{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:13:00Z","timestamp":1775873580884,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,13]],"date-time":"2022-11-13T00:00:00Z","timestamp":1668297600000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DGE2104532"],"award-info":[{"award-number":["DGE2104532"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3485369","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:33Z","timestamp":1636805133000},"page":"1645-1667","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["DETER: Denial of Ethereum Txpool sERvices"],"prefix":"10.1145","author":[{"given":"Kai","family":"Li","sequence":"first","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]},{"given":"Yibo","family":"Wang","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]},{"given":"Yuzhe","family":"Tang","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Litecoin cash (lcc) was 51% attacked. https:\/\/bit.ly\/36EUs7p."},{"key":"e_1_3_2_2_2_1","unstructured":"Aleth -- ethereum c++ client tools and libraries. https:\/\/github.com\/ethereum\/aleth."},{"key":"e_1_3_2_2_3_1","unstructured":"Hyperledger besu. https:\/\/www.hyperledger.org\/use\/besu."},{"key":"e_1_3_2_2_4_1","unstructured":"Blockdaemon: Institutional grade blockchain infrastructure. https:\/\/blockdaemon.com\/."},{"key":"e_1_3_2_2_5_1","unstructured":"Json-rpc in ethereum wiki (eth_call). https:\/\/github.com\/ethereum\/wiki\/wiki\/json-rpc#ethcall ."},{"key":"e_1_3_2_2_6_1","unstructured":"Irreversible transactions: Finney attack. https:\/\/en.bitcoin.it\/wiki\/IrreversibleTransactions#Finneyattack."},{"key":"e_1_3_2_2_7_1","unstructured":"Gas now: Eth gasprice forecast system based on sparkpool pending transaction mempool. https:\/\/www.gasnow.org\/."},{"key":"e_1_3_2_2_8_1","unstructured":"Geth: the go client for ethereum. https:\/\/www.ethereum.org\/cli#geth."},{"key":"e_1_3_2_2_9_1","unstructured":"Ethereum & ipfs apis. develop now on web 3.0. https:\/\/infura.io\/."},{"key":"e_1_3_2_2_10_1","unstructured":"Infura mainnet outage post-mortem 2020--11--11. https:\/\/blog.infura.io\/infuramainnet-outage-post-mortem-2020--11--11\/."},{"key":"e_1_3_2_2_11_1","unstructured":"Ethereum directory for mining on etherscan. https:\/\/etherscan.io\/directory\/ Mining."},{"key":"e_1_3_2_2_12_1","unstructured":"Nethermind ethereum client. https:\/\/nethermind.io\/client."},{"key":"e_1_3_2_2_13_1","unstructured":"Parity ethereum is now openethereum: Fast and feature-rich multi-network ethereum client. https:\/\/www.parity.io\/ethereum\/."},{"key":"e_1_3_2_2_14_1","unstructured":"Blockchain infrastructure cloud. https:\/\/www.quiknode.io\/."},{"key":"e_1_3_2_2_15_1","unstructured":"The rinkeby testnet of ethereum. https:\/\/rinkeby.etherscan.io ."},{"key":"e_1_3_2_2_16_1","unstructured":"The ropsten testnet of ethereum. https:\/\/ropsten.etherscan.io."},{"key":"e_1_3_2_2_17_1","unstructured":"Sparkpool: Crypto mining and staking pool. https:\/\/www.sparkpool.com\/en\/."},{"key":"e_1_3_2_2_18_1","unstructured":"Go ethereum's txpool namespace. https:\/\/geth.ethereum.org\/docs\/rpc\/ns-txpool."},{"key":"e_1_3_2_2_19_1","unstructured":"Memoria 700 million stuck in 115 000 unconfirmed bitcoin transactions. https:\/\/www.ccn.com\/700-million-stuck-115000-uncon?rmed-bitcoin-transactions\/."},{"key":"e_1_3_2_2_20_1","unstructured":"Geth nodes under attack again (reddit). https:\/\/www.reddit.com\/r\/ethereum\/comments\/55s085\/gethnodesunderattackagainweareactively\/."},{"key":"e_1_3_2_2_21_1","volume-title":"Retrieved","author":"The","year":"2021","unstructured":"The Trinity client for ethereum network. no longer maintained or developed. https:\/\/github.com\/ethereum\/trinity, Retrieved Aug. 20, 2021."},{"key":"e_1_3_2_2_22_1","volume-title":"Retrieved May, 5","author":"Altcoin","year":"2021","unstructured":"Altcoin mining pool for gpu and asic: 2miners. https:\/\/2miners.com\/, Retrieved May, 5, 2021."},{"key":"e_1_3_2_2_23_1","volume-title":"Retrieved May, 5","author":"Bitcoin","year":"2021","unstructured":"Bitcoin gold hack shows 51% attack is real. https:\/\/www.investopedia.com\/news\/bitcoin-gold-hack-shows-51-attack-real\/, Retrieved May, 5, 2021."},{"key":"e_1_3_2_2_24_1","volume-title":"Retrieved May, 5","author":"Report","year":"2021","unstructured":"Report: Bitcoin (btc) mempool shows backlogged transactions, increased fees if so? https:\/\/goo.gl\/LsU6Hq, Retrieved May, 5, 2021."},{"key":"e_1_3_2_2_25_1","volume-title":"Retrieved May, 5","author":"Dapp","year":"2021","unstructured":"Dapp survey results 2019. https:\/\/medium.com\/?uence-network\/dapp-surveyresults-2019-a04373db6452, Retrieved May, 5, 2021."},{"key":"e_1_3_2_2_26_1","volume-title":"Retrieved May, 5","author":"Known","year":"2021","unstructured":"Known attacks - ethereum smart contract best practices. https:\/\/consensys.github.io\/smart-contract-best-practices\/knownattacks\/#doswith-block-gas-limit, Retrieved May, 5, 2021."},{"key":"e_1_3_2_2_27_1","volume-title":"Retrieved May, 5","author":"Ethereum","year":"2021","unstructured":"Ethereum mainnet statistics. https:\/\/www.ethernodes.org\/, Retrieved May, 5, 2021."},{"key":"e_1_3_2_2_28_1","volume-title":"Retrieved May, 5","author":"Etherscan","year":"2021","unstructured":"Etherscan: Ethereum (eth) blockchain explorer. https:\/\/etherscan.io\/, Retrieved May, 5, 2021."},{"key":"e_1_3_2_2_29_1","volume-title":"Retrieved May, 5","author":"Eth","year":"2021","unstructured":"Eth gas station: Recommended gas prices in gwei. https:\/\/ethgasstation.info\/, Retrieved May, 5, 2021."},{"key":"e_1_3_2_2_30_1","volume-title":"Retrieved May, 5","year":"2021","unstructured":"ethgasstation:an adaptive gas price oracle for the ethereum blockchain. https:\/\/github.com\/ethgasstation\/ethgasstation-backend, Retrieved May, 5, 2021."},{"key":"e_1_3_2_2_31_1","volume-title":"Retrieved May, 5","author":"Eth","year":"2021","unstructured":"Eth gas station: Txpool report. https:\/\/ethgasstation.info\/txPoolReport.php, Retrieved May, 5, 2021."},{"key":"e_1_3_2_2_32_1","volume-title":"Retrieved May, 5","author":"Optimism's","year":"2021","unstructured":"Optimism's tweet of apology for purposefully triggering the ethereum bug. https:\/\/twitter.com\/jinglanW\/status\/1326651349912719360, Retrieved May, 5, 2021."},{"key":"e_1_3_2_2_33_1","volume-title":"Retrieved May, 5","author":"Taichi","year":"2021","unstructured":"Taichi network. https:\/\/taichi.network\/, Retrieved May, 5, 2021."},{"key":"e_1_3_2_2_34_1","volume-title":"Retrieved May, 5","author":"Taichi","year":"2021","unstructured":"Taichi network's block propagator. https:\/\/github.com\/Taichi-Network\/docs\/blob\/master\/deploy.md, Retrieved May, 5, 2021."},{"key":"e_1_3_2_2_35_1","volume-title":"Retrieved May, 5","author":"Taichi","year":"2021","unstructured":"Taichi network's rpc service (asia pacific). https:\/\/api.taichi.network:10001, Retrieved May, 5, 2021."},{"key":"e_1_3_2_2_36_1","volume-title":"Retrieved May, 5","author":"Transaction","year":"2021","unstructured":"Transaction spam attack: Next steps. https:\/\/blog.ethereum.org\/2016\/09\/22\/transaction-spam-attack-next-steps\/, Retrieved May, 5, 2021."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.29"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--53357--4\/1"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--53357--4"},{"key":"e_1_3_2_2_40_1","unstructured":"Vitalik Buterin. Eip150: Gas cost changes for io-heavy operations. URL https:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-150.md."},{"key":"e_1_3_2_2_41_1","first-page":"47","volume-title":"RAID 2019","author":"Cheng Zhen","year":"2019","unstructured":"Zhen Cheng, Xinrui Hou, Runhuai Li, Yajin Zhou, Xiapu Luo, Jinku Li, and Kui Ren. Towards a first step to understand the cryptocurrency stealing attack on ethereum. In RAID 2019, pages 47--60, 2019. URL https:\/\/www.usenix.org\/conference\/raid2019\/presentation\/cheng."},{"key":"e_1_3_2_2_42_1","volume-title":"Flash boys 2.0: Frontrunning, transaction reordering, and consensus instability in decentralized exchanges. CoRR, abs\/1904.05234","author":"Daian Philip","year":"2019","unstructured":"Philip Daian, Steven Goldfeder, Tyler Kell, Yunqi Li, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, and Ari Juels. Flash boys 2.0: Frontrunning, transaction reordering, and consensus instability in decentralized exchanges. CoRR, abs\/1904.05234, 2019. URL http:\/\/arxiv.org\/abs\/1904.05234."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00040"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyx012"},{"key":"e_1_3_2_2_46_1","volume-title":"Decentralization in bitcoin and ethereum networks. CoRR, abs\/1801.03998","author":"Gencer Adem Efe","year":"2018","unstructured":"Adem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert van Renesse, and Emin G\u00fcn Sirer. Decentralization in bitcoin and ethereum networks. CoRR, abs\/1801.03998, 2018. URL http:\/\/arxiv.org\/abs\/1801.03998."},{"key":"e_1_3_2_2_47_1","first-page":"129","volume-title":"USA","author":"Heilman Ethan","year":"2015","unstructured":"Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. Eclipse attacks on bitcoin's peer-to-peer network. In Jaeyeon Jung and Thorsten Holz, editors, USENIX Security 2015, Washington, D.C., USA, pages 129--144. USENIX Association, 2015. URL https:\/\/www.usenix.org\/conference\/usenixsecurity15."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_6"},{"key":"e_1_3_2_2_49_1","first-page":"2721","volume-title":"29th USENIX Security Symposium, USENIX Security 2020","author":"Kalodner Harry A.","year":"2020","unstructured":"Harry A. Kalodner, Malte M\u00f6ser, Kevin Lee, Steven Goldfeder, Martin Plattner, Alishah Chator, and Arvind Narayanan. Blocksci: Design and applications of a blockchain analysis platform. In Srdjan Capkun and Franziska Roesner, editors, 29th USENIX Security Symposium, USENIX Security 2020, August 12--14, 2020, pages 2721--2738. USENIX Association, 2020. URL https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/kalodner."},{"key":"e_1_3_2_2_50_1","volume-title":"Timelocked bribes. IACR Cryptol. ePrint Arch","author":"Khabbazian Majid","year":"2020","unstructured":"Majid Khabbazian, Tejaswi Nadahalli, and RogerWattenhofer. Timelocked bribes. IACR Cryptol. ePrint Arch., 2020:774, 2020. URL https:\/\/eprint.iacr.org\/2020\/774."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278542"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23108"},{"key":"e_1_3_2_2_53_1","volume-title":"Low-resource eclipse attacks on ethereum's peer-to-peer network. IACR Cryptology ePrint Archive","author":"Marcus Yuval","year":"2018","unstructured":"Yuval Marcus, Ethan Heilman, and Sharon Goldberg. Low-resource eclipse attacks on ethereum's peer-to-peer network. IACR Cryptology ePrint Archive, 2018:236, 2018. URL http:\/\/eprint.iacr.org\/2018\/236."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--58820--8"},{"key":"e_1_3_2_2_55_1","volume-title":"Bdos: Blockchain denial of service","author":"Mirkin Michael","year":"2019","unstructured":"Michael Mirkin, Yan Ji, Jonathan Pang, Ariah Klages-Mundt, Ittay Eyal, and Ari Juels. Bdos: Blockchain denial of service, 2019."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511813603"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24267"},{"key":"e_1_3_2_2_58_1","volume-title":"Quantifying blockchain extractable value: How dark is the forest? CoRR, abs\/2101.05511","author":"Qin Kaihua","year":"2021","unstructured":"Kaihua Qin, Liyi Zhou, and Arthur Gervais. Quantifying blockchain extractable value: How dark is the forest? CoRR, abs\/2101.05511, 2021. URL https:\/\/arxiv.org\/abs\/2101.05511."},{"key":"e_1_3_2_2_59_1","volume-title":"Analysis of hashrate-based double spending. CoRR, abs\/1402.2009","author":"Rosenfeld Meni","year":"2014","unstructured":"Meni Rosenfeld. Analysis of hashrate-based double spending. CoRR, abs\/1402.2009, 2014. URL http:\/\/arxiv.org\/abs\/1402.2009."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751476"},{"key":"e_1_3_2_2_61_1","volume-title":"Frontrunner jones and the raiders of the dark forest: An empirical study of frontrunning on the ethereum blockchain. CoRR, abs\/2102.03347","author":"Torres Christof Ferreira","year":"2021","unstructured":"Christof Ferreira Torres, Ramiro Camino, and Radu State. Frontrunner jones and the raiders of the dark forest: An empirical study of frontrunning on the ethereum blockchain. CoRR, abs\/2102.03347, 2021. URL https:\/\/arxiv.org\/abs\/2102.03347."},{"key":"e_1_3_2_2_62_1","volume-title":"Anh V. Vu, and Min Suk Kang. A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network. In To appear in Proceedings of IEEE Symposium on Security and Privacy","author":"Tran Muoi","year":"2020","unstructured":"Muoi Tran, Inho Choi, Gi Jun Moon, Anh V. Vu, and Min Suk Kang. A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network. In To appear in Proceedings of IEEE Symposium on Security and Privacy (IEEE S&P), 2020."},{"key":"e_1_3_2_2_63_1","volume-title":"MAD-HTLC: because HTLC is crazy-cheap to attack. CoRR, abs\/2006.12031","author":"Tsabary Itay","year":"2020","unstructured":"Itay Tsabary, Matan Yechieli, and Ittay Eyal. MAD-HTLC: because HTLC is crazy-cheap to attack. CoRR, abs\/2006.12031, 2020. URL https:\/\/arxiv.org\/abs\/2006.12031."},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_5"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00046"},{"key":"e_1_3_2_2_66_1","volume-title":"\u00d0archer: Detecting on-chain-o?-chain synchronization bugs in decentralized applications. CoRR, abs\/2106.09440","author":"Zhang Wuqi","year":"2021","unstructured":"Wuqi Zhang, Lili Wei, Shuqing Li, Yepang Liu, and Shing-Chi Cheung. \u00d0archer: Detecting on-chain-o?-chain synchronization bugs in decentralized applications. CoRR, abs\/2106.09440, 2021. URL https:\/\/arxiv.org\/abs\/2106.09440."},{"key":"e_1_3_2_2_67_1","volume-title":"Duc V. Le, and Arthur Gervais. High-frequency trading on decentralized on-chain exchanges. CoRR, abs\/2009.14021","author":"Zhou Liyi","year":"2020","unstructured":"Liyi Zhou, Kaihua Qin, Christof Ferreira Torres, Duc V. Le, and Arthur Gervais. High-frequency trading on decentralized on-chain exchanges. CoRR, abs\/2009.14021, 2020. URL https:\/\/arxiv.org\/abs\/2009.14021."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485369","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485369","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:48:07Z","timestamp":1763498887000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485369"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":67,"alternative-id":["10.1145\/3460120.3485369","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3485369","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}