Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share AttackJan 1, 2016ยทYujin Kwon,Dohyun Kim,Yunmok Son,Jaeyeong Choi,Yongdae Kimยท 0 min read DOILast updated on Jan 1, 2016 AuthorsYujin KwonAuthorsDohyun KimAuthorsYunmok SonAuthorsJaeyeong ChoiAuthorsYongdae Kim← Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4 Jan 1, 2016Enabling Automatic Protocol Behavior Analysis for Android Applications Jan 1, 2016 →