{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:09:20Z","timestamp":1740100160395,"version":"3.37.3"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,10]]},"DOI":"10.1109\/infocom42981.2021.9488749","type":"proceedings-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T00:07:32Z","timestamp":1627344452000},"page":"1-10","source":"Crossref","is-referenced-by-count":2,"title":["Code is the (F)Law: Demystifying and Mitigating Blockchain Inconsistency Attacks Caused by Software Bugs"],"prefix":"10.1109","author":[{"given":"Guorui","family":"Yu","sequence":"first","affiliation":[{"name":"Peking University"}]},{"given":"Shibin","family":"Zhao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing"}]},{"given":"Chao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University,QI-ANXIN Group JCNS"}]},{"given":"Zhiniang","family":"Peng","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Shenzhen Institutes of Advanced Technology"}]},{"given":"Yuandong","family":"Ni","sequence":"additional","affiliation":[{"name":"Tsinghua University,QI-ANXIN Group JCNS"}]},{"given":"Xinhui","family":"Han","sequence":"additional","affiliation":[{"name":"Peking University"}]}],"member":"263","reference":[{"article-title":"Preventing the 51%-attack: a stochastic analysis of two phase proof of work in bitcoin","year":"2015","author":"bastiaan","key":"ref10"},{"key":"ref11","first-page":"129","article-title":"Eclipse attacks on bitcoin’s peer-to-peer network","author":"heilman","year":"2015","journal-title":"24th USENIX Security Symposium (USENIX Security 15)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.29"},{"key":"ref13","first-page":"173","article-title":"Practical byzantine fault tolerance","volume":"99","author":"castro","year":"1999","journal-title":"OSDI"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","article-title":"The sybil attack","author":"douceur","year":"2002","journal-title":"International Workshop on Peer-to-Peer Systems"},{"key":"ref15","article-title":"Sec 1: Elliptic curve cryptography","volume":"2","author":"brown","year":"2009","journal-title":"Certicom Research"},{"journal-title":"CVE-2017-14457","year":"0","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67816-0_17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382292"},{"journal-title":"BitPay Accept Bitcoin for Online Payments","year":"0","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3360615"},{"journal-title":"NEO a distributed network for the smart economy","year":"0","key":"ref6"},{"journal-title":"EOS IO Technical White Paper v2","year":"0","key":"ref5"},{"journal-title":"Security alert Consensus bug in geth v1 4 19 and v1 5 2","year":"0","key":"ref8"},{"journal-title":"ONT A New High-Performance Public Multi-Chain Project & A Distributed Trust Collaboration Platform","year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23413"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39028-4_9"},{"key":"ref9","first-page":"129","article-title":"Eclipse attacks on bitcoin’s peer-to-peer network","author":"heilman","year":"2015","journal-title":"USENIX Security Symposium"},{"journal-title":"Showpay make bsv to be global daily cash","year":"0","key":"ref20"}],"event":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications","start":{"date-parts":[[2021,5,10]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2021,5,13]]}},"container-title":["IEEE INFOCOM 2021 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9488422\/9488423\/09488749.pdf?arnumber=9488749","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:14:39Z","timestamp":1659482079000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9488749\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/infocom42981.2021.9488749","relation":{},"subject":[],"published":{"date-parts":[[2021,5,10]]}}}