- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources5
- Resource Type
-
03000020000
- More
- Availability
-
32
- Author / Contributor
- Filter by Author / Creator
-
-
Li, Shaoyu (5)
-
Lou, Wenjing (3)
-
Shi, Shanghao (2)
-
Xiao, Yang (2)
-
An, Qian-Jin (1)
-
Barat, Md_Mohaimin_Al (1)
-
Bay, Katherine L. (1)
-
Chen, Ying (1)
-
Diao, Liyang (1)
-
Ding, Wei-Yi (1)
-
Du, Changlai (1)
-
Hou, Y Thomas (1)
-
Hou, Y. Thomas (1)
-
Hou, YThomas (1)
-
Houk, K.N. (1)
-
Sun, Yanqing (1)
-
Tan, Bin (1)
-
Wang, Xue (1)
-
Xiang, Shao-Hua (1)
-
Yu, Peiyuan (1)
-
- Filter by Editor
-
-
null (2)
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Free, publicly-accessible full text available May 27, 2025
-
Li, Shaoyu ; Shi, Shanghao ; Xiao, Yang ; Zhang, Chaoyu ; Hou, Y. Thomas ; Lou, Wenjing ( , Computer Security -- ESORICS 2023)Recent studies have shown that compromising Bitcoin’s peer-to-peer network is an effective way to disrupt the Bitcoin service. While many attack vectors have been uncovered such as BGP hijacking in the network layer and eclipse attack in the application layer, one significant attack vector that resides in the transport layer is largely overlooked. In this paper, we investigate the TCP vulnerabilities of the Bitcoin system and their consequences. We present Bijack, an off-path TCP hijacking attack on the Bitcoin network that is able to terminate Bitcoin connections or inject malicious data into the connections with only a few prior requirements and a limited amount of knowledge. This results in the Bitcoin network topology leakage, and the Bitcoin nodes isolation.more » « lessFree, publicly-accessible full text available January 12, 2025
-
Li, Shaoyu ; Shi, Shanghao ; Xiao, Yang ; Zhang, Chaoyui ; Hou, Y Thomas ; Lou, Wenjing ( , ESORICS)
-
Li, Shaoyu ; Sun, Yanqing ; Diao, Liyang ; Wang, Xue ( , Statistics in Biosciences)null (Ed.)
-
Ding, Wei-Yi ; Yu, Peiyuan ; An, Qian-Jin ; Bay, Katherine L. ; Xiang, Shao-Hua ; Li, Shaoyu ; Chen, Ying ; Houk, K.N. ; Tan, Bin ( , Chem)null (Ed.)