Iqbal et al., 2021 - Google Patents
Exploring sybil and double-spending risks in blockchain systemsIqbal et al., 2021
View PDF- Document ID
- 4263454958050187781
- Author
- Iqbal M
- Matulevičius R
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
The first step to realise the true potential of blockchain systems is to explain the associated security risks and vulnerabilities. These risks and vulnerabilities, exploited by the threat agent to affect the valuable assets and services. In this work, we use a security risk …
- 238000000034 method 0 description 66
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Iqbal et al. | Exploring sybil and double-spending risks in blockchain systems | |
| Conti et al. | A survey on security and privacy issues of bitcoin | |
| Zaghloul et al. | Bitcoin and blockchain: Security and privacy | |
| Wu et al. | A comprehensive survey of blockchain: From theory to IoT applications and beyond | |
| Zhang et al. | Security and privacy on blockchain | |
| Saad et al. | Exploring the attack surface of blockchain: A systematic overview | |
| Chaganti et al. | A comprehensive review of denial of service attacks in blockchain ecosystem and open challenges | |
| Shammar et al. | A survey of IoT and blockchain integration: Security perspective | |
| Saad et al. | Exploring the attack surface of blockchain: A comprehensive survey | |
| Rahouti et al. | Bitcoin concepts, threats, and machine-learning security solutions | |
| Mosakheil | Security threats classification in blockchains | |
| Hasanova et al. | A survey on blockchain cybersecurity vulnerabilities and possible countermeasures | |
| Ferrag et al. | Blockchain technologies for the internet of things: Research issues and challenges | |
| Panda et al. | Bitcoin and blockchain: history and current applications | |
| Li et al. | Rational protocols and attacks in blockchain system | |
| Nicolas et al. | Blockchain system defensive overview for double-spend and selfish mining attacks: A systematic approach | |
| Yeh et al. | SOChain: A privacy-preserving DDoS data exchange service over soc consortium blockchain | |
| Hellani et al. | On blockchain technology: Overview of bitcoin and future insights | |
| Cheng et al. | A survey of security threats and defense on Blockchain | |
| Zhu et al. | Hybrid blockchain design for privacy preserving crowdsourcing platform | |
| Zhu et al. | Research on the security of blockchain data: A survey | |
| Liu et al. | Sok: Security analysis of blockchain-based cryptocurrency | |
| Islam et al. | Blockchain-enabled cybersecurity provision for scalable heterogeneous network: A comprehensive survey | |
| WO2019170814A1 (en) | Data transaction system and method | |
| Dwivedi et al. | A novel classification of attacks on blockchain layers: Vulnerabilities, attacks, mitigations, and research directions |