Figure 1 (IMAGE)
Caption
Overview of ISM. An attacker’s infiltration miners find three infiltration blocks IB1, IB2, and IB3 in the victim pool in three different cases, respectively. Only IB3 leads to an ISM block ISMB before others find a block. Meanwhile, IB1 wins while IB2 loses in the corresponding intentional forks against the others’ blocks.
Credit
SUTD
Usage Restrictions
Image should be used with appropriate caption and credit.
License
Original content