1 code implementation • 24 May 2016 • Maria Apostolaki, Aviv Zohar, Laurent Vanbever
By isolating parts of the network or delaying block propagation, attackers can cause a significant amount of mining power to be wasted, leading to revenue losses and enabling a wide range of exploits such as double spending.
Networking and Internet Architecture Cryptography and Security