Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Shorting attack: Predatory, destructive short selling on Proof-of-Stake cryptocurrencies

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Suhyeon-
dc.contributor.authorKim, Seungjoo-
dc.date.accessioned2022-04-02T08:41:23Z-
dc.date.available2022-04-02T08:41:23Z-
dc.date.created2022-04-01-
dc.date.issued2021-
dc.identifier.issn1532-0626-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/139489-
dc.description.abstractBitcoin introduced blockchain which is the transparent and decentralized way of recording the lists of digital currency transactions. Bitcoin's blockchain uses Proof-of-Work as a Sybil control mechanism. However, PoW wastes energy since it uses hash computing competitions to find a block. Hence, various alternative mechanisms have been proposed. Among them, Proof-of-Stake, which is based on the deposit, has been spotlighted. As opposed to Proof-of-Work, Proof-of-Stake requires nodes to have a certain amount of tokens (stake) in order to qualify to validate blocks. The "one-sentence philosophy" of proof of stake is not "security comes from burning energy," but rather "security comes from putting up economic value-at-loss." In this article, contrary to popular belief, we point out that this value-at-loss can be hedged by short selling or other financial products. We propose a "shorting attack," which makes a profit by massive short selling and sabotage to a Proof-of-Stake-based cryptocurrency. The shorting attack implies that the security of Proof-of-Stake-based cryptocurrency can be vulnerable by a low stake ratio.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherWILEY-
dc.subjectMARKET-
dc.titleShorting attack: Predatory, destructive short selling on Proof-of-Stake cryptocurrencies-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Seungjoo-
dc.identifier.doi10.1002/cpe.6585-
dc.identifier.scopusid2-s2.0-85114373830-
dc.identifier.wosid000695509400001-
dc.identifier.bibliographicCitationCONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE-
dc.relation.isPartOfCONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE-
dc.citation.titleCONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE-
dc.type.rimsART-
dc.type.docTypeArticle; Early Access-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordPlusMARKET-
dc.subject.keywordAuthorblockchain-
dc.subject.keywordAuthorProof-of-Stake-
dc.subject.keywordAuthorsecurity-
dc.subject.keywordAuthorshort selling-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Seung joo photo

Kim, Seung joo
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE