A survey on blockchain technology and its security
Blockchain is a technology that has desirable features of decentralization, autonomy, integrity, immutability, verification, fault-tolerance, anonymity, auditability, and transparency. In this paper, we first carry out a deeper survey about blockchain technology, especially its history, consensus al...
Uložené v:
| Vydané v: | Blockchain. Research and applications Online Ročník 3; číslo 2; s. 100067 |
|---|---|
| Hlavní autori: | , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Elsevier Ltd
01.06.2022
Elsevier |
| Predmet: | |
| ISSN: | 2096-7209, 2666-9536 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Blockchain is a technology that has desirable features of decentralization, autonomy, integrity, immutability, verification, fault-tolerance, anonymity, auditability, and transparency. In this paper, we first carry out a deeper survey about blockchain technology, especially its history, consensus algorithms' quantitative comparisons, details of cryptography in terms of public key cryptography, Zero-Knowledge Proofs, and hash functions used in the blockchain, and the comprehensive list of blockchain applications. Further, the security of blockchain itself is a focus in this paper. In particular, we assess the blockchain security from risk analysis to derive comprehensive blockchain security risk categories, analyze the real attacks and bugs against blockchain, and summarize the recently developed security measures on blockchain. Finally, the challenges and research trends are presented to achieve more scalable and securer blockchain systems for the massive deployments. |
|---|---|
| AbstractList | Blockchain is a technology that has desirable features of decentralization, autonomy, integrity, immutability, verification, fault-tolerance, anonymity, auditability, and transparency. In this paper, we first carry out a deeper survey about blockchain technology, especially its history, consensus algorithms' quantitative comparisons, details of cryptography in terms of public key cryptography, Zero-Knowledge Proofs, and hash functions used in the blockchain, and the comprehensive list of blockchain applications. Further, the security of blockchain itself is a focus in this paper. In particular, we assess the blockchain security from risk analysis to derive comprehensive blockchain security risk categories, analyze the real attacks and bugs against blockchain, and summarize the recently developed security measures on blockchain. Finally, the challenges and research trends are presented to achieve more scalable and securer blockchain systems for the massive deployments. |
| ArticleNumber | 100067 |
| Author | Guo, Huaqun Yu, Xingjie |
| Author_xml | – sequence: 1 givenname: Huaqun orcidid: 0000-0001-6753-6537 surname: Guo fullname: Guo, Huaqun email: guohuaqun@u.nus.edu, guohuaqun@yahoo.com organization: Institute for Infocomm Research, A∗STAR, Singapore – sequence: 2 givenname: Xingjie orcidid: 0000-0002-5147-7795 surname: Yu fullname: Yu, Xingjie email: stefanie_yxj@hotmail.com organization: Singapore |
| BookMark | eNotkMtqwzAQRUVpoWmaH-jKP-BUb9nQTQh9BALdZC9GIzlR6lpFdgL--zpNN3OHuzgznAdy26UuEPLE6JJRpp-PS4cZlpxyPhWUanNDZlxrXdZK6Ntpp7UuzTTvyaLvo6OSM6WEETPCV0V_yucwFqkrXJvwCw8Qu2IIeOhSm_ZjAZ0v4tAXfcBTjsP4SO4aaPuw-M852b297tYf5fbzfbNebUsvWDWUqI3w0DCotVesmY4C5RKcooAKQGLDG2WQMuOZFDoErkwA7yiVNTgm5mRzxfoER_uT4zfk0SaI9q9IeW8hDxHbYKtKUdlUDmVVSV_LGoX2QqF3jURAPrFerqww_XuOIdseY-gw-JgDDhMxWkbtxaY92otNe7FprzbFL0CAa4M |
| ContentType | Journal Article |
| Copyright | 2022 The Authors |
| Copyright_xml | – notice: 2022 The Authors |
| DBID | 6I. AAFTH DOA |
| DOI | 10.1016/j.bcra.2022.100067 |
| DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access DOAJ Directory of Open Access Journals |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2666-9536 |
| ExternalDocumentID | oai_doaj_org_article_88504f8bc4884d949c36d35cdbf4cac2 S2096720922000070 |
| GroupedDBID | 6I. AAFTH ALMA_UNASSIGNED_HOLDINGS CQIGP 0R~ AAEDW AALRI AAXUO AAYWO ACVFH ADCNI ADVLN AEUPX AFPUW AIGII AITUG AKBMS AKRWK AKYEP AMRAJ EBS FDB GROUPED_DOAJ OK1 ROL |
| ID | FETCH-LOGICAL-d318t-c673daf1a96d51fb04a024ab50ac5aa4cf2f57c017d1436ee257eadb0049ab13 |
| IEDL.DBID | DOA |
| ISICitedReferencesCount | 257 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000907670900008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2096-7209 |
| IngestDate | Fri Oct 03 12:44:56 EDT 2025 Fri Feb 23 02:39:56 EST 2024 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Keywords | Risk Smart contract Blockchain security Blockchain Consensus algorithm |
| Language | English |
| License | This is an open access article under the CC BY-NC-ND license. |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-d318t-c673daf1a96d51fb04a024ab50ac5aa4cf2f57c017d1436ee257eadb0049ab13 |
| ORCID | 0000-0002-5147-7795 0000-0001-6753-6537 |
| OpenAccessLink | https://doaj.org/article/88504f8bc4884d949c36d35cdbf4cac2 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_88504f8bc4884d949c36d35cdbf4cac2 elsevier_sciencedirect_doi_10_1016_j_bcra_2022_100067 |
| PublicationCentury | 2000 |
| PublicationDate | June 2022 2022-06-01 |
| PublicationDateYYYYMMDD | 2022-06-01 |
| PublicationDate_xml | – month: 06 year: 2022 text: June 2022 |
| PublicationDecade | 2020 |
| PublicationTitle | Blockchain. Research and applications Online |
| PublicationYear | 2022 |
| Publisher | Elsevier Ltd Elsevier |
| Publisher_xml | – name: Elsevier Ltd – name: Elsevier |
| References | Elwell, Murphy, Seitzinger (bib65) July 15, 2014 Litke, Stewart (bib77) 7 August 2014 Monrat, Schelen, Andersson (bib49) 2019; 7 King, Nadal (bib33) August, 2012 Ethereum (bib131) March 1, 2021 CrushCrypto (bib42) 2021 Crushcrypto (bib13) 2018 Cryptoslate (bib51) February 28, 2021 Solana (bib74) 2017 Permenev, Dimitrov, Tsankov (bib123) 2020 Popov (bib16) 2018 Yu (bib61) December 5, 2013 Maunder (bib84) November 8, 2017 Mythril (bib97) 2018 Bowe, Chiesa, Green (bib128) 2020 Hayes (bib25) 2020 Germany (bib140) 2018 Santos, Bennett, Lee (bib40) 2021 Sankar, M, Sethumadhavan (bib26) 2017 Torres, Steichen (bib105) 2019 Gervais, Karame, Wüst (bib106) 2016 Xu, Guo, Su, Zheng, Liang, Wong, Wang (bib144) 2020; 88 Sun, Yu (bib122) 2020; 9 Gazi, Kiayias, Zindros (bib133) 2019 Schmidt (bib35) July, 2020 Tramèr, Boneh, Paterson (bib129) 2020 Erazo (bib63) Aug 03, 2020 Karantias, Kiayias, Zindros (bib24) 2020; vol. 12059 Park, Park (bib59) 2017; 9 Bouguera (bib146) December 3, 2019 Kwon (bib19) 2014 Brent, Jurisevic, Kong (bib75) 2018 Sun, Edmundson, Feamster, Chiang, Mittal (bib115) 2017 Cantisano (bib86) January 26, 2018 Kelion (bib88) December 13, 2017 Breidenbach, Daian, Tramer, Juels (bib91) 2018 Wustholz, Christakis (bib111) 2020 Zhou, Yang, Xiang (bib104) 2020 Tran, Luu, Kang, Bentov, Saxena (bib125) 2018 Sharma (bib7) 2021 Mursch (bib85) June 4, 2018 Chaum (bib4) 1982 Leng, Zhou, Zhao, Huang, Bian (bib153) 2020 Zheng, Xie, Dai (bib27) 2017 Conway (bib52) Jun 1, 2021 Frankenfield (bib37) October 16, 2020 Zhao (bib68) Jul 20, 2017 Leng, Ye, Zhou, Zhao, Liu, Guo, Cao, Fu (bib55) 2021; 51 Mavridou, Laszka (bib117) 2018 Kozak (bib41) 2018 Barmes, Bosch (bib148) March 13, 2021 Drijvers, Edalatnejad, Ford (bib113) 2019 Buterin (bib64) September 5, 2012 Kalodner, Goldfeder, Chen (bib118) 2018 Zou, Lo, Kochhar (bib139) 2019; 47 Luu (bib93) 2016 Luu, Chu, Olickel (bib96) 2016 (bib147) July 22, 2020 Aruba (bib79) January 22, 2019 Zhou, Kumar, Bakshi (bib142) 2018 Torres, Schütte, State (bib102) 2018 Wilcke (bib78) September 22, 2016 Vasin (bib12) Parity Technologies (bib69) November 08, 2017 Amani, Bégel, Bortin, Staples (bib120) 2018 Saad, Spaulding, Njilla (bib151) 2020; 22 Wright (bib130) Aug 4, 2020 Spartak_t (bib73) January 08, 2017 Luu, Velner, Teutsch, Saxena (bib112) 2017 M. Beedham, Hackers secretly ran cryptocurrency mining malware on Indian government sites, 17 Sep 2018. Available online Frank, Aschermann, Holz (bib98) 2020 Buterin (bib72) June 19, 2016 Nakamoto (bib8) October 2008 OpenEthereum (bib18) Chen, Xu, Shi (bib154) 2018 Lewis (bib71) October 2, 2016 Zhang, Preneel (bib107) 2019 Sheldon (bib9) 2021 Yu, Guo (bib138) February 5, 2020 Nikolic, Kolluri, Sergey (bib100) 2018 Visa (bib135) March 1, 2021 Chase, MacBrough (bib20) 2018 Chen, Xu, Shi, Zhao, Zhao (bib47) 2018 Ali, Vecchio, Pincheira (bib1) 2019; 21 Abdellatif, Brousmiche (bib121) 2018 CrushCrypto (bib44) 2018 Zhang, Lee (bib45) 2020; 6 Waqas (bib80) September 17, 2017 Leng, Ruan, Jiang, Xu, Liu, Zhou (bib56) 2020; 132 Cimpanu (bib89) 2018 Gamage, Weerasinghe, Dias (bib31) 2020; 1 So, Lee, Park (bib119) 2020 Grubb (bib67) November 8, 2013 Sayadi, Rejeb, Choukair (bib150) 2018 Dasgupta, Shrein, Gupta (bib152) 2019; 3 Berdik, Otoum, Schmidt, Porter, Jararweh (bib32) January 2021; 58 Horwitz, Kar (bib62) August 3, 2016 Bayer, Haber, Stornetta (bib6) 1993 Ghosh, Richardson, Ford, Jansen (bib22) 2021 Grech, Kong, Jurisevic (bib101) 2018; 2 Osborne (bib87) August 3, 2018 Leng, Jiang, Xu, Liu, Zhao, Bian, Shi (bib54) 2019; 234 Buterin (bib10) 2013 Zheng, Xie, Dai, Chen, Wang (bib3) 2018; 14 Roan (bib76) March 27, 2020 Kosba, Miller, Shi, Wen, Papamanthou (bib124) 2016 IOTA (bib39) Popper (bib70) June 17, 2016 Chirgwin (bib66) August 12, 2013 McCarthy (bib81) September 25, 2017 Matetic, Wüst, Schneider (bib127) 2019 Corporation (bib14) 2016 IBM (bib136) Kalra, Goel, Dhawan (bib95) 2018 Jiang, Liu, Chan (bib108) 2018 Fu, Ren, Ma (bib110) 2019 Frankenfield (bib60) 2021 Academy Binance (bib17) 2020 NEM (bib23) 2018 Zhang, Zhang, Zhang, Lin (bib103) 2020 Li, Jiang, Chen, Luo, Wen (bib29) June 2020; 107 Dziembowski, Eckey, Faust (bib132) 2019 Kalodner, Möser, Lee (bib143) 2020 Poston (bib58) 2020; 177 Meng, Tischhauser, Wang, Wang, Han (bib50) 2018; 6 Yu, Nikolic, Hou, Saxena (bib134) 2020 Liu, Liu, Cao (bib109) 2018 Cuen (bib90) February 26, 2020 Kerber, Kiayias, Kohlweiss, Zikas (bib126) 2019 De Aguiar, Faiçal, Krishnamachari, Ueyama (bib30) 2021; 53 Kovach (bib53) February 8, 2021 Leng, Yan, Liu, Xu, Zhao, Shi, Wei, Zhang, Chen (bib57) 2020; 50 Mossberg, Manzano, Hennenfent (bib99) 2019 Shor (bib145) 1994 Claburn (bib83) November 22, 2017 Zhang, Cecchetti, Croman, Juels, Shi (bib116) 2016 Accessed: 9 Apr 2021. Groetsema, Groetsema, Sahdev, Salami, Schwentker, Cioanca (bib11) 2019 Drijvers, Gorbunov, Neven (bib114) 2020 Daian, Goldfeder, Kell (bib141) 2020 Dave, Parikh, Patel (bib48) 2019; 160 M (bib149) January 25, 2021 Joshi, Han, Wang (bib28) May 2018; 1 Castro, Liskov (bib15) 1999 Luu, Narayanan, Baweja (bib21) 2015 Antonopoulos (bib46) June 2017 Lin, Liao (bib2) 2017; 19 Hildenbrandt, Saxena, Rodrigues (bib92) 2018 Haber, Stornetta (bib5) 1991; 3 Tsankov, Dan, Drachsler-Cohen (bib94) 2018 VeChain (bib137) |
| References_xml | – start-page: 1 year: 2018 end-page: 7 ident: bib150 article-title: Blockchain challenges and security schemes: a survey publication-title: Seventh International Conference on Communications and Networking (ComNet); 1–3 Nov 2018; Hammamet, Tunisia – year: 2018 ident: bib95 article-title: ZEUS: analyzing safety of smart contracts publication-title: Network and Distributed Systems Security (NDSS) Symposium, San Diego, CA, USA – start-page: 1661 year: 2020 end-page: 1677 ident: bib123 article-title: VerX: safety verification of smart contracts publication-title: 2020 IEEE Symposium on Security and Privacy; 17–21 May 2020; San Francisco, CA, USA – year: Aug 4, 2020 ident: bib130 article-title: Four-year Anniversary of Bitfinex Hack, and $12M of Stolen BTC Moved – year: February 26, 2020 ident: bib90 article-title: IOTA Being Shut Off is the Latest Chapter in an Absurdist History – volume: 21 start-page: 1676 year: 2019 end-page: 1717 ident: bib1 article-title: Applications of blockchains in the internet of things: a comprehensive survey publication-title: IEEE Communications Surveys and Tutorials – start-page: 173 year: 1999 end-page: 186 ident: bib15 article-title: Practical Byzantine Fault tolerance publication-title: Proceedings of the Third Symposium on Operating Systems Design and Implementation; 22–25 Feb 1999; New Orleans, LA, USA – year: November 22, 2017 ident: bib83 article-title: Crypto-jackers Enlist Google Tag Manager to Smuggle Alt-coin Miners – volume: vol. 12059 start-page: 523 year: 2020 end-page: 540 ident: bib24 article-title: Proof-of-Burn publication-title: Financial Cryptography and Data Security. FC 2020. Lecture Notes in Computer Science – year: February 28, 2021 ident: bib51 article-title: Coin rankings – volume: 177 start-page: 613 year: 2020 end-page: 617 ident: bib58 article-title: Mapping the OWASP top ten to blockchain publication-title: Procedia Comput. Sci. – year: September 5, 2012 ident: bib64 article-title: Bitfloor Hacked, $250,000 Missing – year: 2017 ident: bib74 article-title: ∖500K hack challenge backfires on blockchain lottery SmartBillions – start-page: 270 year: 2016 end-page: 282 ident: bib116 article-title: Town crier: an authenticated data feed for smart contracts publication-title: 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS ’16); 24–28 Oct 2016; Vienna, Austria – year: March 13, 2021 ident: bib148 article-title: Quantum Computers and the Bitcoin Blockchain – year: October 16, 2020 ident: bib37 article-title: Proof of Elapsed Time (PoET) (Cryptocurrency) – start-page: 664 year: 2018 end-page: 676 ident: bib102 article-title: Osiris: hunting for integer bugs in ethereum smart contracts publication-title: 34th Annual Computer Security Applications Conference (ACSAC); 3–7 Dec 2018; San Juan, PR, USA – year: March 1, 2021 ident: bib131 article-title: Upgrading Ethereum to radical new heights – year: 2021 ident: bib40 article-title: Blockchain: Understanding its Uses and Implications – year: 2016 ident: bib14 article-title: PoET 1.0 Specification – year: 2018 ident: bib16 article-title: The Tangle – volume: 234 start-page: 767 year: 2019 end-page: 778 ident: bib54 article-title: Makerchain: a blockchain with chemical signature for self-organizing process in social manufacturing publication-title: J. Clean. Prod. – start-page: 1353 year: 2018 end-page: 1370 ident: bib118 article-title: Arbitrum: scalable, private smart contracts publication-title: 27th USENIX Security Symposium; 15–17 Aug 2018; Baltimore, MD, USA – year: 2013 ident: bib10 article-title: Ethereum whitepaper – year: 2014 ident: bib19 article-title: Tendermint: Consensus without Mining – volume: 107 start-page: 841 year: June 2020 end-page: 853 ident: bib29 article-title: A survey on the security of blockchain systems publication-title: Future Generat. Comput. Syst. – ident: bib12 article-title: BlackCoin’s Proof-of-Stake Protocol v2 – year: June 19, 2016 ident: bib72 article-title: Thinking about Smart Contract Security – year: 1982 ident: bib4 article-title: Computer Systems Established, Maintained, and Trusted by Mutually Suspicious Groups – start-page: 17 year: 2018 end-page: 21 ident: bib154 article-title: A survey of blockchain applications in different domains publication-title: International Conference on Blockchain Technology and Applications (ICBTA); 10–12 Dec 2018; Xi’an, China – year: 2018 ident: bib23 article-title: NEM Technical Reference – year: 2018 ident: bib97 – year: October 2008 ident: bib8 article-title: Bitcoin: a peer-to-peer electronic cash system – start-page: 3 year: 2016 end-page: 16 ident: bib106 article-title: On the security and performance of proof of work blockchains publication-title: 2016 ACM SIGSAC Conference on Computer and Communications Security; 24–28 Oct 2016; Vienna, Austria – year: July 22, 2020 ident: bib147 article-title: NIST’s Post-Quantum Cryptography Program Enters ‘Selection Round’ – volume: 22 start-page: 1977 year: 2020 end-page: 2008 ident: bib151 article-title: Exploring the attack surface of blockchain: a systematic overview publication-title: IEEE Communications Surveys & Tutorials – start-page: 175 year: 2019 end-page: 192 ident: bib107 article-title: Lay down the common metrics: evaluating proof-of-work consensus protocols’ security publication-title: 2019 IEEE Symposium on Security and Privacy; 19–23 May 2019; San Francisco, CA, USA – year: Aug 03, 2020 ident: bib63 article-title: Hackers Steal Over $1.3M from European Crypto Trading Platform – year: November 08, 2017 ident: bib69 article-title: Security Alert – volume: 14 start-page: 352 year: 2018 end-page: 375 ident: bib3 article-title: Blockchain challenges and opportunities: a survey publication-title: Int. J. Web Grid Serv. – year: 2021 ident: bib60 article-title: Mt. Gox – start-page: 1 year: 2017 end-page: 5 ident: bib26 article-title: Survey of consensus protocols on blockchain applications publication-title: 2017 International Conference on Advanced Computing and Communication Systems (ICACCS -2017); 6–7 Jan 2017; Coimbatore, India – year: 2018 ident: bib75 article-title: Vandal: A scalable security analysis framework for smart contracts – year: 2021 ident: bib42 article-title: WHAT IS proof OF WORK? – year: July 15, 2014 ident: bib65 article-title: Bitcoin: Questions, Answers, and Analysis of Legal Issues – volume: 58 year: January 2021 ident: bib32 article-title: A survey on blockchain for information systems management and security publication-title: Inf. Process. Manag. – volume: 7 start-page: 117134 year: 2019 end-page: 117151 ident: bib49 article-title: A survey of blockchain from the perspectives of applications, challenges, and opportunities publication-title: IEEE Access – start-page: 1084 year: 2019 end-page: 1101 ident: bib113 article-title: On the security of two-round multi-signatures publication-title: 40th IEEE Symposium on Security and Privacy; 19–23 May 2019; San Francisco, CA, USA – start-page: 557 year: 2017 end-page: 564 ident: bib27 article-title: An overview of blockchain technology: architecture, consensus, and future trends publication-title: IEEE 6th International Congress on Big Data; 25–30 Jun 2017; Honolulu, HI, USA – start-page: 1398 year: 2020 end-page: 1409 ident: bib111 article-title: HARVEY: a greybox fuzzer for smart contracts publication-title: The 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering; 8–13 Nov 2020; Virtual Event – start-page: 90 year: 2020 end-page: 105 ident: bib134 article-title: OHIE: blockchain scaling made simple publication-title: 2020 41st IEEE Symposium on Security and Privacy; 18–21 May 2020; San Francisco, CA, USA – start-page: 1409 year: 2017 end-page: 1426 ident: bib112 article-title: SMARTPOOL: practical decentralized pooled mining publication-title: 26th USENIX Security Symposium, Vancouver, BC, Canada; 16–18 Aug 2017. Vancouver, BC, Canada – year: January 26, 2018 ident: bib86 article-title: YouTube Ads Hijacked Visitors Computers to Mine Cryptocurrency – start-page: 1335 year: 2018 end-page: 1352 ident: bib91 article-title: Enter the Hydra: towards principled bug bounties and exploit-resistant smart contracts publication-title: 27th USENIX Security Symposium; 15–17 Aug 2018; Baltimore, MD, USA – year: June 2017 ident: bib46 article-title: Mastering Bitcoin – reference: M. Beedham, Hackers secretly ran cryptocurrency mining malware on Indian government sites, 17 Sep 2018. Available online: – reference: . Accessed: 9 Apr 2021. – volume: 160 start-page: 740 year: 2019 end-page: 745 ident: bib48 article-title: A survey on blockchain technology and its proposed solutions publication-title: Procedia Comput. Sci. – volume: 50 start-page: 182 year: 2020 end-page: 192 ident: bib57 article-title: ManuChain: combining permissioned blockchain with a holistic optimization model as Bi-level intelligence for smart manufacturing publication-title: IEEE Transact. Syst. Man Cybernet.: Systems – volume: 3 start-page: 99 year: 1991 end-page: 111 ident: bib5 article-title: How to time-stamp a digital document publication-title: J. Cryptol. – volume: 1 start-page: 121 year: May 2018 end-page: 147 ident: bib28 article-title: A survey on security and privacy issues of blockchain technology publication-title: Mathematical Foundations of Computing – volume: 19 start-page: 653 year: 2017 end-page: 659 ident: bib2 article-title: A survey of blockchain security issues and challenges publication-title: Int. J. Netw. Secur. – start-page: 2757 year: 2020 end-page: 2774 ident: bib98 article-title: EthBMC: a bounded model checker for smart contracts publication-title: 29th USENIX Security Symposium; 12–14 Aug 2020; online – volume: 3 start-page: 1 year: 2019 end-page: 17 ident: bib152 article-title: A survey of blockchain from security perspective publication-title: Journal of Banking and Financial Technology – year: Jun 1, 2021 ident: bib52 article-title: The 10 most important cryptocurrencies other than bitcoin publication-title: Invest – year: January 22, 2019 ident: bib79 article-title: 10 Blockchain and New Age Security Attacks You Should Know – start-page: 839 year: 2016 end-page: 858 ident: bib124 article-title: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts publication-title: 2016 IEEE Symposium on Security and Privacy; 22–26 May 2016; San Jose, CA, USA – start-page: 259 year: 2018 end-page: 269 ident: bib108 article-title: ContractFuzzer: fuzzing smart contracts for vulnerability detection publication-title: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering; 3–7 Sep 2018; Montpellier, France – start-page: 692 year: 2018 end-page: 701 ident: bib125 article-title: Obscuro: a bitcoin mixer using trusted execution environments publication-title: 34th Annual Computer Security Applications Conference (ACSAC); 3–7 Dec 2018; San Juan, PR, USA – start-page: 2739 year: 2020 end-page: 2756 ident: bib129 article-title: Remote side-channel attacks on anonymous transactions publication-title: 29th USENIX Security Symposium; 12–14 Aug 2020; online – year: March 27, 2020 ident: bib76 article-title: How Spankchain Got Hacked – year: 2021 ident: bib7 article-title: Bit gold – year: August 12, 2013 ident: bib66 article-title: Android Bug Batters Bitcoin Wallets – start-page: 1168 year: 2015 ident: bib21 article-title: SCP: a computationally-scalable byzantine consensus protocol for blockchains – start-page: 67 year: 2018 end-page: 82 ident: bib94 article-title: Securify: practical security analysis of smart contracts publication-title: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS’18); 15–19 Oct 2018; Toronto, ON, Canada – year: February 5, 2020 ident: bib138 article-title: System, Device and Method for Blockchain-Base Data Exchange – volume: 47 start-page: 2084 year: 2019 end-page: 2106 ident: bib139 article-title: Smart Contract Development: Challenges and Opportunities publication-title: IEEE Trans. Software Eng., – volume: 9 year: 2020 ident: bib122 article-title: A formal verification framework for security issues of blockchain smart contracts publication-title: Electronics – year: 2018 ident: bib20 article-title: Analysis of the XRP ledger consensus protocol – ident: bib136 article-title: IBM Blockchain Suppy Chain Solutiuons – year: September 25, 2017 ident: bib81 article-title: CBS’s Showtime Caught Mining Crypto-coins in Viewers’ Web Browsers – year: December 5, 2013 ident: bib61 article-title: Anonymous Website Disappears with $100M in Bitcoin – year: 2020 ident: bib25 article-title: Proof of Capacity (cryptocurrency) – start-page: 204 year: 2018 end-page: 217 ident: bib92 article-title: KEVM: a complete formal semantics of the ethereum virtual machine publication-title: 2018 IEEE 31st Computer Security Foundations Symposium (CSF); 9–12 Jul 2018; Oxford, UK – volume: 6 start-page: 93 year: 2020 end-page: 97 ident: bib45 article-title: Analysis of the main consensus protocols of blockchain publication-title: ICT Express – start-page: 2093 year: 2020 end-page: 2110 ident: bib114 article-title: Pixel: multi-signatures for consensus publication-title: 29th USENIX Security Symposium; 12–14 Aug 2020; online – year: Jul 20, 2017 ident: bib68 article-title: $30 Million: Ether Reported Stolen Due to Parity Wallet Breach – start-page: 139 year: 2019 end-page: 156 ident: bib133 article-title: Proof-of-Stake sidechains publication-title: 2019 40th IEEE Symposium on Security and Privacy; 19–23 May 2019; San Francisco, CA, USA – year: 2018 ident: bib140 article-title: The Crypto SWOT Team Investigates EOS – volume: 1 year: 2020 ident: bib31 article-title: A survey on blockchain technology concepts, applications, and issues publication-title: SN Computer Science – volume: 88 year: 2020 ident: bib144 article-title: Am I eclipsed? A smart detector of eclipse attacks for ethereum publication-title: Comput. Secur. – year: 2016 ident: bib93 article-title: Oyente: An Analysis Tool for Smart Contracts – start-page: 270 year: 2018 end-page: 277 ident: bib117 article-title: Tool demonstration: FSolidM for designing secure ethereum smart contracts publication-title: International Conference on Principles of Security and Trust; 14–20 Apr 2018; Thessaloniki, Greece – ident: bib137 article-title: VeChain Solution Overview – start-page: 2721 year: 2020 end-page: 2738 ident: bib143 article-title: BlockSci: design and applications of a blockchain analysis platform publication-title: 29th USENIX Security Symposium; 12–14 Aug 2020; online – ident: bib18 article-title: Proof of Authority Chain – volume: 53 start-page: 1 year: 2021 end-page: 27 ident: bib30 article-title: A survey of blockchain-based strategies for healthcare publication-title: ACM Comput. Surv. – year: 2021 ident: bib9 article-title: A timeline and history of blockchain technology – volume: 51 start-page: 237 year: 2021 end-page: 252 ident: bib55 article-title: Blockchain-secured smart manufacturing in industry 4.0: a survey publication-title: IEEE Transact. Syst. Man Cybernet.: Systems – year: November 8, 2013 ident: bib67 article-title: Australian Bitcoin Bank Hacked: $1m+ Stolen – volume: 6 start-page: 10179 year: 2018 end-page: 10188 ident: bib50 article-title: When intrusion detection meets blockchain technology: a review publication-title: IEEE Access – start-page: 157 year: 2019 end-page: 174 ident: bib126 article-title: Ouroboros crypsinous: privacy-preserving proof-of-stake publication-title: 2019 IEEE Symposium on Security and Privacy; 19–23 May 2019; San Francisco, CA, USA – year: March 1, 2021 ident: bib135 article-title: Visa fact sheet – start-page: 1678 year: 2020 end-page: 1694 ident: bib119 article-title: VERISMART: a highly precise safety verifier for ethereum smart contracts publication-title: 2020 IEEE Symposium on Security and Privacy; 17–21 May 2020; San Francisco, CA, USA – year: June 17, 2016 ident: bib70 article-title: A Hacking of More than $50 Million Dashes Hopes in the World of Virtual Currency – year: 7 August 2014 ident: bib77 article-title: BGP Hijacking for Cryptocurrency Profit – year: September 17, 2017 ident: bib80 article-title: The Pirate Bay Caught Running Cryptocurrency Mining Script – year: August 3, 2016 ident: bib62 article-title: One of the World’s Largest Bitcoin Exchanges Lost $65 Million in a Hack – start-page: 653 year: 2018 end-page: 663 ident: bib100 article-title: Finding the greedy, prodigal, and suicidal contracts at scale publication-title: The 34th Annual Computer Security Applications Conference(ACSAC); 3–7 Dec 2018. San Juan, PR, USA – start-page: 2775 year: 2020 end-page: 2792 ident: bib103 article-title: TxSpector: uncovering attacks in ethereum from transactions publication-title: 29th USENIX Security Symposium; 12–14 Aug 2020; online – year: December 3, 2019 ident: bib146 article-title: How will quantum computing affect blockchain? publication-title: Consensys – start-page: 17 year: 2018 end-page: 21 ident: bib47 article-title: A survey of blockchain applications in different domains publication-title: International Conference on Blockchain Technology and Applications (ICBTA); 10–12 Dec; Xi’an, China – year: December 13, 2017 ident: bib88 article-title: Starbucks Cafe’s Wi-Fi Made Computers Mine Crypto-Currency – start-page: 947 year: 2020 end-page: 964 ident: bib128 article-title: Zexe: enabling decentralized private computation publication-title: 2020 IEEE Symposium on Security and Privacy; 18–21 May 2020; San Francisco, CA, USA – start-page: 1 year: 2018 end-page: 5 ident: bib121 article-title: Formal verification of smart contracts based on users and blockchain behaviors models publication-title: The 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS); 26–28 Feb 2018; Paris, France – year: November 8, 2017 ident: bib84 article-title: WordPress Plugin Banned for Crypto Mining – start-page: 2793 year: 2020 end-page: 2810 ident: bib104 article-title: An ever-evolving game: evaluation of real-world attacks and defenses in ethereum ecosystem publication-title: 29th USENIX Security Symposium; 12–14 Aug 2020; online – start-page: 977 year: 2017 end-page: 992 ident: bib115 article-title: Counter-RAPTOR: safeguarding tor against active routing attacks publication-title: IEEE Symposium on Security and Privacy; 22–26 May 2017; San Jose, CA, USA – start-page: 106 year: 2019 end-page: 123 ident: bib132 article-title: Perun: virtual payment hubs over cryptocurrencies publication-title: 2019 40th IEEE Symposium on Security and Privacy; 19–23 May 2019; San Francisco, CA, USA – start-page: 1110 year: 2019 end-page: 1114 ident: bib110 article-title: EVMFuzzer: detect EVM vulnerabilities via fuzz testing publication-title: 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering; 26–30 Aug 2019. Tallinn, Estonia – year: October 2, 2016 ident: bib71 article-title: A Gentle Introduction to Ethereum – year: July, 2020 ident: bib35 article-title: Delegated proof of stake – year: September 22, 2016 ident: bib78 article-title: The Ethereum Network is Currently Undergoing a DoS Attack – start-page: 65 year: 2018 end-page: 68 ident: bib109 article-title: ReGuard: finding reentrancy bugs in smart contracts publication-title: The 40th International Conference on Software Engineering: Companion; 27 May–3 Jun 2018; Gothenburg, Sweden – year: 2016 ident: bib96 article-title: Making smart contracts smarter publication-title: The 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS’16); 24–28 Oct 2016; Vienna, Austria – year: January 08, 2017 ident: bib73 article-title: HackerGold (HKG) has a SERIOUS bug – volume: 9 start-page: 164 year: 2017 ident: bib59 article-title: Blockchain security in cloud computing: use cases, challenges, and solutions publication-title: Symmetry – volume: 2 start-page: 1 year: 2018 end-page: 27 ident: bib101 article-title: MadMax: surviving out-of-gas conditions in ethereum smart contracts publication-title: Proceedings of the ACM on Programming Languages – start-page: 66 year: 2018 end-page: 77 ident: bib120 article-title: Towards verifying ethereum smart contract bytecode in Isabelle/HOL publication-title: The 7th ACM SIGPLAN International Conference on Certified Programs and Proofs; 8–9 Jan 2018; Los Angeles. CA. USA – start-page: 1186 year: 2019 end-page: 1189 ident: bib99 article-title: Manticore: a user-friendly symbolic execution framework for binaries and smart contracts publication-title: 34th IEEE/ACM International Conference on Automated Software Engineering (ASE); 11–15 Nov 2019; San Diego, CA, USA – year: June 4, 2018 ident: bib85 article-title: Over 100,000 Drupal Websites Vulnerable to DRUPALGEDDON 2 (CVE-2018-7600) – year: January 25, 2021 ident: bib149 article-title: IOTA Price Prediction 2021 and Beyond: What to Expect? – year: 2018 ident: bib13 article-title: WHAT IS DELEGATED proof-OF-STAKE? publication-title: Crushcrypto – year: 2019 ident: bib11 article-title: Blockchain for Business: an Introduction to Hyperledger Technologies – year: August, 2012 ident: bib33 article-title: PPCoin: peer-to-peer crypto-currency with proof-of-stake – year: 2020 ident: bib17 article-title: What is a Directed Acyclic Graph (DAG) in Cryptocurrency? – year: February 8, 2021 ident: bib53 article-title: Tesla Buys $1.5 Billion in Bitcoin, Plans to Accept it as Payment – start-page: 1591 year: 2019 end-page: 1607 ident: bib105 article-title: The art of the scam: demystifying honeypots in ethereum smart contracts publication-title: 28th USENIX Security Symposium; 14–16 Aug 2019; Santa Clara, CA, USA – year: 1993 ident: bib6 article-title: Improving the efficiency and reliability of digital time-stamping publication-title: Sequences II – volume: 132 year: 2020 ident: bib56 article-title: Blockchain-empowered sustainable manufacturing and product lifecycle management in industry 4.0: a survey publication-title: Renew. Sustain. Energy Rev. – start-page: 783 year: 2019 end-page: 800 ident: bib127 article-title: Bite: bitcoin lightweight client privacy using trusted execution publication-title: 28th USENIX Security Symposium; 14–16 Aug 2019; Santa Clara, CA, USA – year: 2020 ident: bib153 article-title: Blockchain security: a survey of techniques and research directions – year: August 3, 2018 ident: bib87 article-title: MikroTik Routers Enslaved in Massive Coinhive Cryptojacking Campaign – ident: bib39 – start-page: 124 year: 1994 end-page: 134 ident: bib145 article-title: Algorithms for quantum computation: discrete logarithms and factoring publication-title: 35th Annual Symposium on Foundations of Computer Science; 20–22 Nov 1994 ; Santa Fe, NM, USA – start-page: 1371 year: 2018 end-page: 1385 ident: bib142 article-title: Erays: reverse engineering Ethereum’s opaque smart contracts publication-title: 27th USENIX Security Symposium; 15–17 Aug 2018; Baltimore, MD, USA – year: 2018 ident: bib44 article-title: What is practical byzantine fault tolerance (PBFT)? – year: 2018 ident: bib89 article-title: IOTA Cryptocurrency Users Lose $4 Million in Clever Phishing Attack – year: 2021 ident: bib22 article-title: A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays – year: 2018 ident: bib41 article-title: Consensus Protocols that Meet Different Business Demands, Part I – start-page: 910 year: 2020 end-page: 927 ident: bib141 article-title: Flash Boys 2.0: frontrunning in decentralized exchanges, miner extractable value, and consensus instability publication-title: 2020 41st IEEE Symposium on Security and Privacy(SP); 18–21 May 2020; San Francisco, CA, USA |
| SSID | ssib042155373 ssib052855623 ssib044731780 ssj0002911479 |
| Score | 2.6479106 |
| Snippet | Blockchain is a technology that has desirable features of decentralization, autonomy, integrity, immutability, verification, fault-tolerance, anonymity,... |
| SourceID | doaj elsevier |
| SourceType | Open Website Publisher |
| StartPage | 100067 |
| SubjectTerms | Blockchain Blockchain security Consensus algorithm Risk Smart contract |
| Title | A survey on blockchain technology and its security |
| URI | https://dx.doi.org/10.1016/j.bcra.2022.100067 https://doaj.org/article/88504f8bc4884d949c36d35cdbf4cac2 |
| Volume | 3 |
| WOSCitedRecordID | wos000907670900008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2666-9536 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002911479 issn: 2096-7209 databaseCode: DOA dateStart: 20200101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2666-9536 dateEnd: 99991231 omitProxy: false ssIdentifier: ssib044731780 issn: 2096-7209 databaseCode: M~E dateStart: 20200101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELVQxcDCN6J8yQNrROLYjjMW1IqFiqFDN8s-26IgpShJK7Hw27HjFGVjYclgKY7zdOd3jl7uIXRPBBdC8zKBgumEssImwjBISmGt8_cIpdPObKKYz8VyWb4OrL6CJiy2B47APQjBUuqEBh9p1JS0hJybnIHRjoKCbvf1Vc_gMBX2YOJzmBZl_5dMFHRpqEOjIUKCMiANxvJdl_4BCw2YZXaMDvuSEE_iUk7Qnq1O0dHObgH32XeGyAQ3m3prv_C6wtqT0Ae8-XM9bn-_jmNVGbxqG9z0rnTnaDGbLp6ek97yIDE-udoEeJEb5TJVcsMyp1OqPIkqzVIFTCkKjjhWgE8j4wsdbq3POB8LnWBJ6Sy_QKNqXdlLhIEbJ7jjoiCaGqKFNkbnRqtMGQI5GaPH8PbyMza1kKHNdDfgwZc9-PIv8MeI7bCTPWNHJvZTreROQPYuA_QyQC8j9Ff_8fBrdBCmjLqtGzRq6429RfuwbVdNfdfFg7--fE9_AIKVvgM |
| linkProvider | Directory of Open Access Journals |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+survey+on+blockchain+technology+and+its+security&rft.jtitle=Blockchain%3A+Research+and+Applications&rft.au=Guo%2C+Huaqun&rft.au=Yu%2C+Xingjie&rft.date=2022-06-01&rft.pub=Elsevier+Ltd&rft.issn=2096-7209&rft.volume=3&rft.issue=2&rft_id=info:doi/10.1016%2Fj.bcra.2022.100067&rft.externalDocID=S2096720922000070 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2096-7209&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2096-7209&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2096-7209&client=summon |