
blockchain mining with deep rl. Cryptology ePrint
Archive.
Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll,
J. A., and Felten, E. W. (2015). Sok: Research per-
spectives and challenges for bitcoin and cryptocurren-
cies. In 2015 IEEE symposium on security and pri-
vacy, pages 104–121. IEEE.
Chaudhry, N. and Yousaf, M. M. (2018). Consensus al-
gorithms in blockchain: Comparative analysis, chal-
lenges and opportunities. In 2018 12th International
Conference on Open Source Systems and Technolo-
gies (ICOSST), pages 54–63. IEEE.
Chicarino, V., Albuquerque, C., Jesus, E., and Rocha, A.
(2020). On the detection of selfish mining and stalker
attacks in blockchain networks. Annals of Telecom-
munications, 75:143–152.
CLARKE, S., CRAIG, I., and WYSZYNSKI, M. (2018).
Litecoin cash: The best of all worlds sha256 cryp-
tocurrency. URL: https://litecoinca. sh/downloads/lcc
whitepaper. pdf.[Last accessed on 2018 Sep 25].
Clifton, J. and Laber, E. (2020). Q-learning: Theory and
applications. Annual Review of Statistics and Its Ap-
plication, 7:279–301.
Courtois, N. T. and Bahack, L. (2014). On subversive miner
strategies and block withholding attack in bitcoin dig-
ital currency. arXiv preprint arXiv:1402.1718.
Eyal, I. (2015). The miner’s dilemma. In 2015 IEEE sym-
posium on security and privacy, pages 89–103. IEEE.
Eyal, I. and Sirer, E. G. (2018). Majority is not enough:
Bitcoin mining is vulnerable. Communications of the
ACM, 61(7):95–102.
Heilman, E. (2014). One weird trick to stop selfish min-
ers: Fresh bitcoins, a solution for the honest miner.
In Financial Cryptography and Data Security: FC
2014 Workshops, BITCOIN and WAHC 2014, Christ
Church, Barbados, March 7, 2014, Revised Selected
Papers 18, pages 161–162. Springer.
Hopwood, D., Bowe, S., Hornby, T., Wilcox, N., et al.
(2016). Zcash protocol specification. GitHub: San
Francisco, CA, USA, 4(220):32.
Hou, C., Zhou, M., Ji, Y., Daian, P., Tramer, F., Fanti,
G., and Juels, A. (2019). Squirrl: Automating at-
tack analysis on blockchain incentive mechanisms
with deep reinforcement learning. arXiv preprint
arXiv:1912.01798.
Judmayer, A., Stifter, N., Krombholz, K., and Weippl, E.
(2022). Blocks and chains: introduction to bitcoin,
cryptocurrencies, and their consensus mechanisms.
Springer Nature.
Mingxiao, D., Xiaofeng, M., Zhe, Z., Xiangwei, W., and
Qijun, C. (2017). A review on consensus algorithm
of blockchain. In 2017 IEEE international conference
on systems, man, and cybernetics (SMC), pages 2567–
2572. IEEE.
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic
cash system. Decentralized business review.
Narayanan, A., Bonneau, J., Felten, E., Miller, A., and
Goldfeder, S. (2016). Bitcoin and cryptocurrency
technologies: a comprehensive introduction. Prince-
ton University Press.
Nayak, K., Kumar, S., Miller, A., and Shi, E. (2016). Stub-
born mining: Generalizing selfish mining and com-
bining with an eclipse attack. In 2016 IEEE Euro-
pean Symposium on Security and Privacy (EuroS&P),
pages 305–320. IEEE.
Nikhalat-Jahromi, A., Saghiri, A. M., and Meybodi, M. R.
(2023a). Nik defense: An artificial intelligence based
defense mechanism against selfish mining in bitcoin.
arXiv e-prints, pages arXiv–2301.
Nikhalat-Jahromi, A., Saghiri, A. M., and Meybodi, M. R.
(2023b). Vdhla: Variable depth hybrid learning au-
tomaton and its application to defense against the
selfish mining attack in bitcoin. arXiv preprint
arXiv:2302.12096.
Panda, S. S., Mohanta, B. K., Satapathy, U., Jena, D., Goun-
tia, D., and Patra, T. K. (2019). Study of blockchain
based decentralized consensus algorithms. In TEN-
CON 2019-2019 IEEE Region 10 Conference (TEN-
CON), pages 908–913. IEEE.
Peterson, M., Andel, T., and Benton, R. (2022). Towards
detection of selfish mining using machine learning. In
International Conference on Cyber Warfare and Secu-
rity, volume 17, pages 237–243.
Saad, M., Njilla, L., Kamhoua, C., and Mohaisen, A.
(2019). Countering selfish mining in blockchains. In
2019 International Conference on Computing, Net-
working and Communications (ICNC), pages 360–
364. IEEE.
Sapirshtein, A., Sompolinsky, Y., and Zohar, A. (2017). Op-
timal selfish mining strategies in bitcoin. In Finan-
cial Cryptography and Data Security: 20th Interna-
tional Conference, FC 2016, Christ Church, Barba-
dos, February 22–26, 2016, Revised Selected Papers
20, pages 515–532. Springer.
Solat, S. and Potop-Butucaru, M. (2016). Zeroblock:
Timestamp-free prevention of block-withholding at-
tack in bitcoin. arXiv preprint arXiv:1605.02435.
Sutton, R. S. and Barto, A. G. (2018). Reinforcement learn-
ing: An introduction. MIT press.
Tschorsch, F. and Scheuermann, B. (2016). Bitcoin and be-
yond: A technical survey on decentralized digital cur-
rencies. IEEE Communications Surveys & Tutorials,
18(3):2084–2123.
Wang, T., Liew, S. C., and Zhang, S. (2021). When
blockchain meets ai: Optimal mining strategy
achieved by machine learning. International Journal
of Intelligent Systems, 36(5):2183–2207.
Wang, W., Hoang, D. T., Hu, P., Xiong, Z., Niyato, D.,
Wang, P., Wen, Y., and Kim, D. I. (2019). A survey on
consensus mechanisms and mining strategy manage-
ment in blockchain networks. Ieee Access, 7:22328–
22370.
Watkins, C. J. and Dayan, P. (1992). Q-learning. Machine
learning, 8:279–292.
Zhang, R. and Preneel, B. (2017). Publish or perish: A
backward-compatible defense against selfish mining
in bitcoin. In Topics in Cryptology–CT-RSA 2017: The
Cryptographers’ Track at the RSA Conference 2017,
San Francisco, CA, USA, February 14–17, 2017, Pro-
ceedings, pages 277–292. Springer.
Q-Defense: When Q-Learning Comes to Help Proof-of-Work Against the Selfish Mining Attack
45