+

Iqbal et al., 2021 - Google Patents

Exploring sybil and double-spending risks in blockchain systems

Iqbal et al., 2021

View PDF
Document ID
4263454958050187781
Author
Iqbal M
Matulevičius R
Publication year
Publication venue
IEEE Access

External Links

Snippet

The first step to realise the true potential of blockchain systems is to explain the associated security risks and vulnerabilities. These risks and vulnerabilities, exploited by the threat agent to affect the valuable assets and services. In this work, we use a security risk …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Similar Documents

Publication Publication Date Title
Iqbal et al. Exploring sybil and double-spending risks in blockchain systems
Conti et al. A survey on security and privacy issues of bitcoin
Zaghloul et al. Bitcoin and blockchain: Security and privacy
Wu et al. A comprehensive survey of blockchain: From theory to IoT applications and beyond
Zhang et al. Security and privacy on blockchain
Saad et al. Exploring the attack surface of blockchain: A systematic overview
Chaganti et al. A comprehensive review of denial of service attacks in blockchain ecosystem and open challenges
Shammar et al. A survey of IoT and blockchain integration: Security perspective
Saad et al. Exploring the attack surface of blockchain: A comprehensive survey
Rahouti et al. Bitcoin concepts, threats, and machine-learning security solutions
Mosakheil Security threats classification in blockchains
Hasanova et al. A survey on blockchain cybersecurity vulnerabilities and possible countermeasures
Ferrag et al. Blockchain technologies for the internet of things: Research issues and challenges
Panda et al. Bitcoin and blockchain: history and current applications
Li et al. Rational protocols and attacks in blockchain system
Nicolas et al. Blockchain system defensive overview for double-spend and selfish mining attacks: A systematic approach
Yeh et al. SOChain: A privacy-preserving DDoS data exchange service over soc consortium blockchain
Hellani et al. On blockchain technology: Overview of bitcoin and future insights
Cheng et al. A survey of security threats and defense on Blockchain
Zhu et al. Hybrid blockchain design for privacy preserving crowdsourcing platform
Zhu et al. Research on the security of blockchain data: A survey
Liu et al. Sok: Security analysis of blockchain-based cryptocurrency
Islam et al. Blockchain-enabled cybersecurity provision for scalable heterogeneous network: A comprehensive survey
WO2019170814A1 (en) Data transaction system and method
Dwivedi et al. A novel classification of attacks on blockchain layers: Vulnerabilities, attacks, mitigations, and research directions
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载