May 16, 2023, 1:10 a.m. | Aviv Yaish, Aviv Zohar

cs.CR updates on arXiv.org arxiv.org

Cryptocurrencies that are based on Proof-of-Work (PoW) often rely on special
purpose hardware to perform so-called mining operations that secure the system,
with miners receiving freshly minted tokens as a reward for their work. A
notable example of such a cryptocurrency is Bitcoin, which is primarily mined
using ASIC based machines. Due to the supposed profitability of cryptocurrency
mining, such hardware has been in great demand in recent years, in-spite of
high associated costs like electricity.


In this work, we …

asic bitcoin called cryptocurrencies cryptocurrency cryptocurrency mining hardware machines miners mining operations pow pricing special system tokens work

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Cyber Security Culture – Communication and Content Specialist

@ H&M Group | Stockholm, Sweden

Container Hardening, Sr. (Remote | Top Secret)

@ Rackner | San Antonio, TX

GRC and Information Security Analyst

@ Intertek | United States

Information Security Officer

@ Sopra Steria | Bristol, United Kingdom

Casual Area Security Officer South Down Area

@ TSS | County Down, United Kingdom