{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T19:04:31Z","timestamp":1770750271587,"version":"3.50.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3634737.3656997","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T11:51:38Z","timestamp":1719575498000},"page":"1345-1360","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["An Empirical Study of Consensus Protocols\u2019 DoS Resilience"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-0626-6236","authenticated-orcid":false,"given":"Giacomo","family":"Giuliari","sequence":"first","affiliation":[{"name":"Department of Computer Science, ETH Zurich, Zurich, Switzerland"},{"name":"Mysten Labs, Palo Alto, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5337-4741","authenticated-orcid":false,"given":"Alberto","family":"Sonnino","sequence":"additional","affiliation":[{"name":"Mysten Labs, Palo Alto, CA, USA"},{"name":"Department of Computer Science, University College London (UCL), London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2389-5742","authenticated-orcid":false,"given":"Marc","family":"Frei","sequence":"additional","affiliation":[{"name":"Department of Computer Science, ETH Zurich, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5563-4400","authenticated-orcid":false,"given":"Fabio","family":"Streun","sequence":"additional","affiliation":[{"name":"Anapaya Systems, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8827-3382","authenticated-orcid":false,"given":"Lefteris","family":"Kokoris-Kogias","sequence":"additional","affiliation":[{"name":"Mysten Labs, Palo Alto, CA, USA"},{"name":"IST Austria, Vienna, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5280-5412","authenticated-orcid":false,"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[{"name":"Department of Computer Science, ETH Zurich, Zurich, Switzerland"},{"name":"Mysten Labs, Palo Alto, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00044"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331612"},{"key":"e_1_3_2_1_3_1","unstructured":"Amazon. 2022. Amazon AWS Shield. https:\/\/aws.amazon.com\/shield\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/972374.972382"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23252"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.29"},{"key":"e_1_3_2_1_7_1","unstructured":"Aptos. 2022. Building the safest and most scalable Layer 1 blockchain. https:\/\/aptoslabs.com."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419614.3423260"},{"key":"e_1_3_2_1_9_1","volume-title":"Consensus in the age of blockchains. arXiv preprint arXiv:1711.03936","author":"Bano Shehar","year":"2017","unstructured":"Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, and George Danezis. 2017. Consensus in the age of blockchains. arXiv preprint arXiv:1711.03936 (2017)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_17"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/800221.806707"},{"key":"e_1_3_2_1_13_1","volume-title":"Snow White: Provably Secure Proofs of Stake. IACR Cryptol. ePrint Arch.","author":"Bentov Iddo","year":"2016","unstructured":"Iddo Bentov, Rafael Pass, and Elaine Shi. 2016. Snow White: Provably Secure Proofs of Stake. IACR Cryptol. ePrint Arch. 2016, 919 (2016)."},{"key":"e_1_3_2_1_14_1","unstructured":"The Celo Blog. 2022. Celo Sets Sights On Becoming Fastest EVM Chain Through Collaboration With Mysten Labs. https:\/\/medium.com\/celoorg\/celo-sets-sights-on-becoming-fastest-evm-chain-through-collaboration-with-mysten-labs-e88b426aee83."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419614.3423258"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(87)90054-X"},{"key":"e_1_3_2_1_17_1","volume-title":"Introduction to reliable and secure distributed programming","author":"Cachin Christian","unstructured":"Christian Cachin, Rachid Guerraoui, and Lu\u00eds Rodrigues. 2011. Introduction to reliable and secure distributed programming. Springer Science & Business Media."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_1_19_1","volume-title":"The Complete Guide to SCION. From Design Principles to Formal Verification","author":"Chuat Laurent","unstructured":"Laurent Chuat, Markus Legner, David Basin, David Hausheer, Samuel Hitz, Peter M\u00fcller, and Adrian Perrig. 2022. The Complete Guide to SCION. From Design Principles to Formal Verification. Springer International Publishing AG. https:\/\/link.springer.com\/book\/10.1007\/978-3-031-05288-0"},{"key":"e_1_3_2_1_20_1","unstructured":"Catalin Cimpanu. 2021. Belgium's government network goes down after massive DDoS attack. https:\/\/archive.ph\/vZ5Oe. [Archived: 2023-04-25]."},{"key":"e_1_3_2_1_21_1","unstructured":"Cision. 2022. Sommelier Partners with Mysten Labs to make the Cosmos blockchain the fastest on the planet. https:\/\/www.prnewswire.com\/news-releases\/sommelier-partners-with-mysten-labs-to-make-the-cosmos-blockchain-the-fastest-on-the-planet-301381122.html."},{"key":"e_1_3_2_1_22_1","unstructured":"CloudFlare. 2022. Comprehensive DDoS protection. https:\/\/www.cloudflare.com\/ddos\/."},{"key":"e_1_3_2_1_23_1","unstructured":"Cloudflare. 2022. Comprehensive DDoS protections. https:\/\/www.cloudflare.com\/en-gb\/ddos\/."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519594"},{"key":"e_1_3_2_1_25_1","unstructured":"Diem. 2021. Welcome to the Diem project. http:\/\/diem.com."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(82)90776-8"},{"key":"e_1_3_2_1_28_1","unstructured":"Justin Drake. 2019. Low-overhead secret single-leader election. https:\/\/ethresear.ch\/t\/low-overhead-secret-single-leader-election\/5994."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212998"},{"key":"e_1_3_2_1_31_1","volume-title":"USENIX Security Symposium","author":"Fayaz S.K.","year":"2015","unstructured":"S.K. Fayaz, Y. Tobioka, V. Sekar, and M. Bailey. 2015. Bohatei: Flexible and elastic DDoS defense. USENIX Security Symposium (2015), 817--832."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417884"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3115517"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"key":"e_1_3_2_1_35_1","volume-title":"Jolteon and ditto: Network-adaptive efficient consensus with asynchronous fallback. arXiv preprint arXiv:2106.10362","author":"Gelashvili Rati","year":"2021","unstructured":"Rati Gelashvili, Lefteris Kokoris-Kogias, Alberto Sonnino, Alexander Spiegelman, and Zhuolun Xiang. 2021. Jolteon and ditto: Network-adaptive efficient consensus with asynchronous fallback. arXiv preprint arXiv:2106.10362 (2021)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_2_1_38_1","volume-title":"Network and Distributed System Security Symposium - NDSS","author":"Gilad Y.","year":"2016","unstructured":"Y. Gilad, A. Herzberg, M. Sudkovitch, and M. Goberman. 2016. CDN-ondemand: An affordable DDoS defense via untrusted clouds. Network and Distributed System Security Symposium - NDSS (2016), 1--15."},{"key":"e_1_3_2_1_39_1","volume-title":"Bullshark: Dag bft protocols made practical. arXiv preprint arXiv:2201.05677","author":"Giridharan Neil","year":"2022","unstructured":"Neil Giridharan, Lefteris Kokoris-Kogias, Alberto Sonnino, and Alexander Spiegelman. 2022. Bullshark: Dag bft protocols made practical. arXiv preprint arXiv:2201.05677 (2022)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485983.3494871"},{"key":"e_1_3_2_1_41_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Heilman Ethan","year":"2015","unstructured":"Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse Attacks on Bitcoin's Peer-to-Peer Network. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 129--144. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/heilman"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465084.3467905"},{"key":"e_1_3_2_1_43_1","volume-title":"Ouroboros: A provably secure proof-of-stake blockchain protocol. In Annual international cryptology conference","author":"Kiayias Aggelos","year":"2017","unstructured":"Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. 2017. Ouroboros: A provably secure proof-of-stake blockchain protocol. In Annual international cryptology conference. Springer, 357--388."},{"key":"e_1_3_2_1_44_1","volume-title":"Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing. CoRR abs\/1602.06997","author":"Kokoris-Kogias Eleftherios","year":"2016","unstructured":"Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. 2016. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing. CoRR abs\/1602.06997 (2016). arXiv:1602.06997 http:\/\/arxiv.org\/abs\/1602.06997"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134019"},{"key":"e_1_3_2_1_46_1","unstructured":"Mysten Labs. 2022. Build without Boundaries. https:\/\/sui.io."},{"key":"e_1_3_2_1_47_1","unstructured":"Mysten Labs. 2022. The Sui Smart Contract Platform. https:\/\/github.com\/MystenLabs\/sui\/blob\/main\/doc\/paper\/sui.pdf."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052988"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2016.02.031"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978306"},{"key":"e_1_3_2_1_51_1","unstructured":"Mary Maller. 2020. Provable Single Secret Leader Election. https:\/\/ethresear.ch\/t\/provable-single-secret-leader-election\/7971."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.12688\/f1000research.29032.1"},{"key":"e_1_3_2_1_54_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review (2008), 21260."},{"key":"e_1_3_2_1_55_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review (2008), 21260."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.32"},{"key":"e_1_3_2_1_57_1","unstructured":"Radware. 2022. Radware's DefensePro DDoS Protection. https:\/\/www.radware.com\/products\/defensepro\/."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384743"},{"key":"e_1_3_2_1_59_1","unstructured":"Ayelet Sapirshtein Yonatan Sompolinsky and Aviv Zohar. 2015. Optimal Selfish Mining Strategies in Bitcoin. In Financial Cryptography."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2018.00032"},{"key":"e_1_3_2_1_61_1","unstructured":"Alberto Sonnino. 2022. 2-Chain Variant of the HotStuff Consensus Protocol. https:\/\/github.com\/asonnino\/hotstuff."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.OPODIS.2020.9"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24043"},{"key":"e_1_3_2_1_64_1","volume-title":"European Symposium on Research in Computer Security. Springer, 37--52","author":"Studer Ahren","year":"2009","unstructured":"Ahren Studer and Adrian Perrig. 2009. The coremelt attack. In European Symposium on Research in Computer Security. Springer, 37--52."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00055"},{"key":"e_1_3_2_1_66_1","volume-title":"Ethereum: A Secure Decentralised Generalised Transaction Ledger. https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf.","author":"Wood Gavin","year":"2022","unstructured":"Gavin Wood. 2022. Ethereum: A Secure Decentralised Generalised Transaction Ledger. https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","unstructured":"S. T. Zargar J. Joshi and D. Tipper. 2013. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks. IEEE Communications Surveys & Tutorials 15 4 (2013). 10.1109\/SURV.2013.031413.00127","DOI":"10.1109\/SURV.2013.031413.00127"}],"event":{"name":"ASIA CCS '24: 19th ACM Asia Conference on Computer and Communications Security","location":"Singapore Singapore","acronym":"ASIA CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 19th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3656997","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:07Z","timestamp":1750290247000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3656997"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":67,"alternative-id":["10.1145\/3634737.3656997","10.1145\/3634737"],"URL":"https:\/\/doi.org\/10.1145\/3634737.3656997","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}