{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T08:34:47Z","timestamp":1758962087383,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"XJTLU AI University Research Centre, Jiangsu Province Engineering Research Centre of Data Science and Cognitive Computation at XJTLU and SIP AI innovation platform","award":["YZCXPT2022103"],"award-info":[{"award-number":["YZCXPT2022103"]}]},{"name":"XJTLU Teaching Development Funding","award":["TDF21\/22-R24-177"],"award-info":[{"award-number":["TDF21\/22-R24-177"]}]},{"name":"XJTLU Research Development Funding","award":["RDF-21-02-012"],"award-info":[{"award-number":["RDF-21-02-012"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3664509","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Unveiling Vulnerabilities in Bitcoin's Misbehavior-Score Mechanism: Attack and Defense"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-0809-510X","authenticated-orcid":false,"given":"Yuwen","family":"Zou","sequence":"first","affiliation":[{"name":"School of Advanced Technology, Xi'an Jiaotong-Liverpool University, China and Department of Computer Science, University of Liverpool, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7363-9695","authenticated-orcid":false,"given":"Wenjun","family":"Fan","sequence":"additional","affiliation":[{"name":"School of Advanced Technology, Xi'an Jiaotong-Liverpool University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4348-1176","authenticated-orcid":false,"given":"Zhen","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Advanced Technology, Xi'an Jiaotong-Liverpool University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. BitcoinWiki. Common Vulnerabilities and Exposures. https:\/\/en.bitcoin.it\/wiki\/Common_Vulnerabilities_and_Exposures"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0214518"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Davi Alves. 2021. The Impact of Denial-of-Service Attack for Bitcoin Miners Lisk Forgers and a Mitigation Strategy for Lisk Forgers. In Cybersecurity Threats with New Perspectives. IntechOpen.","DOI":"10.5772\/intechopen.97062"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1402-8"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.29"},{"volume-title":"DDoS attack detection on bitcoin ecosystem using deep-learning. In 2019 20th asia-pacific network operations and management symposium (apnoms)","author":"Baek Ui-Jun","key":"e_1_3_2_1_6_1","unstructured":"Ui-Jun Baek, Se-Hyun Ji, Jee\u00a0Tae Park, Min-Seob Lee, Jun-Sang Park, and Myung-Sup Kim. 2019. DDoS attack detection on bitcoin ecosystem using deep-learning. In 2019 20th asia-pacific network operations and management symposium (apnoms). IEEE, 1\u20134."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2623588"},{"key":"e_1_3_2_1_8_1","first-page":"140","article-title":"Scapy-a python tool for security testing","volume":"8","author":"Bansal Shipra","year":"2015","unstructured":"Shipra Bansal and Nitin Bansal. 2015. Scapy-a python tool for security testing. Journal of Computer Science & Systems Biology 8, 3 (2015), 140.","journal-title":"Journal of Computer Science & Systems Biology"},{"key":"e_1_3_2_1_9_1","volume-title":"USA","author":"Bernstein J","year":"2006","unstructured":"Daniel\u00a0J Bernstein. 2006. Curve25519: new Diffie-Hellman speed records. In Public Key Cryptography-PKC 2006: 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings 9. Springer, 207\u2013228."},{"key":"e_1_3_2_1_10_1","volume-title":"Workshop record of SASC, Vol.\u00a08. Citeseer, 3\u20135.","author":"Bernstein J","year":"2008","unstructured":"Daniel\u00a0J Bernstein 2008. ChaCha, a variant of Salsa20. In Workshop record of SASC, Vol.\u00a08. Citeseer, 3\u20135."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660379"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845213"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.14"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2842460"},{"key":"e_1_3_2_1_15_1","unstructured":"DashCore. [n. d.]. Misbehaving Nodes. https:\/\/docs.dash.org\/projects\/core\/en\/stable\/docs\/guide\/p2p-network-misbehaving-nodes.html"},{"key":"e_1_3_2_1_16_1","volume-title":"BIP-324: Version 2 P2P Encrypted Transport Protocol. Retrieved","author":"Pieter\u00a0Wuille Dhruv\u00a0Mehta Jonas Schnelli","year":"2024","unstructured":"Jonas Schnelli Pieter\u00a0Wuille Dhruv\u00a0Mehta, Tim\u00a0Ruffing. 2019. BIP-324: Version 2 P2P Encrypted Transport Protocol. Retrieved March 4, 2024 from https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0324.mediawiki"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2018.8539723"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS53000.2021.9705018"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3152937"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC51069.2021.9461126"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS54860.2022.00027"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.06.013"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyx012"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJMNDI.2006.012086"},{"key":"e_1_3_2_1_25_1","unstructured":"Jiang. [n. d.]. P2P Scoring System And Network Security. https:\/\/github.com\/nervosnetwork\/rfcs\/blob\/master\/rfcs\/0007-scoring-system-and-network-security\/0007-scoring-system-and-network-security.md"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_6"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2732196"},{"key":"e_1_3_2_1_29_1","volume-title":"Elliptic curve cryptosystems. Mathematics of computation 48, 177","author":"Koblitz Neal","year":"1987","unstructured":"Neal Koblitz. 1987. Elliptic curve cryptosystems. Mathematics of computation 48, 177 (1987), 203\u2013209."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_34"},{"key":"e_1_3_2_1_31_1","volume-title":"Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers. arXiv preprint arXiv:2212.05197","author":"Kumar Ankit","year":"2022","unstructured":"Ankit Kumar, Max von Hippel, Pete Manolios, and Cristina Nita-Rotaru. 2022. Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers. arXiv preprint arXiv:2212.05197 (2022)."},{"key":"e_1_3_2_1_32_1","volume-title":"Can signal extinction-based dos attack on in-vehicle network. Security and Communication Networks 2022","author":"Lee Yousik","year":"2022","unstructured":"Yousik Lee, Samuel Woo, 2022. Can signal extinction-based dos attack on in-vehicle network. Security and Communication Networks 2022 (2022)."},{"key":"e_1_3_2_1_33_1","volume-title":"Bijack: Breaking Bitcoin Network with TCP Vulnerabilities. In European Symposium on Research in Computer Security. Springer, 306\u2013326","author":"Li Shaoyu","year":"2023","unstructured":"Shaoyu Li, Shanghao Shi, Yang Xiao, Chaoyu Zhang, Y\u00a0Thomas Hou, and Wenjing Lou. 2023. Bijack: Breaking Bitcoin Network with TCP Vulnerabilities. In European Symposium on Research in Computer Security. Springer, 306\u2013326."},{"key":"e_1_3_2_1_34_1","volume-title":"Conference on the theory and application of cryptographic techniques. Springer, 417\u2013426","author":"Miller S","year":"1985","unstructured":"Victor\u00a0S Miller. 1985. Use of elliptic curves in cryptography. In Conference on the theory and application of cryptographic techniques. Springer, 417\u2013426."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417247"},{"key":"e_1_3_2_1_36_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. Decentralized business review","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized business review (2008)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2015.070421"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Yoav Nir and Adam Langley. 2018. ChaCha20 and Poly1305 for IETF Protocols. Technical Report.","DOI":"10.17487\/RFC8439"},{"key":"e_1_3_2_1_39_1","volume-title":"TCP Spoofing: Reliable Payload Transmission Past the Spoofed TCP Handshake. In 2024 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 179\u2013179","author":"Pan Yepeng","year":"2024","unstructured":"Yepeng Pan and Christian Rossow. 2024. TCP Spoofing: Reliable Payload Transmission Past the Spoofed TCP Handshake. In 2024 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 179\u2013179."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2016.12.006"},{"key":"e_1_3_2_1_41_1","volume-title":"Communication and Computing Technology: 6th International Conference, ICICCT 2021","author":"Popat Khushi","year":"2021","unstructured":"Khushi Popat and Viral\u00a0Vinod Kapadia. 2021. Multipath TCP security issues, challenges and solutions. In Information, Communication and Computing Technology: 6th International Conference, ICICCT 2021, New Delhi, India, May 8, 2021, Revised Selected Papers 6. Springer, 18\u201332."},{"key":"e_1_3_2_1_42_1","volume-title":"BIP-150: Peer Authentication. Retrieved","author":"Schnelli Jonas","year":"2024","unstructured":"Jonas Schnelli. 2016. BIP-150: Peer Authentication. Retrieved March 4, 2024 from https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0150.mediawiki"},{"key":"e_1_3_2_1_43_1","volume-title":"BIP-151: Peer-to-Peer Communication Encryption. Retrieved","author":"Schnelli Jonas","year":"2024","unstructured":"Jonas Schnelli. 2016. BIP-151: Peer-to-Peer Communication Encryption. Retrieved March 4, 2024 from https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0151.mediawiki"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2015.56"},{"volume-title":"An evaluation of the security of the bitcoin peer-to-peer network. In 2018 IEEE international conference on internet of things","author":"Tapsell James","key":"e_1_3_2_1_45_1","unstructured":"James Tapsell, Raja\u00a0Naeem Akram, and Konstantinos Markantonakis. 2018. An evaluation of the security of the bitcoin peer-to-peer network. In 2018 IEEE international conference on internet of things (IThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData). IEEE, 1057\u20131062."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022963"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419614.3423253"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"J Touch. 2007. RFC 4953: Defending TCP Against Spoofing Attacks.","DOI":"10.17487\/rfc4953"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00027"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_5"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2008.ECP.130"},{"key":"e_1_3_2_1_52_1","volume-title":"Exploiting centrality: Attacks in payment channel networks with local routing. CoRR","author":"Weintraub Ben","year":"2020","unstructured":"Ben Weintraub, Cristina Nita-Rotaru, and Stefanie Roos. 2020. Exploiting centrality: Attacks in payment channel networks with local routing. CoRR, vol. abs\/2007.09047 (2020)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2973410"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2000164"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSIC.2018.8556790"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36938-5_35"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","acronym":"ARES 2024","location":"Vienna Austria"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3664509","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3664509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:52:59Z","timestamp":1755881579000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3664509"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":56,"alternative-id":["10.1145\/3664476.3664509","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3664509","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}