A survey on blockchain technology and its security

Blockchain is a technology that has desirable features of decentralization, autonomy, integrity, immutability, verification, fault-tolerance, anonymity, auditability, and transparency. In this paper, we first carry out a deeper survey about blockchain technology, especially its history, consensus al...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Blockchain. Research and applications Online Ročník 3; číslo 2; s. 100067
Hlavní autori: Guo, Huaqun, Yu, Xingjie
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Elsevier Ltd 01.06.2022
Elsevier
Predmet:
ISSN:2096-7209, 2666-9536
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Blockchain is a technology that has desirable features of decentralization, autonomy, integrity, immutability, verification, fault-tolerance, anonymity, auditability, and transparency. In this paper, we first carry out a deeper survey about blockchain technology, especially its history, consensus algorithms' quantitative comparisons, details of cryptography in terms of public key cryptography, Zero-Knowledge Proofs, and hash functions used in the blockchain, and the comprehensive list of blockchain applications. Further, the security of blockchain itself is a focus in this paper. In particular, we assess the blockchain security from risk analysis to derive comprehensive blockchain security risk categories, analyze the real attacks and bugs against blockchain, and summarize the recently developed security measures on blockchain. Finally, the challenges and research trends are presented to achieve more scalable and securer blockchain systems for the massive deployments.
AbstractList Blockchain is a technology that has desirable features of decentralization, autonomy, integrity, immutability, verification, fault-tolerance, anonymity, auditability, and transparency. In this paper, we first carry out a deeper survey about blockchain technology, especially its history, consensus algorithms' quantitative comparisons, details of cryptography in terms of public key cryptography, Zero-Knowledge Proofs, and hash functions used in the blockchain, and the comprehensive list of blockchain applications. Further, the security of blockchain itself is a focus in this paper. In particular, we assess the blockchain security from risk analysis to derive comprehensive blockchain security risk categories, analyze the real attacks and bugs against blockchain, and summarize the recently developed security measures on blockchain. Finally, the challenges and research trends are presented to achieve more scalable and securer blockchain systems for the massive deployments.
ArticleNumber 100067
Author Guo, Huaqun
Yu, Xingjie
Author_xml – sequence: 1
  givenname: Huaqun
  orcidid: 0000-0001-6753-6537
  surname: Guo
  fullname: Guo, Huaqun
  email: guohuaqun@u.nus.edu, guohuaqun@yahoo.com
  organization: Institute for Infocomm Research, A∗STAR, Singapore
– sequence: 2
  givenname: Xingjie
  orcidid: 0000-0002-5147-7795
  surname: Yu
  fullname: Yu, Xingjie
  email: stefanie_yxj@hotmail.com
  organization: Singapore
BookMark eNotkMtqwzAQRUVpoWmaH-jKP-BUb9nQTQh9BALdZC9GIzlR6lpFdgL--zpNN3OHuzgznAdy26UuEPLE6JJRpp-PS4cZlpxyPhWUanNDZlxrXdZK6Ntpp7UuzTTvyaLvo6OSM6WEETPCV0V_yucwFqkrXJvwCw8Qu2IIeOhSm_ZjAZ0v4tAXfcBTjsP4SO4aaPuw-M852b297tYf5fbzfbNebUsvWDWUqI3w0DCotVesmY4C5RKcooAKQGLDG2WQMuOZFDoErkwA7yiVNTgm5mRzxfoER_uT4zfk0SaI9q9IeW8hDxHbYKtKUdlUDmVVSV_LGoX2QqF3jURAPrFerqww_XuOIdseY-gw-JgDDhMxWkbtxaY92otNe7FprzbFL0CAa4M
ContentType Journal Article
Copyright 2022 The Authors
Copyright_xml – notice: 2022 The Authors
DBID 6I.
AAFTH
DOA
DOI 10.1016/j.bcra.2022.100067
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
DOAJ Directory of Open Access Journals
DatabaseTitleList

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2666-9536
ExternalDocumentID oai_doaj_org_article_88504f8bc4884d949c36d35cdbf4cac2
S2096720922000070
GroupedDBID 6I.
AAFTH
ALMA_UNASSIGNED_HOLDINGS
CQIGP
0R~
AAEDW
AALRI
AAXUO
AAYWO
ACVFH
ADCNI
ADVLN
AEUPX
AFPUW
AIGII
AITUG
AKBMS
AKRWK
AKYEP
AMRAJ
EBS
FDB
GROUPED_DOAJ
OK1
ROL
ID FETCH-LOGICAL-d318t-c673daf1a96d51fb04a024ab50ac5aa4cf2f57c017d1436ee257eadb0049ab13
IEDL.DBID DOA
ISICitedReferencesCount 257
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000907670900008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2096-7209
IngestDate Fri Oct 03 12:44:56 EDT 2025
Fri Feb 23 02:39:56 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2
Keywords Risk
Smart contract
Blockchain security
Blockchain
Consensus algorithm
Language English
License This is an open access article under the CC BY-NC-ND license.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-d318t-c673daf1a96d51fb04a024ab50ac5aa4cf2f57c017d1436ee257eadb0049ab13
ORCID 0000-0002-5147-7795
0000-0001-6753-6537
OpenAccessLink https://doaj.org/article/88504f8bc4884d949c36d35cdbf4cac2
ParticipantIDs doaj_primary_oai_doaj_org_article_88504f8bc4884d949c36d35cdbf4cac2
elsevier_sciencedirect_doi_10_1016_j_bcra_2022_100067
PublicationCentury 2000
PublicationDate June 2022
2022-06-01
PublicationDateYYYYMMDD 2022-06-01
PublicationDate_xml – month: 06
  year: 2022
  text: June 2022
PublicationDecade 2020
PublicationTitle Blockchain. Research and applications Online
PublicationYear 2022
Publisher Elsevier Ltd
Elsevier
Publisher_xml – name: Elsevier Ltd
– name: Elsevier
References Elwell, Murphy, Seitzinger (bib65) July 15, 2014
Litke, Stewart (bib77) 7 August 2014
Monrat, Schelen, Andersson (bib49) 2019; 7
King, Nadal (bib33) August, 2012
Ethereum (bib131) March 1, 2021
CrushCrypto (bib42) 2021
Crushcrypto (bib13) 2018
Cryptoslate (bib51) February 28, 2021
Solana (bib74) 2017
Permenev, Dimitrov, Tsankov (bib123) 2020
Popov (bib16) 2018
Yu (bib61) December 5, 2013
Maunder (bib84) November 8, 2017
Mythril (bib97) 2018
Bowe, Chiesa, Green (bib128) 2020
Hayes (bib25) 2020
Germany (bib140) 2018
Santos, Bennett, Lee (bib40) 2021
Sankar, M, Sethumadhavan (bib26) 2017
Torres, Steichen (bib105) 2019
Gervais, Karame, Wüst (bib106) 2016
Xu, Guo, Su, Zheng, Liang, Wong, Wang (bib144) 2020; 88
Sun, Yu (bib122) 2020; 9
Gazi, Kiayias, Zindros (bib133) 2019
Schmidt (bib35) July, 2020
Tramèr, Boneh, Paterson (bib129) 2020
Erazo (bib63) Aug 03, 2020
Karantias, Kiayias, Zindros (bib24) 2020; vol. 12059
Park, Park (bib59) 2017; 9
Bouguera (bib146) December 3, 2019
Kwon (bib19) 2014
Brent, Jurisevic, Kong (bib75) 2018
Sun, Edmundson, Feamster, Chiang, Mittal (bib115) 2017
Cantisano (bib86) January 26, 2018
Kelion (bib88) December 13, 2017
Breidenbach, Daian, Tramer, Juels (bib91) 2018
Wustholz, Christakis (bib111) 2020
Zhou, Yang, Xiang (bib104) 2020
Tran, Luu, Kang, Bentov, Saxena (bib125) 2018
Sharma (bib7) 2021
Mursch (bib85) June 4, 2018
Chaum (bib4) 1982
Leng, Zhou, Zhao, Huang, Bian (bib153) 2020
Zheng, Xie, Dai (bib27) 2017
Conway (bib52) Jun 1, 2021
Frankenfield (bib37) October 16, 2020
Zhao (bib68) Jul 20, 2017
Leng, Ye, Zhou, Zhao, Liu, Guo, Cao, Fu (bib55) 2021; 51
Mavridou, Laszka (bib117) 2018
Kozak (bib41) 2018
Barmes, Bosch (bib148) March 13, 2021
Drijvers, Edalatnejad, Ford (bib113) 2019
Buterin (bib64) September 5, 2012
Kalodner, Goldfeder, Chen (bib118) 2018
Zou, Lo, Kochhar (bib139) 2019; 47
Luu (bib93) 2016
Luu, Chu, Olickel (bib96) 2016
(bib147) July 22, 2020
Aruba (bib79) January 22, 2019
Zhou, Kumar, Bakshi (bib142) 2018
Torres, Schütte, State (bib102) 2018
Wilcke (bib78) September 22, 2016
Vasin (bib12)
Parity Technologies (bib69) November 08, 2017
Amani, Bégel, Bortin, Staples (bib120) 2018
Saad, Spaulding, Njilla (bib151) 2020; 22
Wright (bib130) Aug 4, 2020
Spartak_t (bib73) January 08, 2017
Luu, Velner, Teutsch, Saxena (bib112) 2017
M. Beedham, Hackers secretly ran cryptocurrency mining malware on Indian government sites, 17 Sep 2018. Available online
Frank, Aschermann, Holz (bib98) 2020
Buterin (bib72) June 19, 2016
Nakamoto (bib8) October 2008
OpenEthereum (bib18)
Chen, Xu, Shi (bib154) 2018
Lewis (bib71) October 2, 2016
Zhang, Preneel (bib107) 2019
Sheldon (bib9) 2021
Yu, Guo (bib138) February 5, 2020
Nikolic, Kolluri, Sergey (bib100) 2018
Visa (bib135) March 1, 2021
Chase, MacBrough (bib20) 2018
Chen, Xu, Shi, Zhao, Zhao (bib47) 2018
Ali, Vecchio, Pincheira (bib1) 2019; 21
Abdellatif, Brousmiche (bib121) 2018
CrushCrypto (bib44) 2018
Zhang, Lee (bib45) 2020; 6
Waqas (bib80) September 17, 2017
Leng, Ruan, Jiang, Xu, Liu, Zhou (bib56) 2020; 132
Cimpanu (bib89) 2018
Gamage, Weerasinghe, Dias (bib31) 2020; 1
So, Lee, Park (bib119) 2020
Grubb (bib67) November 8, 2013
Sayadi, Rejeb, Choukair (bib150) 2018
Dasgupta, Shrein, Gupta (bib152) 2019; 3
Berdik, Otoum, Schmidt, Porter, Jararweh (bib32) January 2021; 58
Horwitz, Kar (bib62) August 3, 2016
Bayer, Haber, Stornetta (bib6) 1993
Ghosh, Richardson, Ford, Jansen (bib22) 2021
Grech, Kong, Jurisevic (bib101) 2018; 2
Osborne (bib87) August 3, 2018
Leng, Jiang, Xu, Liu, Zhao, Bian, Shi (bib54) 2019; 234
Buterin (bib10) 2013
Zheng, Xie, Dai, Chen, Wang (bib3) 2018; 14
Roan (bib76) March 27, 2020
Kosba, Miller, Shi, Wen, Papamanthou (bib124) 2016
IOTA (bib39)
Popper (bib70) June 17, 2016
Chirgwin (bib66) August 12, 2013
McCarthy (bib81) September 25, 2017
Matetic, Wüst, Schneider (bib127) 2019
Corporation (bib14) 2016
IBM (bib136)
Kalra, Goel, Dhawan (bib95) 2018
Jiang, Liu, Chan (bib108) 2018
Fu, Ren, Ma (bib110) 2019
Frankenfield (bib60) 2021
Academy Binance (bib17) 2020
NEM (bib23) 2018
Zhang, Zhang, Zhang, Lin (bib103) 2020
Li, Jiang, Chen, Luo, Wen (bib29) June 2020; 107
Dziembowski, Eckey, Faust (bib132) 2019
Kalodner, Möser, Lee (bib143) 2020
Poston (bib58) 2020; 177
Meng, Tischhauser, Wang, Wang, Han (bib50) 2018; 6
Yu, Nikolic, Hou, Saxena (bib134) 2020
Liu, Liu, Cao (bib109) 2018
Cuen (bib90) February 26, 2020
Kerber, Kiayias, Kohlweiss, Zikas (bib126) 2019
De Aguiar, Faiçal, Krishnamachari, Ueyama (bib30) 2021; 53
Kovach (bib53) February 8, 2021
Leng, Yan, Liu, Xu, Zhao, Shi, Wei, Zhang, Chen (bib57) 2020; 50
Mossberg, Manzano, Hennenfent (bib99) 2019
Shor (bib145) 1994
Claburn (bib83) November 22, 2017
Zhang, Cecchetti, Croman, Juels, Shi (bib116) 2016
Accessed: 9 Apr 2021.
Groetsema, Groetsema, Sahdev, Salami, Schwentker, Cioanca (bib11) 2019
Drijvers, Gorbunov, Neven (bib114) 2020
Daian, Goldfeder, Kell (bib141) 2020
Dave, Parikh, Patel (bib48) 2019; 160
M (bib149) January 25, 2021
Joshi, Han, Wang (bib28) May 2018; 1
Castro, Liskov (bib15) 1999
Luu, Narayanan, Baweja (bib21) 2015
Antonopoulos (bib46) June 2017
Lin, Liao (bib2) 2017; 19
Hildenbrandt, Saxena, Rodrigues (bib92) 2018
Haber, Stornetta (bib5) 1991; 3
Tsankov, Dan, Drachsler-Cohen (bib94) 2018
VeChain (bib137)
References_xml – start-page: 1
  year: 2018
  end-page: 7
  ident: bib150
  article-title: Blockchain challenges and security schemes: a survey
  publication-title: Seventh International Conference on Communications and Networking (ComNet); 1–3 Nov 2018; Hammamet, Tunisia
– year: 2018
  ident: bib95
  article-title: ZEUS: analyzing safety of smart contracts
  publication-title: Network and Distributed Systems Security (NDSS) Symposium, San Diego, CA, USA
– start-page: 1661
  year: 2020
  end-page: 1677
  ident: bib123
  article-title: VerX: safety verification of smart contracts
  publication-title: 2020 IEEE Symposium on Security and Privacy; 17–21 May 2020; San Francisco, CA, USA
– year: Aug 4, 2020
  ident: bib130
  article-title: Four-year Anniversary of Bitfinex Hack, and $12M of Stolen BTC Moved
– year: February 26, 2020
  ident: bib90
  article-title: IOTA Being Shut Off is the Latest Chapter in an Absurdist History
– volume: 21
  start-page: 1676
  year: 2019
  end-page: 1717
  ident: bib1
  article-title: Applications of blockchains in the internet of things: a comprehensive survey
  publication-title: IEEE Communications Surveys and Tutorials
– start-page: 173
  year: 1999
  end-page: 186
  ident: bib15
  article-title: Practical Byzantine Fault tolerance
  publication-title: Proceedings of the Third Symposium on Operating Systems Design and Implementation; 22–25 Feb 1999; New Orleans, LA, USA
– year: November 22, 2017
  ident: bib83
  article-title: Crypto-jackers Enlist Google Tag Manager to Smuggle Alt-coin Miners
– volume: vol. 12059
  start-page: 523
  year: 2020
  end-page: 540
  ident: bib24
  article-title: Proof-of-Burn
  publication-title: Financial Cryptography and Data Security. FC 2020. Lecture Notes in Computer Science
– year: February 28, 2021
  ident: bib51
  article-title: Coin rankings
– volume: 177
  start-page: 613
  year: 2020
  end-page: 617
  ident: bib58
  article-title: Mapping the OWASP top ten to blockchain
  publication-title: Procedia Comput. Sci.
– year: September 5, 2012
  ident: bib64
  article-title: Bitfloor Hacked, $250,000 Missing
– year: 2017
  ident: bib74
  article-title: ∖500K hack challenge backfires on blockchain lottery SmartBillions
– start-page: 270
  year: 2016
  end-page: 282
  ident: bib116
  article-title: Town crier: an authenticated data feed for smart contracts
  publication-title: 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS ’16); 24–28 Oct 2016; Vienna, Austria
– year: March 13, 2021
  ident: bib148
  article-title: Quantum Computers and the Bitcoin Blockchain
– year: October 16, 2020
  ident: bib37
  article-title: Proof of Elapsed Time (PoET) (Cryptocurrency)
– start-page: 664
  year: 2018
  end-page: 676
  ident: bib102
  article-title: Osiris: hunting for integer bugs in ethereum smart contracts
  publication-title: 34th Annual Computer Security Applications Conference (ACSAC); 3–7 Dec 2018; San Juan, PR, USA
– year: March 1, 2021
  ident: bib131
  article-title: Upgrading Ethereum to radical new heights
– year: 2021
  ident: bib40
  article-title: Blockchain: Understanding its Uses and Implications
– year: 2016
  ident: bib14
  article-title: PoET 1.0 Specification
– year: 2018
  ident: bib16
  article-title: The Tangle
– volume: 234
  start-page: 767
  year: 2019
  end-page: 778
  ident: bib54
  article-title: Makerchain: a blockchain with chemical signature for self-organizing process in social manufacturing
  publication-title: J. Clean. Prod.
– start-page: 1353
  year: 2018
  end-page: 1370
  ident: bib118
  article-title: Arbitrum: scalable, private smart contracts
  publication-title: 27th USENIX Security Symposium; 15–17 Aug 2018; Baltimore, MD, USA
– year: 2013
  ident: bib10
  article-title: Ethereum whitepaper
– year: 2014
  ident: bib19
  article-title: Tendermint: Consensus without Mining
– volume: 107
  start-page: 841
  year: June 2020
  end-page: 853
  ident: bib29
  article-title: A survey on the security of blockchain systems
  publication-title: Future Generat. Comput. Syst.
– ident: bib12
  article-title: BlackCoin’s Proof-of-Stake Protocol v2
– year: June 19, 2016
  ident: bib72
  article-title: Thinking about Smart Contract Security
– year: 1982
  ident: bib4
  article-title: Computer Systems Established, Maintained, and Trusted by Mutually Suspicious Groups
– start-page: 17
  year: 2018
  end-page: 21
  ident: bib154
  article-title: A survey of blockchain applications in different domains
  publication-title: International Conference on Blockchain Technology and Applications (ICBTA); 10–12 Dec 2018; Xi’an, China
– year: 2018
  ident: bib23
  article-title: NEM Technical Reference
– year: 2018
  ident: bib97
– year: October 2008
  ident: bib8
  article-title: Bitcoin: a peer-to-peer electronic cash system
– start-page: 3
  year: 2016
  end-page: 16
  ident: bib106
  article-title: On the security and performance of proof of work blockchains
  publication-title: 2016 ACM SIGSAC Conference on Computer and Communications Security; 24–28 Oct 2016; Vienna, Austria
– year: July 22, 2020
  ident: bib147
  article-title: NIST’s Post-Quantum Cryptography Program Enters ‘Selection Round’
– volume: 22
  start-page: 1977
  year: 2020
  end-page: 2008
  ident: bib151
  article-title: Exploring the attack surface of blockchain: a systematic overview
  publication-title: IEEE Communications Surveys & Tutorials
– start-page: 175
  year: 2019
  end-page: 192
  ident: bib107
  article-title: Lay down the common metrics: evaluating proof-of-work consensus protocols’ security
  publication-title: 2019 IEEE Symposium on Security and Privacy; 19–23 May 2019; San Francisco, CA, USA
– year: Aug 03, 2020
  ident: bib63
  article-title: Hackers Steal Over $1.3M from European Crypto Trading Platform
– year: November 08, 2017
  ident: bib69
  article-title: Security Alert
– volume: 14
  start-page: 352
  year: 2018
  end-page: 375
  ident: bib3
  article-title: Blockchain challenges and opportunities: a survey
  publication-title: Int. J. Web Grid Serv.
– year: 2021
  ident: bib60
  article-title: Mt. Gox
– start-page: 1
  year: 2017
  end-page: 5
  ident: bib26
  article-title: Survey of consensus protocols on blockchain applications
  publication-title: 2017 International Conference on Advanced Computing and Communication Systems (ICACCS -2017); 6–7 Jan 2017; Coimbatore, India
– year: 2018
  ident: bib75
  article-title: Vandal: A scalable security analysis framework for smart contracts
– year: 2021
  ident: bib42
  article-title: WHAT IS proof OF WORK?
– year: July 15, 2014
  ident: bib65
  article-title: Bitcoin: Questions, Answers, and Analysis of Legal Issues
– volume: 58
  year: January 2021
  ident: bib32
  article-title: A survey on blockchain for information systems management and security
  publication-title: Inf. Process. Manag.
– volume: 7
  start-page: 117134
  year: 2019
  end-page: 117151
  ident: bib49
  article-title: A survey of blockchain from the perspectives of applications, challenges, and opportunities
  publication-title: IEEE Access
– start-page: 1084
  year: 2019
  end-page: 1101
  ident: bib113
  article-title: On the security of two-round multi-signatures
  publication-title: 40th IEEE Symposium on Security and Privacy; 19–23 May 2019; San Francisco, CA, USA
– start-page: 557
  year: 2017
  end-page: 564
  ident: bib27
  article-title: An overview of blockchain technology: architecture, consensus, and future trends
  publication-title: IEEE 6th International Congress on Big Data; 25–30 Jun 2017; Honolulu, HI, USA
– start-page: 1398
  year: 2020
  end-page: 1409
  ident: bib111
  article-title: HARVEY: a greybox fuzzer for smart contracts
  publication-title: The 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering; 8–13 Nov 2020; Virtual Event
– start-page: 90
  year: 2020
  end-page: 105
  ident: bib134
  article-title: OHIE: blockchain scaling made simple
  publication-title: 2020 41st IEEE Symposium on Security and Privacy; 18–21 May 2020; San Francisco, CA, USA
– start-page: 1409
  year: 2017
  end-page: 1426
  ident: bib112
  article-title: SMARTPOOL: practical decentralized pooled mining
  publication-title: 26th USENIX Security Symposium, Vancouver, BC, Canada; 16–18 Aug 2017. Vancouver, BC, Canada
– year: January 26, 2018
  ident: bib86
  article-title: YouTube Ads Hijacked Visitors Computers to Mine Cryptocurrency
– start-page: 1335
  year: 2018
  end-page: 1352
  ident: bib91
  article-title: Enter the Hydra: towards principled bug bounties and exploit-resistant smart contracts
  publication-title: 27th USENIX Security Symposium; 15–17 Aug 2018; Baltimore, MD, USA
– year: June 2017
  ident: bib46
  article-title: Mastering Bitcoin
– reference: M. Beedham, Hackers secretly ran cryptocurrency mining malware on Indian government sites, 17 Sep 2018. Available online:
– reference: . Accessed: 9 Apr 2021.
– volume: 160
  start-page: 740
  year: 2019
  end-page: 745
  ident: bib48
  article-title: A survey on blockchain technology and its proposed solutions
  publication-title: Procedia Comput. Sci.
– volume: 50
  start-page: 182
  year: 2020
  end-page: 192
  ident: bib57
  article-title: ManuChain: combining permissioned blockchain with a holistic optimization model as Bi-level intelligence for smart manufacturing
  publication-title: IEEE Transact. Syst. Man Cybernet.: Systems
– volume: 3
  start-page: 99
  year: 1991
  end-page: 111
  ident: bib5
  article-title: How to time-stamp a digital document
  publication-title: J. Cryptol.
– volume: 1
  start-page: 121
  year: May 2018
  end-page: 147
  ident: bib28
  article-title: A survey on security and privacy issues of blockchain technology
  publication-title: Mathematical Foundations of Computing
– volume: 19
  start-page: 653
  year: 2017
  end-page: 659
  ident: bib2
  article-title: A survey of blockchain security issues and challenges
  publication-title: Int. J. Netw. Secur.
– start-page: 2757
  year: 2020
  end-page: 2774
  ident: bib98
  article-title: EthBMC: a bounded model checker for smart contracts
  publication-title: 29th USENIX Security Symposium; 12–14 Aug 2020; online
– volume: 3
  start-page: 1
  year: 2019
  end-page: 17
  ident: bib152
  article-title: A survey of blockchain from security perspective
  publication-title: Journal of Banking and Financial Technology
– year: Jun 1, 2021
  ident: bib52
  article-title: The 10 most important cryptocurrencies other than bitcoin
  publication-title: Invest
– year: January 22, 2019
  ident: bib79
  article-title: 10 Blockchain and New Age Security Attacks You Should Know
– start-page: 839
  year: 2016
  end-page: 858
  ident: bib124
  article-title: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts
  publication-title: 2016 IEEE Symposium on Security and Privacy; 22–26 May 2016; San Jose, CA, USA
– start-page: 259
  year: 2018
  end-page: 269
  ident: bib108
  article-title: ContractFuzzer: fuzzing smart contracts for vulnerability detection
  publication-title: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering; 3–7 Sep 2018; Montpellier, France
– start-page: 692
  year: 2018
  end-page: 701
  ident: bib125
  article-title: Obscuro: a bitcoin mixer using trusted execution environments
  publication-title: 34th Annual Computer Security Applications Conference (ACSAC); 3–7 Dec 2018; San Juan, PR, USA
– start-page: 2739
  year: 2020
  end-page: 2756
  ident: bib129
  article-title: Remote side-channel attacks on anonymous transactions
  publication-title: 29th USENIX Security Symposium; 12–14 Aug 2020; online
– year: March 27, 2020
  ident: bib76
  article-title: How Spankchain Got Hacked
– year: 2021
  ident: bib7
  article-title: Bit gold
– year: August 12, 2013
  ident: bib66
  article-title: Android Bug Batters Bitcoin Wallets
– start-page: 1168
  year: 2015
  ident: bib21
  article-title: SCP: a computationally-scalable byzantine consensus protocol for blockchains
– start-page: 67
  year: 2018
  end-page: 82
  ident: bib94
  article-title: Securify: practical security analysis of smart contracts
  publication-title: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS’18); 15–19 Oct 2018; Toronto, ON, Canada
– year: February 5, 2020
  ident: bib138
  article-title: System, Device and Method for Blockchain-Base Data Exchange
– volume: 47
  start-page: 2084
  year: 2019
  end-page: 2106
  ident: bib139
  article-title: Smart Contract Development: Challenges and Opportunities
  publication-title: IEEE Trans. Software Eng.,
– volume: 9
  year: 2020
  ident: bib122
  article-title: A formal verification framework for security issues of blockchain smart contracts
  publication-title: Electronics
– year: 2018
  ident: bib20
  article-title: Analysis of the XRP ledger consensus protocol
– ident: bib136
  article-title: IBM Blockchain Suppy Chain Solutiuons
– year: September 25, 2017
  ident: bib81
  article-title: CBS’s Showtime Caught Mining Crypto-coins in Viewers’ Web Browsers
– year: December 5, 2013
  ident: bib61
  article-title: Anonymous Website Disappears with $100M in Bitcoin
– year: 2020
  ident: bib25
  article-title: Proof of Capacity (cryptocurrency)
– start-page: 204
  year: 2018
  end-page: 217
  ident: bib92
  article-title: KEVM: a complete formal semantics of the ethereum virtual machine
  publication-title: 2018 IEEE 31st Computer Security Foundations Symposium (CSF); 9–12 Jul 2018; Oxford, UK
– volume: 6
  start-page: 93
  year: 2020
  end-page: 97
  ident: bib45
  article-title: Analysis of the main consensus protocols of blockchain
  publication-title: ICT Express
– start-page: 2093
  year: 2020
  end-page: 2110
  ident: bib114
  article-title: Pixel: multi-signatures for consensus
  publication-title: 29th USENIX Security Symposium; 12–14 Aug 2020; online
– year: Jul 20, 2017
  ident: bib68
  article-title: $30 Million: Ether Reported Stolen Due to Parity Wallet Breach
– start-page: 139
  year: 2019
  end-page: 156
  ident: bib133
  article-title: Proof-of-Stake sidechains
  publication-title: 2019 40th IEEE Symposium on Security and Privacy; 19–23 May 2019; San Francisco, CA, USA
– year: 2018
  ident: bib140
  article-title: The Crypto SWOT Team Investigates EOS
– volume: 1
  year: 2020
  ident: bib31
  article-title: A survey on blockchain technology concepts, applications, and issues
  publication-title: SN Computer Science
– volume: 88
  year: 2020
  ident: bib144
  article-title: Am I eclipsed? A smart detector of eclipse attacks for ethereum
  publication-title: Comput. Secur.
– year: 2016
  ident: bib93
  article-title: Oyente: An Analysis Tool for Smart Contracts
– start-page: 270
  year: 2018
  end-page: 277
  ident: bib117
  article-title: Tool demonstration: FSolidM for designing secure ethereum smart contracts
  publication-title: International Conference on Principles of Security and Trust; 14–20 Apr 2018; Thessaloniki, Greece
– ident: bib137
  article-title: VeChain Solution Overview
– start-page: 2721
  year: 2020
  end-page: 2738
  ident: bib143
  article-title: BlockSci: design and applications of a blockchain analysis platform
  publication-title: 29th USENIX Security Symposium; 12–14 Aug 2020; online
– ident: bib18
  article-title: Proof of Authority Chain
– volume: 53
  start-page: 1
  year: 2021
  end-page: 27
  ident: bib30
  article-title: A survey of blockchain-based strategies for healthcare
  publication-title: ACM Comput. Surv.
– year: 2021
  ident: bib9
  article-title: A timeline and history of blockchain technology
– volume: 51
  start-page: 237
  year: 2021
  end-page: 252
  ident: bib55
  article-title: Blockchain-secured smart manufacturing in industry 4.0: a survey
  publication-title: IEEE Transact. Syst. Man Cybernet.: Systems
– year: November 8, 2013
  ident: bib67
  article-title: Australian Bitcoin Bank Hacked: $1m+ Stolen
– volume: 6
  start-page: 10179
  year: 2018
  end-page: 10188
  ident: bib50
  article-title: When intrusion detection meets blockchain technology: a review
  publication-title: IEEE Access
– start-page: 157
  year: 2019
  end-page: 174
  ident: bib126
  article-title: Ouroboros crypsinous: privacy-preserving proof-of-stake
  publication-title: 2019 IEEE Symposium on Security and Privacy; 19–23 May 2019; San Francisco, CA, USA
– year: March 1, 2021
  ident: bib135
  article-title: Visa fact sheet
– start-page: 1678
  year: 2020
  end-page: 1694
  ident: bib119
  article-title: VERISMART: a highly precise safety verifier for ethereum smart contracts
  publication-title: 2020 IEEE Symposium on Security and Privacy; 17–21 May 2020; San Francisco, CA, USA
– year: June 17, 2016
  ident: bib70
  article-title: A Hacking of More than $50 Million Dashes Hopes in the World of Virtual Currency
– year: 7 August 2014
  ident: bib77
  article-title: BGP Hijacking for Cryptocurrency Profit
– year: September 17, 2017
  ident: bib80
  article-title: The Pirate Bay Caught Running Cryptocurrency Mining Script
– year: August 3, 2016
  ident: bib62
  article-title: One of the World’s Largest Bitcoin Exchanges Lost $65 Million in a Hack
– start-page: 653
  year: 2018
  end-page: 663
  ident: bib100
  article-title: Finding the greedy, prodigal, and suicidal contracts at scale
  publication-title: The 34th Annual Computer Security Applications Conference(ACSAC); 3–7 Dec 2018. San Juan, PR, USA
– start-page: 2775
  year: 2020
  end-page: 2792
  ident: bib103
  article-title: TxSpector: uncovering attacks in ethereum from transactions
  publication-title: 29th USENIX Security Symposium; 12–14 Aug 2020; online
– year: December 3, 2019
  ident: bib146
  article-title: How will quantum computing affect blockchain?
  publication-title: Consensys
– start-page: 17
  year: 2018
  end-page: 21
  ident: bib47
  article-title: A survey of blockchain applications in different domains
  publication-title: International Conference on Blockchain Technology and Applications (ICBTA); 10–12 Dec; Xi’an, China
– year: December 13, 2017
  ident: bib88
  article-title: Starbucks Cafe’s Wi-Fi Made Computers Mine Crypto-Currency
– start-page: 947
  year: 2020
  end-page: 964
  ident: bib128
  article-title: Zexe: enabling decentralized private computation
  publication-title: 2020 IEEE Symposium on Security and Privacy; 18–21 May 2020; San Francisco, CA, USA
– start-page: 1
  year: 2018
  end-page: 5
  ident: bib121
  article-title: Formal verification of smart contracts based on users and blockchain behaviors models
  publication-title: The 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS); 26–28 Feb 2018; Paris, France
– year: November 8, 2017
  ident: bib84
  article-title: WordPress Plugin Banned for Crypto Mining
– start-page: 2793
  year: 2020
  end-page: 2810
  ident: bib104
  article-title: An ever-evolving game: evaluation of real-world attacks and defenses in ethereum ecosystem
  publication-title: 29th USENIX Security Symposium; 12–14 Aug 2020; online
– start-page: 977
  year: 2017
  end-page: 992
  ident: bib115
  article-title: Counter-RAPTOR: safeguarding tor against active routing attacks
  publication-title: IEEE Symposium on Security and Privacy; 22–26 May 2017; San Jose, CA, USA
– start-page: 106
  year: 2019
  end-page: 123
  ident: bib132
  article-title: Perun: virtual payment hubs over cryptocurrencies
  publication-title: 2019 40th IEEE Symposium on Security and Privacy; 19–23 May 2019; San Francisco, CA, USA
– start-page: 1110
  year: 2019
  end-page: 1114
  ident: bib110
  article-title: EVMFuzzer: detect EVM vulnerabilities via fuzz testing
  publication-title: 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering; 26–30 Aug 2019. Tallinn, Estonia
– year: October 2, 2016
  ident: bib71
  article-title: A Gentle Introduction to Ethereum
– year: July, 2020
  ident: bib35
  article-title: Delegated proof of stake
– year: September 22, 2016
  ident: bib78
  article-title: The Ethereum Network is Currently Undergoing a DoS Attack
– start-page: 65
  year: 2018
  end-page: 68
  ident: bib109
  article-title: ReGuard: finding reentrancy bugs in smart contracts
  publication-title: The 40th International Conference on Software Engineering: Companion; 27 May–3 Jun 2018; Gothenburg, Sweden
– year: 2016
  ident: bib96
  article-title: Making smart contracts smarter
  publication-title: The 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS’16); 24–28 Oct 2016; Vienna, Austria
– year: January 08, 2017
  ident: bib73
  article-title: HackerGold (HKG) has a SERIOUS bug
– volume: 9
  start-page: 164
  year: 2017
  ident: bib59
  article-title: Blockchain security in cloud computing: use cases, challenges, and solutions
  publication-title: Symmetry
– volume: 2
  start-page: 1
  year: 2018
  end-page: 27
  ident: bib101
  article-title: MadMax: surviving out-of-gas conditions in ethereum smart contracts
  publication-title: Proceedings of the ACM on Programming Languages
– start-page: 66
  year: 2018
  end-page: 77
  ident: bib120
  article-title: Towards verifying ethereum smart contract bytecode in Isabelle/HOL
  publication-title: The 7th ACM SIGPLAN International Conference on Certified Programs and Proofs; 8–9 Jan 2018; Los Angeles. CA. USA
– start-page: 1186
  year: 2019
  end-page: 1189
  ident: bib99
  article-title: Manticore: a user-friendly symbolic execution framework for binaries and smart contracts
  publication-title: 34th IEEE/ACM International Conference on Automated Software Engineering (ASE); 11–15 Nov 2019; San Diego, CA, USA
– year: June 4, 2018
  ident: bib85
  article-title: Over 100,000 Drupal Websites Vulnerable to DRUPALGEDDON 2 (CVE-2018-7600)
– year: January 25, 2021
  ident: bib149
  article-title: IOTA Price Prediction 2021 and Beyond: What to Expect?
– year: 2018
  ident: bib13
  article-title: WHAT IS DELEGATED proof-OF-STAKE?
  publication-title: Crushcrypto
– year: 2019
  ident: bib11
  article-title: Blockchain for Business: an Introduction to Hyperledger Technologies
– year: August, 2012
  ident: bib33
  article-title: PPCoin: peer-to-peer crypto-currency with proof-of-stake
– year: 2020
  ident: bib17
  article-title: What is a Directed Acyclic Graph (DAG) in Cryptocurrency?
– year: February 8, 2021
  ident: bib53
  article-title: Tesla Buys $1.5 Billion in Bitcoin, Plans to Accept it as Payment
– start-page: 1591
  year: 2019
  end-page: 1607
  ident: bib105
  article-title: The art of the scam: demystifying honeypots in ethereum smart contracts
  publication-title: 28th USENIX Security Symposium; 14–16 Aug 2019; Santa Clara, CA, USA
– year: 1993
  ident: bib6
  article-title: Improving the efficiency and reliability of digital time-stamping
  publication-title: Sequences II
– volume: 132
  year: 2020
  ident: bib56
  article-title: Blockchain-empowered sustainable manufacturing and product lifecycle management in industry 4.0: a survey
  publication-title: Renew. Sustain. Energy Rev.
– start-page: 783
  year: 2019
  end-page: 800
  ident: bib127
  article-title: Bite: bitcoin lightweight client privacy using trusted execution
  publication-title: 28th USENIX Security Symposium; 14–16 Aug 2019; Santa Clara, CA, USA
– year: 2020
  ident: bib153
  article-title: Blockchain security: a survey of techniques and research directions
– year: August 3, 2018
  ident: bib87
  article-title: MikroTik Routers Enslaved in Massive Coinhive Cryptojacking Campaign
– ident: bib39
– start-page: 124
  year: 1994
  end-page: 134
  ident: bib145
  article-title: Algorithms for quantum computation: discrete logarithms and factoring
  publication-title: 35th Annual Symposium on Foundations of Computer Science; 20–22 Nov 1994 ; Santa Fe, NM, USA
– start-page: 1371
  year: 2018
  end-page: 1385
  ident: bib142
  article-title: Erays: reverse engineering Ethereum’s opaque smart contracts
  publication-title: 27th USENIX Security Symposium; 15–17 Aug 2018; Baltimore, MD, USA
– year: 2018
  ident: bib44
  article-title: What is practical byzantine fault tolerance (PBFT)?
– year: 2018
  ident: bib89
  article-title: IOTA Cryptocurrency Users Lose $4 Million in Clever Phishing Attack
– year: 2021
  ident: bib22
  article-title: A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays
– year: 2018
  ident: bib41
  article-title: Consensus Protocols that Meet Different Business Demands, Part I
– start-page: 910
  year: 2020
  end-page: 927
  ident: bib141
  article-title: Flash Boys 2.0: frontrunning in decentralized exchanges, miner extractable value, and consensus instability
  publication-title: 2020 41st IEEE Symposium on Security and Privacy(SP); 18–21 May 2020; San Francisco, CA, USA
SSID ssib042155373
ssib052855623
ssib044731780
ssj0002911479
Score 2.6479106
Snippet Blockchain is a technology that has desirable features of decentralization, autonomy, integrity, immutability, verification, fault-tolerance, anonymity,...
SourceID doaj
elsevier
SourceType Open Website
Publisher
StartPage 100067
SubjectTerms Blockchain
Blockchain security
Consensus algorithm
Risk
Smart contract
Title A survey on blockchain technology and its security
URI https://dx.doi.org/10.1016/j.bcra.2022.100067
https://doaj.org/article/88504f8bc4884d949c36d35cdbf4cac2
Volume 3
WOSCitedRecordID wos000907670900008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2666-9536
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002911479
  issn: 2096-7209
  databaseCode: DOA
  dateStart: 20200101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2666-9536
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssib044731780
  issn: 2096-7209
  databaseCode: M~E
  dateStart: 20200101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELVQxcDCN6J8yQNrROLYjjMW1IqFiqFDN8s-26IgpShJK7Hw27HjFGVjYclgKY7zdOd3jl7uIXRPBBdC8zKBgumEssImwjBISmGt8_cIpdPObKKYz8VyWb4OrL6CJiy2B47APQjBUuqEBh9p1JS0hJybnIHRjoKCbvf1Vc_gMBX2YOJzmBZl_5dMFHRpqEOjIUKCMiANxvJdl_4BCw2YZXaMDvuSEE_iUk7Qnq1O0dHObgH32XeGyAQ3m3prv_C6wtqT0Ae8-XM9bn-_jmNVGbxqG9z0rnTnaDGbLp6ek97yIDE-udoEeJEb5TJVcsMyp1OqPIkqzVIFTCkKjjhWgE8j4wsdbq3POB8LnWBJ6Sy_QKNqXdlLhIEbJ7jjoiCaGqKFNkbnRqtMGQI5GaPH8PbyMza1kKHNdDfgwZc9-PIv8MeI7bCTPWNHJvZTreROQPYuA_QyQC8j9Ff_8fBrdBCmjLqtGzRq6429RfuwbVdNfdfFg7--fE9_AIKVvgM
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+survey+on+blockchain+technology+and+its+security&rft.jtitle=Blockchain%3A+Research+and+Applications&rft.au=Guo%2C+Huaqun&rft.au=Yu%2C+Xingjie&rft.date=2022-06-01&rft.pub=Elsevier+Ltd&rft.issn=2096-7209&rft.volume=3&rft.issue=2&rft_id=info:doi/10.1016%2Fj.bcra.2022.100067&rft.externalDocID=S2096720922000070
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2096-7209&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2096-7209&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2096-7209&client=summon