Looks like there's an answer to the question I raised in the introduction re: unique attack vectors on real-valued consensus systems. There exists a small, recent body of research called STEALTH ATTACKS ON CYBER-PHYSICAL SYSTEMS.
sassmilic/chainlink-price-contract-analysis
Folders and files
| Name | Name | Last commit date | ||
|---|---|---|---|---|