View : 506 Download: 0

Exploring the Attack Surface of Blockchain: A Comprehensive Survey

Title
Exploring the Attack Surface of Blockchain: A Comprehensive Survey
Authors
Saad, MuhammadSpaulding, JeffreyNjilla, LaurentKamhoua, CharlesShetty, SachinNyang, DaeHunMohaisen, David
Ewha Authors
양대헌
SCOPUS Author ID
양대헌scopus
Issue Date
2020
Journal Title
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
ISSN
1553-877XJCR Link
Citation
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS vol. 22, no. 3, pp. 1977 - 2008
Keywords
BlockchainBitcoinDelaysSmart contractsComputer crimesecurityattack surfaceapplicationspeer-to-peer systems
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Indexed
SCIE; SCOPUS WOS
Document Type
Article
Abstract
In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the attack surface to 1) the Blockchain cryptographic constructs, 2) the distributed architecture of the systems using Blockchain, and 3) the Blockchain application context. To each of those contributing factors, we outline several attacks, including selfish mining, the 51 attack, DNS attacks, distributed denial-of-service (DDoS) attacks, consensus delay (due to selfish behavior or distributed denial-of-service attacks), Blockchain forks, orphaned and stale blocks, block ingestion, wallet thefts, smart contract attacks, and privacy attacks. We also explore the causal relationships between these attacks to demonstrate how various attack vectors are connected to one another. A secondary contribution of this work is outlining effective defense measures taken by the Blockchain technology or proposed by researchers to mitigate the effects of these attacks and patch associated vulnerabilities.
DOI
10.1109/COMST.2020.2975999
Appears in Collections:
인공지능대학 > 사이버보안학과 > Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

BROWSE