2019
DOI: 10.20944/preprints201909.0117.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Taxonomy of Blockchain Threats and Vulnerabilities

Abstract: Blockchain technology has become one of the most popular technologies for maintaining digital transactions. From the foundation of Bitcoin to the now predominant smart contract, blockchain technology promises to induce a shift in thought about digital transactions in many fields, such as energy, healthcare, Internet of Things, cybersecurity, financial services and the supply chain. Despite blockchain technology offers many cryptography advantages such as immutability, digital signature and hashing; it has suff… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 1 publication
(1 reference statement)
0
2
0
Order By: Relevance
“…In other words, consensus algorithms emerged as an exciting and prominent theme for researchers, with numerous studies exploring their intricacies and implications. 4,33,44,67,69,72,75 Additionally, there has been significant attention given to the smart contract vulnerabilities within the Ethereum ecosystem in studies. 37,43,65,66,70,73,75 Another prevalent theme among researchers was the exploration of vulnerabilities and attacks related to the blockchain concept.…”
Section: Limitationsmentioning
confidence: 99%
See 2 more Smart Citations
“…In other words, consensus algorithms emerged as an exciting and prominent theme for researchers, with numerous studies exploring their intricacies and implications. 4,33,44,67,69,72,75 Additionally, there has been significant attention given to the smart contract vulnerabilities within the Ethereum ecosystem in studies. 37,43,65,66,70,73,75 Another prevalent theme among researchers was the exploration of vulnerabilities and attacks related to the blockchain concept.…”
Section: Limitationsmentioning
confidence: 99%
“…4,33,44,67,69,72,75 Additionally, there has been significant attention given to the smart contract vulnerabilities within the Ethereum ecosystem in studies. 37,43,65,66,70,73,75 Another prevalent theme among researchers was the exploration of vulnerabilities and attacks related to the blockchain concept. 37,43,65,75 While the blockchain layer received moderate attention in the reviewed taxonomic literature.…”
Section: Limitationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Another stackbased model was proposed by Zhang et al [293] and consists of six layers, where the layers stand for the application, contract, incentive, consensus, network, and a data layer. The works of Alkhalifah et al [294] and Zhu et al [295] feature groupings consisting of five (network, consensus, mining pool, smart contract, and client vulnerabilities) and four (data privacy, data availability, data integrity, and data controllability attacks) categories, respectively. Natoli et al [296] focus mainly on the consensus layer but include some network-layer attacks as well (e.g., eclipse attacks and BGP hijacking).…”
Section: B Research With Layered or Stacked Categorizationmentioning
confidence: 99%
“…Ethernaut [41] is a wargame focused on Ethereum smart contract vulnerabilities in Solidity. There are several good articles discussing blockchain security [2,17,46] as well.…”
Section: Education and Further Readingmentioning
confidence: 99%