"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00119"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2975999"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--54970--4_30"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00027"},{"key":"e_1_3_2_1_40_1","volume-title":"Measurement and Analysis of the Bitcoin Networks: A View from Mining Pools. CoRR","author":"Wang Canhui","year":"2019","unstructured":"Canhui Wang, Xiaowen Chu, and Qin Yang. 2019. Measurement and Analysis of the Bitcoin Networks: A View from Mining Pools. CoRR, Vol. abs\/1902.07549 (2019). arxiv: 1902.07549"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS47774.2020.00039"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484561","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484561","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:54:15Z","timestamp":1763499255000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484561"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":41,"alternative-id":["10.1145\/3460120.3484561","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484561","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}