Financial cryptography and data security 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10-14, 2020, Revised selected papers /: 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10-14, 2020, Revised selected papers. (2020)
- Record Type:
- Book
- Title:
- Financial cryptography and data security 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10-14, 2020, Revised selected papers /: 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10-14, 2020, Revised selected papers. (2020)
- Main Title:
- Financial cryptography and data security 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10-14, 2020, Revised selected papers
- Other Titles:
- FC 2020
- Further Information:
- Note: Joseph Bonneau, Nadia Heninger (eds.).
- Other Names:
- Bonneau, Joseph
Heninger, Nadia Anne, 1982-
FC (Conference), 24th - Contents:
- Intro -- Preface -- Organization -- Contents -- I Attacks -- Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems -- 1 Introduction -- 2 Background -- 2.1 Botnet C&C Communication -- 2.2 Bitcoin -- 3 Related Work -- 4 Leveraging the Testnet Network -- 5 Botnet Design -- 5.1 Communication -- 5.2 Bot Registration -- 5.3 Commands and Responses -- 6 Experimental Results -- 6.1 Non-standard Transactions and Fees -- 6.2 PoC -- 7 Discussion -- 7.1 Cost Analysis -- 7.2 Architecture Analysis -- 7.3 Security -- 8 Conclusion and Future Work -- References Security Analysis on dBFT Protocol of NEO -- 1 Introduction -- 2 Overview of PBFT -- 3 Security Property -- 4 dBFT Protocol -- 4.1 Overview of dBFT -- 4.2 Detailed Procedures of dBFT -- 4.3 Comparison with PBFT -- 5 Identified Attacks -- 5.1 Attack Case 1 -- 5.2 Attack Case 2 -- 6 Recommended Fix -- 7 Related Work -- 8 Conclusion -- A dBFT Flow Chart -- References -- Breaking the Encryption Scheme of the Moscow Internet Voting System -- 1 Introduction -- 2 Attacks on the Encryption Scheme -- 2.1 Attack on the Original Implementation -- 2.2 Attack on the Modified Version 2.3 On the Role of Encryption in the Protocol -- What Did We Break? -- 3 Discussion -- 3.1 The Role of the Blockchain in the Protocol -- 3.2 What Occurred on D-Day -- 3.3 On the Absence of Specification -- 4 Lessons Learned and Conclusion -- A A Shell Script for the First Attack -- B Encrypted Messages Are Not Quadratic Residues -- CIntro -- Preface -- Organization -- Contents -- I Attacks -- Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems -- 1 Introduction -- 2 Background -- 2.1 Botnet C&C Communication -- 2.2 Bitcoin -- 3 Related Work -- 4 Leveraging the Testnet Network -- 5 Botnet Design -- 5.1 Communication -- 5.2 Bot Registration -- 5.3 Commands and Responses -- 6 Experimental Results -- 6.1 Non-standard Transactions and Fees -- 6.2 PoC -- 7 Discussion -- 7.1 Cost Analysis -- 7.2 Architecture Analysis -- 7.3 Security -- 8 Conclusion and Future Work -- References Security Analysis on dBFT Protocol of NEO -- 1 Introduction -- 2 Overview of PBFT -- 3 Security Property -- 4 dBFT Protocol -- 4.1 Overview of dBFT -- 4.2 Detailed Procedures of dBFT -- 4.3 Comparison with PBFT -- 5 Identified Attacks -- 5.1 Attack Case 1 -- 5.2 Attack Case 2 -- 6 Recommended Fix -- 7 Related Work -- 8 Conclusion -- A dBFT Flow Chart -- References -- Breaking the Encryption Scheme of the Moscow Internet Voting System -- 1 Introduction -- 2 Attacks on the Encryption Scheme -- 2.1 Attack on the Original Implementation -- 2.2 Attack on the Modified Version 2.3 On the Role of Encryption in the Protocol -- What Did We Break? -- 3 Discussion -- 3.1 The Role of the Blockchain in the Protocol -- 3.2 What Occurred on D-Day -- 3.3 On the Absence of Specification -- 4 Lessons Learned and Conclusion -- A A Shell Script for the First Attack -- B Encrypted Messages Are Not Quadratic Residues -- C Parameters from the Public Testing Held on August 28 -- References -- Short Paper: XOR Arbiter PUFs Have Systematic Response Bias -- 1 Introduction and Related Work -- 2 Bias Analysis -- 2.1 Background: Additive Delay Model -- 2.2 Analysis -- 3 Discussion 3.1 Simulation Results -- 3.2 XOR Arbiter PUF Bias and Arbiter PUF Uniqueness -- 4 Conclusion -- References -- I Consensus -- Selfish Mining Re-Examined -- 1 Introduction -- 2 Background -- 2.1 Mining in PoW Cryptocurrencies -- 2.2 Selfish Mining Strategy -- 3 Intermittent Selfish Mining -- 3.1 Intermittent Selfish Mining Evaluation -- 3.2 Results -- 4 Difficulty Adjustment Algorithms -- 4.1 DAA Taxonomy -- 4.2 DAA Evaluation -- 4.3 Results -- 5 Related Work -- 6 Conclusion -- A Uncle Blocks and Selfish Mining -- References -- Fairness and Efficiency in DAG-Based Cryptocurrencies 1 Introduction -- 1.1 Our Results -- 1.2 Related Work -- 2 DAG-Based Ledgers -- 2.1 Ledger Growth Preliminaries -- 3 Pf, k Ledger Models and Honest Behaviour -- 3.1 Valid Blocks and Transactions -- 3.2 Defining SI, SP, and ST for Honest Mining in Pf, k -- 3.3 Implementation of Bitcoin and SPECTRE as Pf, k Protocols -- 3.4 Honest Transaction Consistency and Generation -- 3.5 Assumptions: Non-atomic Miners, Payoffs and Transaction Generation Rate -- 4 Results -- 4.1 Fairness -- 4.2 Efficiency -- 4.3 Dynamically Adjusting k and f -- 5 Discussion -- References … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource (689 p.)
- Subjects:
- 005.8/24
Data encryption (Computer science) -- Congresses
Computer security -- Congresses
User-centered system design -- Congresses
Computer security
Data encryption (Computer science)
User-centered system design
Electronic books
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783030512804
3030512800 - Related ISBNs:
- 9783030512798
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.518669
- Ingest File:
- 03_107.xml