2018 IEEE International Conference on Cloud Engineering (IC2E) 2018
DOI: 10.1109/ic2e.2018.00070
|View full text |Cite
|
Sign up to set email alerts
|

Thwarting Unwanted Blockchain Content Insertion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(30 citation statements)
references
References 8 publications
0
24
0
Order By: Relevance
“…Another application architecture trade-off is blockchain filtering: safety versus flexibility [24]. Misconduct occurs on blockchains: Bitcoin contains links to pornography on its immutable ledger [40] and INTERPOL notes that chain updates may be used to inject malware [41].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Another application architecture trade-off is blockchain filtering: safety versus flexibility [24]. Misconduct occurs on blockchains: Bitcoin contains links to pornography on its immutable ledger [40] and INTERPOL notes that chain updates may be used to inject malware [41].…”
Section: Resultsmentioning
confidence: 99%
“…For eight papers lacking experimental data, ROBINS-I was deemed unsuitable, and a qualitative medical data assessment tool developed by the Critical Assessment Skills Programme (CASP) was used instead [18] (see Multimedia Appendix 3). ROBINS-I identified a low risk of bias in six papers [19-24] and a serious risk of bias in one paper [25]: this paper was removed. Thus, trade-offs in 14 papers are discussed.…”
Section: Methodsmentioning
confidence: 99%
“…Also, blockchain.cpp is modified to check new transactions for steganographically hidden patterns, identify, and extract hidden messages. 3 3 More and specific details of the actual implementation in Bytecoin and Monero can be made available in the full version upon request. [29] and R3C3 [36] in terms of throughput per transaction (BW) and cost of transmitting 1MB.…”
Section: Generic Steganographic Attackmentioning
confidence: 99%
“…Though the absence of a central censor makes blockchains appealing in some use cases, the increasing amount of illicit content posted to the blockchains poses a serious regulatory issue [2]. Subsequently, several techniques have been discussed to either filter unwanted content before posting to the ledger [3] or remove content from the blockchain [4] [5].…”
Section: Introductionmentioning
confidence: 99%
“…However, none of the existing methods address the covertness and privacy of the inserted data, which is the main motivation of our proposal. See [6] for a recent survey on existing blockchain data insertion methods and [7] for the methods that are used to detect and thwart them.…”
Section: Related Workmentioning
confidence: 99%