{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:29:08Z","timestamp":1774538948809,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670330","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"1031-1045","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Blockchain Bribing Attacks and the Efficacy of Counterincentives"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1868-1719","authenticated-orcid":false,"given":"Dimitris","family":"Karakostas","sequence":"first","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2451-1430","authenticated-orcid":false,"given":"Aggelos","family":"Kiayias","sequence":"additional","affiliation":[{"name":"University of Edinburgh &amp; IOG, Edinburgh, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5022-8543","authenticated-orcid":false,"given":"Thomas","family":"Zacharias","sequence":"additional","affiliation":[{"name":"University of Glasgow, Glasgow, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095816"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--53357--4_2"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","unstructured":"Joseph Bonneau. 2019. Hostile Blockchain Takeovers (Short Paper) See [65] 92--100. https:\/\/doi.org\/10.1007\/978--3--662--58820--8_7","DOI":"10.1007\/978--3--662--58820--8_7"},{"key":"e_1_3_2_1_4_1","volume-title":"FC 2017 Workshops. Lecture Notes in Computer Science","volume":"10323","author":"Brenner Michael","year":"2017","unstructured":"Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y. A. Ryan, Vanessa Teague, Andrea Bracciali, Massimiliano Sala, Federico Pintore, and Markus Jakobsson (Eds.). 2017. FC 2017 Workshops. Lecture Notes in Computer Science, Vol. 10323. Springer, Heidelberg, Germany, Sliema, Malta."},{"key":"e_1_3_2_1_5_1","unstructured":"Ethan Buchman. 2016. Tendermint: Byzantine fault tolerance in the age of blockchains. Ph.D. Dissertation. University of Guelph."},{"key":"e_1_3_2_1_6_1","volume-title":"Casper the friendly finality gadget. arXiv preprint arXiv:1710.09437","author":"Buterin Vitalik","year":"2017","unstructured":"Vitalik Buterin and Virgil Griffith. 2017. Casper the friendly finality gadget. arXiv preprint arXiv:1710.09437 (2017)."},{"key":"e_1_3_2_1_7_1","unstructured":"Vitalik Buterin Diego Hernandez Thor Kamphefner Khiem Pham Zhi Qiao Danny Ryan Juhyeok Sin Ying Wang and Yan X Zhang. 2020. Combining GHOST and Casper. arXiv:2003.03052 [cs.CR]"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751241"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749"},{"key":"e_1_3_2_1_10_1","volume-title":"ALGORAND AGREEMENT: Super Fast and Partition Resilient Byzantine Agreement. Cryptology ePrint Archive, Report 2018\/377. https:\/\/eprint.iacr.org\/2018\/377.","author":"Chen Jing","year":"2018","unstructured":"Jing Chen, Sergey Gorbunov, Silvio Micali, and Georgios Vlachos. 2018. ALGORAND AGREEMENT: Super Fast and Partition Resilient Byzantine Agreement. Cryptology ePrint Archive, Report 2018\/377. https:\/\/eprint.iacr.org\/2018\/377."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--58820--8_20"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355470"},{"key":"e_1_3_2_1_13_1","unstructured":"Cosmos. 2024. x\/slashing. https:\/\/docs.cosmos.network\/v0.46\/modules\/slashing\/"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00040"},{"key":"e_1_3_2_1_15_1","unstructured":"Sreeram Kannanand Soubhik Deb. 2023. The cryptoeconomics of slashing. https: \/\/a16zcrypto.com\/content\/article\/the-cryptoeconomics-of-slashing"},{"key":"e_1_3_2_1_16_1","volume-title":"Analysis of Bitcoin vulnerability to bribery attacks launched through large transactions. arXiv preprint arXiv:2105.07501","author":"Ebrahimpour Ghader","year":"2021","unstructured":"Ghader Ebrahimpour and Mohammad Sayad Haghighi. 2021. Analysis of Bitcoin vulnerability to bribery attacks launched through large transactions. arXiv preprint arXiv:2105.07501 (2021)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--45472--5_28"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--46803--6_10"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Juan A. Garay Aggelos Kiayias and Nikos Leonardos. 2017. The Bitcoin Backbone Protocol with Chains of Variable Difficulty See [32] 291--323. https:\/\/doi.org\/10. 1007\/978--3--319--63688--7_10","DOI":"10.1007\/978-3-319-63688-7_10"},{"key":"e_1_3_2_1_20_1","volume-title":"Algorand: Scaling Byzantine Agreements for Cryptocurrencies. Cryptology ePrint Archive, Report 2017\/454. https:\/\/eprint.iacr.org\/2017\/454.","author":"Gilad Yossi","year":"2017","unstructured":"Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. 2017. Algorand: Scaling Byzantine Agreements for Cryptocurrencies. Cryptology ePrint Archive, Report 2017\/454. https:\/\/eprint.iacr.org\/2017\/454."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00023"},{"key":"e_1_3_2_1_22_1","volume-title":"FC 2016: 20th International Conference on Financial Cryptography and Data Security. Lecture Notes in Computer Science","volume":"9603","author":"Grossklags Jens","year":"2016","unstructured":"Jens Grossklags and Bart Preneel (Eds.). 2016. FC 2016: 20th International Conference on Financial Cryptography and Data Security. Lecture Notes in Computer Science, Vol. 9603. Springer, Heidelberg, Germany, Christ Church, Barbados."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294279"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10877-8_10"},{"key":"e_1_3_2_1_25_1","volume-title":"2021 IEEE Symposium on Security and Privacy. IEEE Computer Society Press","author":"IEEE","year":"2021","unstructured":"IEEE S&P 2021 2021. 2021 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, San Francisco, CA, USA."},{"key":"e_1_3_2_1_26_1","volume-title":"Pay to win: cheap, crowdfundable, cross-chain algorithmic incentive manipulation attacks on pow cryptocurrencies. Cryptology ePrint Archive","author":"Judmayer Aljosha","year":"2019","unstructured":"Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, and Edgar Weippl. 2019. Pay to win: cheap, crowdfundable, cross-chain algorithmic incentive manipulation attacks on pow cryptocurrencies. Cryptology ePrint Archive (2019)."},{"key":"e_1_3_2_1_27_1","unstructured":"Aljosha Judmayer Nicholas Stifter Alexei Zamyatin Itay Tsabary Ittay Eyal Peter Ga?i Sarah Meiklejohn and EdgarWeippl. 2020. SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies. Cryptology ePrint Archive Report 2020\/1614. https:\/\/eprint.iacr.org\/2020\/1614."},{"key":"e_1_3_2_1_28_1","unstructured":"Philipp Kant Lars Br\u00fcnjes and Duncan Coutts. 2029. Design Specification for Delegation and Incentives in Cardano. https:\/\/github.com\/intersectmbo\/cardanoledger\/ releases\/latest\/download\/shelley-delegation.pdf"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--57990--6_1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3558535.3559781"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Dimitris Karakostas Aggelos Kiayias and Thomas Zacharias. 2024. Blockchain Bribing Attacks and the Efficacy of Counterincentives. arXiv:2402.06352 [cs.GT]","DOI":"10.1145\/3658644.3670330"},{"key":"e_1_3_2_1_32_1","volume-title":"Part I. Lecture Notes in Computer Science","volume":"10401","author":"Katz Jonathan","year":"2017","unstructured":"Jonathan Katz and Hovav Shacham (Eds.). 2017. Advances in Cryptology -- CRYPTO 2017, Part I. Lecture Notes in Computer Science, Vol. 10401. Springer, Heidelberg, Germany, Santa Barbara, CA, USA."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00063"},{"key":"e_1_3_2_1_34_1","unstructured":"Majid Khabbazian Tejaswi Nadahalli and Roger Wattenhofer. 2020. Timelocked Bribes. Cryptology ePrint Archive Report 2020\/774. https:\/\/eprint.iacr.org\/2020\/ 774."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940716.2940773"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--63688--7_12"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479722.3480795"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49116-3_38"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of WEIS","volume":"2013","author":"Kroll Joshua A","year":"2013","unstructured":"Joshua A Kroll, Ian C Davey, and Edward W Felten. 2013. The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. In Proceedings of WEIS, Vol. 2013. Citeseer."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Kevin Liao and Jonathan Katz. 2017. Incentivizing Blockchain Forks via Whale Transactions See [4] 264--279.","DOI":"10.1007\/978-3-319-70278-0_17"},{"key":"e_1_3_2_1_41_1","volume-title":"Financial Cryptography Bitcoin Workshop.","author":"Liao Kevin","year":"2017","unstructured":"Kevin Liao and Jonathan Katz. 2017. Incentivizing double-spend collusion in bitcoin. In Financial Cryptography Bitcoin Workshop."},{"key":"e_1_3_2_1_42_1","volume-title":"USENIX Security 2017: 26th USENIX Security Symposium","author":"Luu Loi","unstructured":"Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena. 2017. SmartPool: Practical Decentralized Pooled Mining. In USENIX Security 2017: 26th USENIX Security Symposium, Engin Kirda and Thomas Ristenpart (Eds.). USENIX Association, Vancouver, BC, Canada, 1409--1426."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560832.3563433"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","unstructured":"Patrick McCorry Alexander Hicks and Sarah Meiklejohn. 2019. Smart Contracts for Bribing Miners See [65] 3--18. https:\/\/doi.org\/10.1007\/978--3--662--58820--8_1","DOI":"10.1007\/978--3--662--58820--8_1"},{"key":"e_1_3_2_1_45_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system."},{"key":"e_1_3_2_1_46_1","unstructured":"Mark Nesbitt. 2019. Deep Chain Reorganization Detected on Ethereum Classic (ETC). https:\/\/blog.coinbase.com\/ethereum-classic-etc-is-currently-being-51-attacked-33be13ce32de."},{"key":"e_1_3_2_1_47_1","volume-title":"Ertem Nusret Tas, and David Tse","author":"Neu Joachim","year":"2021","unstructured":"Joachim Neu, Ertem Nusret Tas, and David Tse. 2021. The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets. Cryptology ePrint Archive, Report 2021\/628. https:\/\/eprint.iacr.org\/2021\/628."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00045"},{"key":"e_1_3_2_1_49_1","unstructured":"Stephen O'Neal. 2018. Bitcoin Cash Hard Fork Battle: Who Is Winning the Hash War. https:\/\/cointelegraph.com\/news\/bitcoin-cash-hard-fork-battle-who-iswinning-the-hash-war."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--56614--6_22"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492866.3549731"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Okke Schrijvers Joseph Bonneau Dan Boneh and Tim Roughgarden. 2016. Incentive Compatibility of Bitcoin Mining Pool Reward Functions See [22] 477--498.","DOI":"10.1007\/978-3-662-54970-4_28"},{"key":"e_1_3_2_1_53_1","unstructured":"Caspar Schwarz-Schilling Fahad Saleh Thomas Thiery Jennifer Pan Nihar Shah and Barnab\u00e9 Monnot. 2023. Time is Money: Strategic Timing Games in Proof-of-Stake Protocols. arXiv:2305.09032 [cs.GT]"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484566"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59013-0_28"},{"key":"e_1_3_2_1_56_1","volume-title":"Accountable Safety for Rollups. arXiv preprint arXiv:2210.15017","author":"Tas Ertem Nusret","year":"2022","unstructured":"Ertem Nusret Tas, John Adler, Mustafa Al-Bassam, Ismail Khoffi, David Tse, and Nima Vaziri. 2022. Accountable Safety for Rollups. arXiv preprint arXiv:2210.15017 (2022)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Jason Teutsch Sanjay Jain and Prateek Saxena. 2016. When Cryptocurrencies Mine Their Own Business See [22] 499--514.","DOI":"10.1007\/978-3-662-54970-4_29"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","unstructured":"Itay Tsabary Matan Yechieli Alex Manuskin and Ittay Eyal. 2021. MAD-HTLC: Because HTLC is Crazy-Cheap to Attack See [25] 1230--1248. https:\/\/doi.org\/ 10.1109\/SP40001.2021.00080","DOI":"10.1109\/SP40001.2021.00080"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Yaron Velner Jason Teutsch and Loi Luu. 2017. Smart Contracts Make Bitcoin Mining Pools Vulnerable See [4] 298--316.","DOI":"10.1007\/978-3-319-70278-0_19"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jenvman.2022.116530"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"crossref","unstructured":"Fredrik Winzer Benjamin Herd and Sebastian Faust. 2019. Temporary Censorship Attacks in the Presence of Rational Miners. Cryptology ePrint Archive Report 2019\/748. https:\/\/eprint.iacr.org\/2019\/748.","DOI":"10.1109\/EuroSPW.2019.00046"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"},{"key":"e_1_3_2_1_63_1","unstructured":"ZenCash. 2018. ZenCash Statement on Double Spend Attack. https:\/\/blog.zencash.com\/zencash-statement-on-double-spend-attack\/."},{"key":"e_1_3_2_1_64_1","unstructured":"Peng Zhong. 2017. Understanding Inflation in Cosmos. https:\/\/blog.cosmos.network\/understanding-inflation-in-cosmos-622651c83303"},{"key":"e_1_3_2_1_65_1","volume-title":"FC 2018 Workshops. Lecture Notes in Computer Science","volume":"10958","author":"Zohar Aviv","year":"2019","unstructured":"Aviv Zohar, Ittay Eyal, Vanessa Teague, Jeremy Clark, Andrea Bracciali, Federico Pintore, and Massimiliano Sala (Eds.). 2019. FC 2018 Workshops. Lecture Notes in Computer Science, Vol. 10958. Springer, Heidelberg, Germany, Nieuwpoort, Cura\u00e7ao."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670330","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670330","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:56:34Z","timestamp":1755842194000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670330"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":65,"alternative-id":["10.1145\/3658644.3670330","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3670330","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}