Roozbeh Sarenche
YOU?
Author Swipe
View article: Mining Power Destruction Attacks in the Presence of Petty-Compliant Mining Pools
Mining Power Destruction Attacks in the Presence of Petty-Compliant Mining Pools Open
Bitcoin's security relies on its Proof-of-Work consensus, where miners solve puzzles to propose blocks. The puzzle's difficulty is set by the difficulty adjustment mechanism (DAM), based on the network's available mining power. Attacks tha…
View article: Selfish Mining Time-Averaged Analysis in Bitcoin: Is Orphan Reporting an Effective Countermeasure?
Selfish Mining Time-Averaged Analysis in Bitcoin: Is Orphan Reporting an Effective Countermeasure? Open
A Bitcoin miner who owns a sufficient amount of mining power can perform selfish mining to increase its relative revenue. Studies have demonstrated that the time-averaged profit of a selfish miner starts to rise once the mining difficulty …
View article: Bitcoin under Volatile Block Rewards: How Mempool Statistics Can Influence Bitcoin Mining
Bitcoin under Volatile Block Rewards: How Mempool Statistics Can Influence Bitcoin Mining Open
The security of Bitcoin protocols is deeply dependent on the incentives provided to miners, which come from a combination of block rewards and transaction fees. As Bitcoin experiences more halving events, the protocol reward converges to z…
View article: Commitment Attacks on Ethereum's Reward Mechanism
Commitment Attacks on Ethereum's Reward Mechanism Open
Validators in permissionless, large-scale blockchains, such as Ethereum, are typically payoff-maximizing, rational actors. Ethereum relies on in-protocol incentives, like rewards for correct and timely votes, to induce honest behavior and …
View article: DASLog: Decentralized Auditable Secure Logging for UAV Ecosystems
DASLog: Decentralized Auditable Secure Logging for UAV Ecosystems Open
sponsorship: No Statement Available (Cybersecurity Research Flanders)