2000 character limit reached
The security of the Coordicide: the implementation and analysis of possible attack vectors
Published 25 May 2022 in cs.CR and cs.DC | (2205.12568v1)
Abstract: The goal of the thesis is to study and perform an analysis of the possible attack vectors on the Iota network 2.0 version of the protocol. In this work, existing attack vectors on Distributed Ledger Technologies are studied and their applicability to the Iota 2.0 protocol is discussed. A specific attack that targets the capability of honest participants to write to the ledger is presented and analyzed in a network of nodes that run a full node software version.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.