2019 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) 2019
DOI: 10.1109/csde48274.2019.9162381
|View full text |Cite
|
Sign up to set email alerts
|

An Empirical Analysis of Blockchain Cybersecurity Incidents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…If a preimage attack is successful, then it compromises the integrity and security of the hash function. 64,[87][88][89] Cryptographic hash functions used in Blockchain, such as SHA-256 (Bitcoin) and Keccak-256 (Ethereum), are designed to have a high level of collision resistance but are theoretically vulnerable to different cybersecurity threats including collision and preimage. 64,90 Quantum computing 91 has the potential to significantly impact the security of many cryptographic algorithms, including hash functions.…”
Section: Walletmentioning
confidence: 99%
See 2 more Smart Citations
“…If a preimage attack is successful, then it compromises the integrity and security of the hash function. 64,[87][88][89] Cryptographic hash functions used in Blockchain, such as SHA-256 (Bitcoin) and Keccak-256 (Ethereum), are designed to have a high level of collision resistance but are theoretically vulnerable to different cybersecurity threats including collision and preimage. 64,90 Quantum computing 91 has the potential to significantly impact the security of many cryptographic algorithms, including hash functions.…”
Section: Walletmentioning
confidence: 99%
“…64,[87][88][89] Cryptographic hash functions used in Blockchain, such as SHA-256 (Bitcoin) and Keccak-256 (Ethereum), are designed to have a high level of collision resistance but are theoretically vulnerable to different cybersecurity threats including collision and preimage. 64,90 Quantum computing 91 has the potential to significantly impact the security of many cryptographic algorithms, including hash functions. Quantum computers [92][93][94] have the potential to break certain asymmetric cryptographic algorithms, such as RSA and Elliptic Curve Cryptography (ECC), which are commonly used in blockchain systems.…”
Section: Walletmentioning
confidence: 99%
See 1 more Smart Citation
“…It identified four main risks (privacy exposure issues, cross-organizational access issues, cross-chain access control problems, and performance optimization issues). [S102] An empirical analysis of Blockchain cybersecurity incidents [ 170 ] Security-incident analysis study that summarises and analyses 65 cybersecurity incidents related to Ethereum and Bitcoin BCs. Vulnerabilities are divided to Ethereum Virtual Machine bytecode, solidity, and BC network.…”
Section: Table A1mentioning
confidence: 99%
“…Since 2015, when Ethereum smart contracts were introduced, there have been several incidents in which the operation of smart contracts that held an amount of Ether resulted in conflicts or issues (Alkhalifah et al, 2019). Two of these incidents were caused by reentrancy vulnerability.…”
Section: Introductionmentioning
confidence: 99%