4.7 Article

Exploring the Attack Surface of Blockchain: A Comprehensive Survey

期刊

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
卷 22, 期 3, 页码 1977-2008

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/COMST.2020.2975999

关键词

Blockchain; Bitcoin; Delays; Smart contracts; Computer crime; Blockchain; security; attack surface; applications; peer-to-peer systems

资金

  1. Air Force Material Command [FA8750-16-0301]
  2. Global Research Lab Program of the National Research Foundation [NRF-2016K1A1A2912757, NRF-2017R1A4A1015675]

向作者/读者索取更多资源

In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the attack surface to 1) the Blockchain cryptographic constructs, 2) the distributed architecture of the systems using Blockchain, and 3) the Blockchain application context. To each of those contributing factors, we outline several attacks, including selfish mining, the 51 attack, DNS attacks, distributed denial-of-service (DDoS) attacks, consensus delay (due to selfish behavior or distributed denial-of-service attacks), Blockchain forks, orphaned and stale blocks, block ingestion, wallet thefts, smart contract attacks, and privacy attacks. We also explore the causal relationships between these attacks to demonstrate how various attack vectors are connected to one another. A secondary contribution of this work is outlining effective defense measures taken by the Blockchain technology or proposed by researchers to mitigate the effects of these attacks and patch associated vulnerabilities.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据