Completed
Exploiting Bucket Eviction by investing Time
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Eclipse Attacks on Bitcoin’s Peer-to-Peer Network
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Bitcoin's Peer-to-Peer Network
- 3 Example 1: 51% attack with 40% mining power
- 4 Example 2: N-Confirmation Double Spending
- 5 How easy are restartsy
- 6 How to eclipse with a limited number of Ps?
- 7 Exploiting Bucket Eviction by investing Time
- 8 Results: Live experiment
- 9 Countermeasures: Random Selection
- 10 Countermeasures: Deterministic Random Eviction
- 11 Countermeasures: Deployment
- 12 Countermeasures: How effective?
- 13 Summary