{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T02:19:22Z","timestamp":1777342762987,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,13]],"date-time":"2022-11-13T00:00:00Z","timestamp":1668297600000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2016K1A1A2912757"],"award-info":[{"award-number":["NRF-2016K1A1A2912757"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2007153"],"award-info":[{"award-number":["CNS-2007153"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484568","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:27Z","timestamp":1636805127000},"page":"1668-1685","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["SyncAttack: Double-spending in Bitcoin Without Mining Power"],"prefix":"10.1145","author":[{"given":"Muhammad","family":"Saad","sequence":"first","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"given":"Songqing","family":"Chen","sequence":"additional","affiliation":[{"name":"George Mason University, Virginia, VA, USA"}]},{"given":"David","family":"Mohaisen","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. Bitcoin Synchronization Attack. (2021). https:\/\/anonymous.4open.science\/r\/106b2297--8daf-4b75-a209--6468a8dc91c1\/"},{"key":"e_1_3_2_1_2_1","volume-title":"IP Address Marketplace: Worldwide. (Jan","year":"2021","unstructured":"2021. IP Address Marketplace: Worldwide. (Jan 2021). https:\/\/ipv4marketgroup.com\/ipv4-pricing\/"},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/www.crypto51.app\/","author":"Attack Cost W","year":"2021","unstructured":"2021. PoW 51% Attack Cost. (2021). https:\/\/www.crypto51.app\/"},{"key":"e_1_3_2_1_4_1","unstructured":"Amazon. 2021. EC2 Instance Types & Pricing. https:\/\/ec2pricing.net\/. (2021)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23252"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.29"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5220\/0004937303690374"},{"key":"e_1_3_2_1_8_1","volume-title":"Bitnodes: Discovering All Reachable Nodes In Bitcoin.","author":"Community B.","year":"2021","unstructured":"B.Community. 2021. Bitnodes: Discovering All Reachable Nodes In Bitcoin. (2021). https:\/\/bitnodes.earn.com\/"},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/blockchain.info\/pools","author":"Distribution Hashrate","year":"2018","unstructured":"Blockchain. 2018. Hashrate Distribution. (2018). https:\/\/blockchain.info\/pools."},{"key":"e_1_3_2_1_10_1","unstructured":"ChaniQuery. 2021. bitcoin-cli getchaintips - ChainQuery. https:\/\/chainquery.com\/bitcoin-cli\/getchaintips. (2021)."},{"key":"e_1_3_2_1_11_1","unstructured":"Bitcoin Community. 2018. Bitcoin Core version history. (2018). https:\/\/github.com\/bitcoin\/bitcoin."},{"key":"e_1_3_2_1_12_1","unstructured":"Bitcoin Community. 2020. Bitcoin Net.cpp File Containing Node Eviction Logic. https:\/\/github.com\/bitcoin\/bitcoin\/blob\/master\/src\/net.cpp. (2020)."},{"key":"e_1_3_2_1_13_1","unstructured":"Bitcoin Community. 2020. bitcoin\/net.h at master AE bitcoin\/bitcoin. https:\/\/github.com\/bitcoin\/bitcoin\/blob\/master\/src\/net.h. (2020)."},{"key":"e_1_3_2_1_14_1","unstructured":"Bitcoin Community. 2021. Bitcoin (BTC) Block Explorer. https:\/\/explorer.bitcoin.com\/btc. (2021)."},{"key":"e_1_3_2_1_15_1","unstructured":"Bitcoin Community. 2021. Bitcoin Relay Network. https:\/\/bit.ly\/3tjtAUa. (2021). (Accessed on 01\/29\/2021)."},{"key":"e_1_3_2_1_16_1","unstructured":"Bitcoin Community. 2021. Fork Monitor. https:\/\/forkmonitor.info\/stale\/btc\/677102. (2021)."},{"key":"e_1_3_2_1_17_1","unstructured":"Bitcoin Community. 2021. Pool Stats - BTC.com. https:\/\/btc.com\/stats\/pool?pool_mode=all. (2021)."},{"key":"e_1_3_2_1_18_1","volume-title":"https:\/\/bitcoinstats.com\/network\/dns-servers\/","author":"Decker Christian","year":"2021","unstructured":"Christian Decker. 2021. (2021). https:\/\/bitcoinstats.com\/network\/dns-servers\/"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_32"},{"key":"e_1_3_2_1_21_1","volume-title":"Annual Conference on Neural Information Processing Systems 2017 Long Beach, CA, USA. 1364-1373","author":"Giulia","unstructured":"Giulia C. Fanti and Pramod Viswanath. Dec 2017. Deanonymization in the Bitcoin P2P Network. In Annual Conference on Neural Information Processing Systems 2017 Long Beach, CA, USA. 1364-1373. https:\/\/tinyurl.com\/y72zgvtk."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--63688--7_10"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813655"},{"key":"e_1_3_2_1_24_1","volume-title":"Double spend races. CoRR abs\/1702.02867","author":"Grunspan Cyril","year":"2017","unstructured":"Cyril Grunspan and Ricardo P\u00e9rez-Marco. 2017. Double spend races. CoRR abs\/1702.02867 (2017). arXiv:1702.02867 http:\/\/arxiv.org\/abs\/1702.02867"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Ethan Heilman Leen Alshenibr Foteini Baldimtsi Alessandra Scafuro and Sharon Goldberg. 2017. TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub. In ISOC Network and Distributed System Security Symposium. http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/2017\/09\/ndss201701--3HeilmanPaper.pdf.","DOI":"10.14722\/ndss.2017.23086"},{"key":"e_1_3_2_1_26_1","volume-title":"USENIX Security Symposium. 129-144","author":"Heilman Ethan","year":"2015","unstructured":"Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse Attacks on Bitcoin's Peer-to-Peer Network. In USENIX Security Symposium. 129-144. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/heilman"},{"key":"e_1_3_2_1_27_1","volume-title":"Modeling a Double-Spending Detection System for the Bitcoin Network. CoRR abs\/1809.07678","author":"Javarone Marco Alberto","year":"2018","unstructured":"Marco Alberto Javarone and Craig Steven Wright. 2018. Modeling a Double-Spending Detection System for the Bitcoin Network. CoRR abs\/1809.07678 (2018). arXiv:1809.07678 http:\/\/arxiv.org\/abs\/1809.07678"},{"key":"e_1_3_2_1_28_1","volume-title":"USENIX Security Symposium. 279-296","author":"Kokoris-Kogias Eleftherios","year":"2016","unstructured":"Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoff, Linus Gasser, and Bryan Ford. 2016. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing. In USENIX Security Symposium. 279-296. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/kogias"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC48266.2020.9169464"},{"key":"e_1_3_2_1_30_1","volume-title":"USENIX Security Symposium. 783-800","author":"Matetic Sinisa","year":"2019","unstructured":"Sinisa Matetic, Karl W\u00fcst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, and Srdjan Capkun. 2019. BITE: Bitcoin Lightweight Client Privacy using Trusted Execution. In USENIX Security Symposium. 783-800. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/matetic"},{"key":"e_1_3_2_1_31_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008). https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_32_1","unstructured":"Digital Ocean. 2021. Spin up your virtual machine in just 55 seconds. https:\/\/try.digitalocean.com\/. (2021). (Accessed on 01\/27\/2021)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-018-0159--3"},{"key":"e_1_3_2_1_34_1","first-page":"454","article-title":"Analysis of the Blockchain Protocol in Asynchronous Networks","volume":"2016","author":"Pass Rafael","year":"2016","unstructured":"Rafael Pass, Lior Seeman, and Abhi Shelat. 2016. Analysis of the Blockchain Protocol in Asynchronous Networks. IACR Cryptology ePrint Archive 2016 (2016), 454. http:\/\/eprint.iacr.org\/2016\/454","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_35_1","unstructured":"Ling Ren. 2019. Analysis of Nakamoto Consensus. Cryptology ePrint Archive Report 2019\/943. (2019). https:\/\/eprint.iacr.org\/2019\/943."},{"key":"e_1_3_2_1_36_1","volume-title":"Analysis of Hashrate-Based Double Spending. CoRR abs\/1402.2009","author":"Rosenfeld Meni","year":"2014","unstructured":"Meni Rosenfeld. 2014. Analysis of Hashrate-Based Double Spending. CoRR abs\/1402.2009 (2014). arXiv:1402.2009 http:\/\/arxiv.org\/abs\/1402.2009"},{"key":"e_1_3_2_1_37_1","volume-title":"Mohaisen","author":"Saad Muhammad","year":"2021","unstructured":"Muhammad Saad, Afsah Anwar, Srivatsan Ravi, and David A. Mohaisen. Nov 2021. Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and Chain Quality. (Nov 2021)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00119"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470316849"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPCON.2019.00019"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.3571056"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00027"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994224"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484568","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484568","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484568","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:44:27Z","timestamp":1763498667000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484568"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":43,"alternative-id":["10.1145\/3460120.3484568","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484568","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}