2020
DOI: 10.1109/comst.2020.2975999
|View full text |Cite
|
Sign up to set email alerts
|

Exploring the Attack Surface of Blockchain: A Comprehensive Survey

Abstract: In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the attack surface to 1) the Blockchain cryptographic constructs, 2) the distributed architecture of the systems using Blockchain, and 3) the Blockchain application context. To each of those contributing factors, we outline several attacks, including selfish mining, the 51% attack, Domain Name System (DNS) attacks, distributed deni… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
155
1
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 226 publications
(157 citation statements)
references
References 140 publications
0
155
1
1
Order By: Relevance
“…Among unspecific attack vectors, there are attacks on application clients and user wallets, and mining malware installed into target computers. The known attacks on user wallet credentials typically occur through phishing, dictionary attacks, through the exploits of a digital signature, hash function, and address vulnerabilities [44], or by exploiting bugs in hardware wallets [45]. Distributed denial of service (DDoS) attacks have targeted off-chain and auxiliary services, such as crypto exchanges and mining pools.…”
Section: Security In Decentralized Applications and Distributed mentioning
confidence: 99%
“…Among unspecific attack vectors, there are attacks on application clients and user wallets, and mining malware installed into target computers. The known attacks on user wallet credentials typically occur through phishing, dictionary attacks, through the exploits of a digital signature, hash function, and address vulnerabilities [44], or by exploiting bugs in hardware wallets [45]. Distributed denial of service (DDoS) attacks have targeted off-chain and auxiliary services, such as crypto exchanges and mining pools.…”
Section: Security In Decentralized Applications and Distributed mentioning
confidence: 99%
“…A decentralized structure, consensus governance and peer-to-peer network architecture of a blockchain are designed to ensure that there is no single point of failure. However, solving the single-point-of-failure problem for a digital system comes with a significant increase in its attack surface [40]. Vulnerabilities in the blockchain structure and governance include the risk of forks, possibility of orphaned blocks and exploitation of a simple majority consensus protocol (the so-called 51 per cent attack).…”
Section: Supply Of Crypto Assetsmentioning
confidence: 99%
“…Moreover, the authors did not mention what type of BlockChain (i.e., Public or Private) they have used in their research. Private BlockChain has scalability issues [26] and pubic BlockChain is vulnerable to Sybil attack in which hackers attempt to control the peer network by using fake identities [27,28]. Studies suggest that the Sybil nodes can carry out many attacks including the ARP Cache Poisoning attack [27,29].…”
Section: Distributed Blockchain Network Architecture (Distblocknet)mentioning
confidence: 99%