{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:35:51Z","timestamp":1740101751718,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","funder":[{"name":"National Science Foundation of China","award":["92267203"]},{"name":"Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation","award":["2020B121201001"]},{"name":"National Key R&D Program of China","award":["2022YFB2701700"]},{"name":"Tsinghua Shuimu Scholar"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,30]]},"DOI":"10.1145\/3543507.3583252","type":"proceedings-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T23:30:51Z","timestamp":1682551851000},"page":"2076-2086","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Time-manipulation Attack: Breaking Fairness against Proof of Authority Aura"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7749-6030","authenticated-orcid":false,"given":"Xinrui","family":"Zhang","sequence":"first","affiliation":[{"name":"Research Institute of Trustworthy Autonomous Systems, Department of Computer Science and Engineering, Southern University of Science and Technology, China and School of Computer Science, The University of Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0276-5632","authenticated-orcid":false,"given":"Rujia","family":"Li","sequence":"additional","affiliation":[{"name":"Research Institute of Trustworthy Autonomous Systems, Department of Computer Science and Engineering, Southern University of Science and Technology, China and Institute for Advanced Study, Tsinghua University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2264-749X","authenticated-orcid":false,"given":"Qin","family":"Wang","sequence":"additional","affiliation":[{"name":"CSIRO Data61, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9780-5443","authenticated-orcid":false,"given":"Qi","family":"Wang","sequence":"additional","affiliation":[{"name":"Research Institute of Trustworthy Autonomous Systems, Department of Computer Science and Engineering, Southern University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1385-6807","authenticated-orcid":false,"given":"Sisi","family":"Duan","sequence":"additional","affiliation":[{"name":"Institute for Advanced Study, Tsinghua University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,4,30]]},"reference":[{"volume-title":"d.]. Aura - Authority Round - Wiki (OpenEthereum Documentation). https:\/\/openethereum.github.io\/Aura. accessed","year":"2022","key":"e_1_3_2_4_1_1","unstructured":"[n. d.]. Aura - Authority Round - Wiki (OpenEthereum Documentation). https:\/\/openethereum.github.io\/Aura. accessed: Jul., 2022."},{"volume-title":"d.]. Block timestamp manipulation attack. https:\/\/cryptomarketpool.com\/block-timestamp-manipulation-attack\/. accessed","year":"2022","key":"e_1_3_2_4_2_1","unstructured":"[n. d.]. Block timestamp manipulation attack. https:\/\/cryptomarketpool.com\/block-timestamp-manipulation-attack\/. accessed: Jul., 2022."},{"volume-title":"d.]. Ethereum Yellow Paper: a formal specification of Ethereum, a programmable blockchain. https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf. accessed","year":"2022","key":"e_1_3_2_4_3_1","unstructured":"[n. d.]. Ethereum Yellow Paper: a formal specification of Ethereum, a programmable blockchain. https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf. accessed: Jul., 2022."},{"volume-title":"d.]. Kovan testnet. https:\/\/kovan-testnet.github.io\/website\/. accessed","year":"2022","key":"e_1_3_2_4_4_1","unstructured":"[n. d.]. Kovan testnet. https:\/\/kovan-testnet.github.io\/website\/. accessed: Aug., 2022."},{"volume-title":"d.]. Sokol Sydney. https:\/\/sokolsydney.com\/. accessed","year":"2022","key":"e_1_3_2_4_5_1","unstructured":"[n. d.]. Sokol Sydney. https:\/\/sokolsydney.com\/. accessed: Aug., 2022."},{"volume-title":"Accessed","year":"2022","key":"e_1_3_2_4_6_1","unstructured":"2022. CoinMarketCap. Accessed in Oct, 2022 https:\/\/coinmarketcap.com\/ (2022)."},{"volume-title":"Proof of Authority (VeChain Docs). https:\/\/docs.vechain.org\/thor\/learn\/proof-of-authority.html. accessed","year":"2022","key":"e_1_3_2_4_7_1","unstructured":"2022. Proof of Authority (VeChain Docs). https:\/\/docs.vechain.org\/thor\/learn\/proof-of-authority.html. accessed: Aug., 2022."},{"key":"e_1_3_2_4_8_1","volume-title":"https:\/\/docs.substrate.io\/fundamentals\/consensus\/. accessed","author":"Consensus Substrate","year":"2022","unstructured":"2022. Substrate \u2013 Consensus. https:\/\/docs.substrate.io\/fundamentals\/consensus\/. accessed: Sep., 2022."},{"key":"e_1_3_2_4_9_1","volume-title":"Rational Behaviors in Committee-Based Blockchains. In 24th International Conference on Principles of Distributed Systems (PODC). 1.","author":"Amoussou-Guenou Yackolley","year":"2021","unstructured":"Yackolley Amoussou-Guenou, Bruno Biais, Maria Potop-Butucaru, and Sara Tucci-Piergiovanni. 2021. Rational Behaviors in Committee-Based Blockchains. In 24th International Conference on Principles of Distributed Systems (PODC). 1."},{"key":"e_1_3_2_4_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751373"},{"key":"e_1_3_2_4_11_1","volume-title":"Casper the friendly finality gadget. arXiv preprint arXiv:1710.09437","author":"Buterin Vitalik","year":"2017","unstructured":"Vitalik Buterin and Virgil Griffith. 2017. Casper the friendly finality gadget. arXiv preprint arXiv:1710.09437 (2017)."},{"key":"e_1_3_2_4_12_1","volume-title":"USENIX Symposium on Operating Systems Design and Implementation (OSDI), Vol.\u00a099","author":"Castro Miguel","year":"1999","unstructured":"Miguel Castro, Barbara Liskov, 1999. Practical byzantine fault tolerance. In USENIX Symposium on Operating Systems Design and Implementation (OSDI), Vol.\u00a099. 173\u2013186."},{"key":"e_1_3_2_4_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84245-1_1"},{"key":"e_1_3_2_4_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00040"},{"key":"e_1_3_2_4_15_1","unstructured":"Stefano De\u00a0Angelis Leonardo Aniello Roberto Baldoni Federico Lombardi Andrea Margheri and Vladimiro Sassone. 2018. PBFT vs proof-of-authority: Applying the CAP theorem to permissioned blockchain. (2018)."},{"key":"e_1_3_2_4_16_1","unstructured":"Charlotta Edeland and Therese M\u00f6rk. 2018. Blockchain Technology in the Energy Transition: An Exploratory Study on How Electric Utilities Can Approach Blockchain Technology. https:\/\/www.diva-portal.org\/smash\/record.jsf\u00bfpid=diva2%3A1235832&dswid=-1425."},{"key":"e_1_3_2_4_17_1","volume-title":"The Bitcoin Backbone Protocol: Analysis and Applications. In International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT). Springer, 281\u2013310","author":"Garay Juan","year":"2015","unstructured":"Juan Garay, Aggelos Kiayias, and Nikos Leonardos. 2015. The Bitcoin Backbone Protocol: Analysis and Applications. In International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT). Springer, 281\u2013310."},{"key":"e_1_3_2_4_18_1","volume-title":"Stake-Bleeding Attacks on Proof-of-Stake Blockchains. 2018 Crypto Valley Conference on Blockchain Technology (CVCBT)","author":"Gazi Peter","year":"2018","unstructured":"Peter Gazi, Aggelos Kiayias, and Alexander Russell. 2018. Stake-Bleeding Attacks on Proof-of-Stake Blockchains. 2018 Crypto Valley Conference on Blockchain Technology (CVCBT) (2018), 85\u201392."},{"key":"e_1_3_2_4_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484527"},{"key":"e_1_3_2_4_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2022.103656"},{"key":"e_1_3_2_4_21_1","volume-title":"d.]. 51% attacks. https:\/\/dci.mit.edu\/51-attacks. accessed","author":"Digital\u00a0Currency Initiative MIT","year":"2022","unstructured":"MIT Digital\u00a0Currency Initiative. [n. d.]. 51% attacks. https:\/\/dci.mit.edu\/51-attacks. accessed: Apr., 2022."},{"key":"e_1_3_2_4_22_1","volume-title":"A Low-Cost Cross-Border Payment System Based on Auditable Cryptocurrency With Consortium Blockchain: Joint Digital Currency","author":"Islam Mainul","year":"2022","unstructured":"Md.\u00a0Mainul Islam, Md.\u00a0Kamrul Islam, Md. Shahjalal, Mostafa\u00a0Zaman Chowdhury, and Yeong\u00a0Min Jang. 2022. A Low-Cost Cross-Border Payment System Based on Auditable Cryptocurrency With Consortium Blockchain: Joint Digital Currency. IEEE Transactions on Services Computing (TSC) (2022)."},{"key":"e_1_3_2_4_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3494105.3526239"},{"key":"e_1_3_2_4_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56877-1_16"},{"key":"e_1_3_2_4_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419614.3423263"},{"key":"e_1_3_2_4_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_4_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2019.00046"},{"key":"e_1_3_2_4_28_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review (2008), 21260."},{"key":"e_1_3_2_4_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-18283-9_27"},{"volume-title":"d.]. OpenEthereum. https:\/\/github.com\/openethereum\/openethereum. accessed","year":"2022","key":"e_1_3_2_4_30_1","unstructured":"OpenEthereum. [n. d.]. OpenEthereum. https:\/\/github.com\/openethereum\/openethereum. accessed: Jul., 2022."},{"key":"e_1_3_2_4_31_1","volume-title":"Proceedings of the 27th Annual Network and Distributed System Security Symposium (NDSS).","author":"Parinya Ekparinya","year":"2020","unstructured":"Ekparinya Parinya, Gramoli Vincent, and Jourjon Guillaume. 2020. The Attack of the Clones Against Proof-of-Authority. In Proceedings of the 27th Annual Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_4_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64331-0_5"},{"key":"e_1_3_2_4_33_1","volume-title":"Accelerating bitcoin\u2019s transaction processing. fast money grows on trees, not chains. Cryptology ePrint Archive","author":"Sompolinsky Yonatan","year":"2013","unstructured":"Yonatan Sompolinsky and Aviv Zohar. 2013. Accelerating bitcoin\u2019s transaction processing. fast money grows on trees, not chains. Cryptology ePrint Archive (2013)."},{"key":"e_1_3_2_4_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_32"},{"key":"e_1_3_2_4_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3011876"},{"key":"e_1_3_2_4_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3517394"},{"key":"e_1_3_2_4_37_1","volume-title":"PoA Private Chains. https:\/\/github.com\/ethereum\/guide\/blob\/master\/poa.md. accessed","author":"Wood Gavin","year":"2021","unstructured":"Gavin Wood. 2015. PoA Private Chains. https:\/\/github.com\/ethereum\/guide\/blob\/master\/poa.md. accessed: Dec., 2021."},{"key":"e_1_3_2_4_38_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf","author":"Wood Gavin","year":"2022","unstructured":"Gavin Wood. 2022. Ethereum: A secure decentralised generalised transaction ledger. https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf (2022). accessed: Apr., 2022."},{"key":"e_1_3_2_4_39_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151","author":"Gavin Wood","year":"2014","unstructured":"Gavin Wood 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151, 2014 (2014), 1\u201332."},{"key":"e_1_3_2_4_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490486.3538250"},{"key":"e_1_3_2_4_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"},{"key":"e_1_3_2_4_42_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi13040084"},{"key":"e_1_3_2_4_43_1","volume-title":"Frontrunning Block Attack in PoA: A Case Study. IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","author":"Zhang Xinrui","year":"2022","unstructured":"Xinrui Zhang, Qin Wang, Rujia Li, and Qi Wang. 2022. Frontrunning Block Attack in PoA: A Case Study. IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (2022)."}],"event":{"name":"WWW '23: The ACM Web Conference 2023","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Austin TX USA","acronym":"WWW '23"},"container-title":["Proceedings of the ACM Web Conference 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543507.3583252","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T19:54:23Z","timestamp":1709236463000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583252"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,30]]},"references-count":43,"alternative-id":["10.1145\/3543507.3583252","10.1145\/3543507"],"URL":"https:\/\/doi.org\/10.1145\/3543507.3583252","relation":{},"subject":[],"published":{"date-parts":[[2023,4,30]]},"assertion":[{"value":"2023-04-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}