(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Technology and Engineering Exploration (IJATEE)

ISSN (Print):2394-5443    ISSN (Online):2394-7454
Volume-10 Issue-109 December-2023
Full-Text PDF
Paper Title : A systematic literature review on endpoint vulnerabilities of blockchain applications
Author Name : Mohd Azeem Faizi Noor and Khurram Mustafa
Abstract :

Blockchain technology is a publicly accessible decentralized and immutable transaction log that significantly simplifies the recording of transactions and asset management in a corporate network. An asset can be tangible like a house, car, cash, or land, or intangible like intellectual property, patents, copyrights, or branding. It may considered as a unique identifier for every data, with each block in the ledger having its own hash and containing the previous block’s hash. It is one of the most emerging technologies with added built-in flexibility that has changed the world. Because of its all-encompassing nature, it is being accepted and endorsed as a promising technology by financial and non-financial transaction platforms. However, like any other developing technology, it too has its own set of concerns, bottlenecks and obstacles including scalability, privacy, regulation, and security issues. Recent heists and hacks have raised serious questions about its existence and security. Endpoint vulnerabilities are one such crucial and inherently particular security concern that must be addressed. Thus, this study systematically reviews the literature to bring about the state-of-the-art to determine the possible factors, aspects, and causes of the endpoint vulnerabilities with some mitigation countermeasures. Several recent studies were selected to mine the endpoint vulnerability information and focus on the pertinent issues. The major revelation is the lack of user knowledge, insufficient security mechanism, no security layer other than authentication, keylogger malware behind endpoint vulnerability exploitation. It explains the various factors and root causes of endpoint vulnerabilities and provides a relation between the endpoint and its attribute/components. Lacking adequate mechanisms to counteract endpoint vulnerability attacks, users are more likely to make technical and behavioral blunders. Moreover, it fulfills the lack of any systematic literature review (SLR) on endpoint vulnerabilities. It aims to raise security awareness among users, enhance security measures for developers, and provide valuable insights for further investigation by researchers. This study is a step towards understanding and improving the security posture at the endpoints of blockchain networks.

Keywords : Endpoint vulnerabilities, Blockchain, Key, Wallet, Cryptojacking.
Cite this article : Noor MA, Mustafa K. A systematic literature review on endpoint vulnerabilities of blockchain applications. International Journal of Advanced Technology and Engineering Exploration. 2023; 10(109):1666-1695. DOI:10.19101/IJATEE.2023.10101498.
References :
[1]Khan MA, Salah K. IoT security: review, blockchain solutions, and open challenges. Future Generation Computer Systems. 2018; 82:395-411.
[Crossref] [Google Scholar]
[2]Noor MA, Mustafa K. Protocols and guidelines to enhance the endpoint security of blockchain at user’s end. In proceedings of the 3rd international conference on ICT for digital, smart, and sustainable development 2023 (pp. 231-41). European Alliance for Innovation.
[Google Scholar]
[3]https://learn.microsoft.com/en-us/mem/intune/protect/endpoint-security. Accessed 04 November 2023.
[4]https://www.selecthub.com/endpoint-security/endpoint-security-software-requirements/. Accessed 04 November 2023.
[5]Khanum S, Mustafa K. A systematic literature review on sensitive data protection in blockchain applications. Concurrency and Computation: Practice and Experience. 2023; 35(1):e7422.
[Google Scholar]
[6]Levis D, Fontana F, Ughetto E. A look into the future of blockchain technology. Plos One. 2021; 16(11):1-20.
[Google Scholar]
[7]Houy S, Schmid P, Bartel A. Security aspects of cryptocurrency wallets—a systematic literature review. ACM Computing Surveys. 2023; 56(1):1-31.
[Google Scholar]
[8]Nakamoto S. A peer-to-peer electronic cash system. Bitcoin. 2008: 1-24.
[Google Scholar]
[9]Noor MA, Khanum S, Anwar T, Ansari M. A holistic view on blockchain and its issues. In blockchain applications in IoT security 2021 (pp. 21-44). IGI Global.
[Google Scholar]
[10]Zheng XR, Lu Y. Blockchain technology–recent research and future trend. Enterprise Information Systems. 2022; 16(12):1939895.
[Crossref] [Google Scholar]
[11]Baygin N, Baygin M, Karakose M. Blockchain technology: applications, benefits and challenges. In 1st international informatics and software engineering conference 2019 (pp. 1-5). IEEE.
[Google Scholar]
[12]Saad M, Spaulding J, Njilla L, Kamhoua C, Shetty S, Nyang D, et al. Exploring the attack surface of blockchain: a comprehensive survey. IEEE Communications Surveys & Tutorials. 2020; 22(3):1977-2008.
[Google Scholar]
[13]Laroiya C, Saxena D, Komalavalli C. Applications of blockchain technology. In Handbook of Research on Blockchain Technology 2020 (pp. 213-43). Academic Press.
[Google Scholar]
[14]Sunyaev A, Sunyaev A. Distributed ledger technology. Internet Computing: Principles of Distributed Systems and Emerging Internet-Based Technologies. 2020:265-99.
[Crossref] [Google Scholar]
[15]Gugueoth V, Safavat S, Shetty S, Rawat D. A review of IoT security and privacy using decentralized blockchain techniques. Computer Science Review. 2023; 50:100585.
[Crossref] [Google Scholar]
[16]Panwar A, Bhatnagar V. Distributed ledger technology (DLT): the beginning of a technological revolution for blockchain. In 2nd international conference on data, engineering and applications 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[17]Alkhodair AJ, Mohanty SP, Kougianos E. Consensus algorithms of distributed ledger technology--a comprehensive analysis. arXiv preprint arXiv:2309.13498. 2023.
[Crossref] [Google Scholar]
[18]Yermack D, Fingerhut A. Blockchain technologys potential in the financial system. In proceedings of the financial market’s conference 2019 (pp.1-20).
[Google Scholar]
[19]Firdaus A, Razak MF, Feizollah A, Hashem IA, Hazim M, Anuar NB. The rise of “blockchain”: bibliometric analysis of blockchain study. Scientometrics. 2019; 120:1289-331.
[Crossref] [Google Scholar]
[20]Garriga M, Dalla PS, Arias M, De RA, Pareschi R, Andrew TD. Blockchain and cryptocurrencies: a classification and comparison of architecture drivers. Concurrency and Computation: Practice and Experience. 2021; 33(8):e5992.
[Crossref] [Google Scholar]
[21]Chohan UW. Non-fungible tokens: blockchains, scarcity, and value. Critical Blockchain Research Initiative (CBRI) Working Papers. 2021: 1-14.
[Crossref] [Google Scholar]
[22]Auer R, Haslhofer B, Kitzler S, Saggese P, Victor F. The technology of decentralized finance (DeFi). Bank for International Settlements, Monetary and Economic Department; 2023:1-37.
[Google Scholar]
[23]Wang S, Yuan Y, Wang X, Li J, Qin R, Wang FY. An overview of smart contract: architecture, applications, and future trends. In intelligent vehicles symposium (IV) 2018 (pp. 108-13). IEEE.
[Crossref] [Google Scholar]
[24]Lee JH. Systematic approach to analyzing security and vulnerabilities of blockchain systems (Doctoral Dissertation, Massachusetts Institute of Technology). 2019:119-49.
[Google Scholar]
[25]Kim H, Kim D. A taxonomic hierarchy of blockchain consensus algorithms: an evolutionary phylogeny approach. Sensors. 2023; 23(5):1-27.
[Crossref] [Google Scholar]
[26]Dhanya D, Jha B, Jha D. Moderated mediation model of the factors influencing intention to invest in cryptocurrency among millennials and generation Z. Scope. 2023; 13(3):201-13.
[Google Scholar]
[27]Al-hashedi KG, Magalingam P, Maarop N, Samy GN, Manaf AA. A conceptual model to identify illegal activities on the bitcoin system. In international conference on advances in cyber security 2021 (pp. 18-34). Singapore: Springer Singapore.
[Crossref] [Google Scholar]
[28]Latifa ER, Omar A. Blockchain: bitcoin wallet cryptography security, challenges and countermeasures. Journal of Internet Banking and Commerce. 2017; 22(3):1-29.
[Google Scholar]
[29]Dasgupta D, Shrein JM, Gupta KD. A survey of blockchain from security perspective. Journal of Banking and Financial Technology. 2019; 3:1-7.
[Crossref] [Google Scholar]
[30]Halaburda H. Blockchain revolution without the blockchain? Communications of the ACM. 2018; 61(7):27-9.
[Crossref] [Google Scholar]
[31]Frizzo-barker J, Chow-white PA, Adams PR, Mentanko J, Ha D, Green S. Blockchain as a disruptive technology for business: a systematic review. International Journal of Information Management. 2020; 51:102029.
[Crossref] [Google Scholar]
[32]Alqahtani AM, Algarni A. A survey on blockchain technology concepts, applications and security. International Journal of Advanced Computer Science and Applications. 2023; 14(2):841-44.
[Crossref] [Google Scholar]
[33]Mustafa MK, Waheed S. A governance framework with permissioned blockchain for the transparency in e-tendering process. International Journal of Advanced Technology and Engineering Exploration. 2019; 6(61):274-80.
[Crossref] [Google Scholar]
[34]Kombe C, Dida M, Sam A. A review on healthcare information systems and consensus protocols in blockchain technology. International Journal of Advanced Technology and Engineering Exploration. 2019; 5(49):473-83.
[Crossref] [Google Scholar]
[35]Crosby M, Pattanayak P, Verma S, Kalyanaraman V. Blockchain technology: beyond bitcoin. Applied Innovation. 2016; 2(6-10):1-19.
[Google Scholar]
[36]Adlaon JK. A systematic literature review of Ransomware attacks in healthcare. Electronic Theses, Projects, and Dissertations. 2023.
[Google Scholar]
[37]Fatrah A, El KS, Haqiq A, Salah K. Proof of concept blockchain-based voting system. In proceedings of the 4th international conference on big data and internet of things 2019 (pp. 1-5).
[Crossref] [Google Scholar]
[38]Agbo CC, Mahmoud QH, Eklund JM. Blockchain technology in healthcare: a systematic review. Healthcare. 2019; 7(2):1-30.
[Crossref] [Google Scholar]
[39]Farouk A, Alahmadi A, Ghose S, Mashatan A. Blockchain platform for industrial healthcare: vision and future opportunities. Computer Communications. 2020; 154:223-35.
[Crossref] [Google Scholar]
[40]Heston T. A case study in blockchain healthcare innovation. SSRN Journal. 2017: 1-3.
[Google Scholar]
[41]Iqtait A. Blockchain technology in MENA: sociopolitical impacts. Available at SSRN 4475898. 2023: 1-18.
[Crossref] [Google Scholar]
[42]Abuidris Y, Hassan A, Hadabi A, Elfadul I. Risks and opportunities of blockchain based on e-voting systems. In 16th international computer conference on wavelet active media technology and information processing 2019 (pp. 365-8). IEEE.
[Crossref] [Google Scholar]
[43]https://igniteoutsourcing.com/blockchain/blockchain-security-vulnerabilities-risks/. Accessed 04 November 2023.
[44]Rasool MA, Muhammad SH. Blockchain technology: a new domain for cyber forensics. Master Thesis, Halmstad University. 2018.
[Google Scholar]
[45]Patel R, Sethia A, Patil S. Blockchain–future of decentralized systems. In international conference on computing, power and communication technologies 2018 (pp. 369-74). IEEE.
[Crossref] [Google Scholar]
[46]https://www.cloudcodes.com/blog/endpoint-security-risks-due-to-blockchain.html. Accessed 04 November 2023.
[47]https://www.darkreading.com/endpoint/the-good-bad-news-about-blockchain-security. Accessed 04 November 2023.
[48]Conti M, Kumar ES, Lal C, Ruj S. A survey on security and privacy issues of bitcoin. IEEE Communications Surveys & Tutorials. 2018; 20(4):3416-52.
[Crossref] [Google Scholar]
[49]Taylor PJ, Dargahi T, Dehghantanha A, Parizi RM, Choo KK. A systematic literature review of blockchain cyber security. Digital Communications and Networks. 2020; 6(2):147-56.
[Crossref] [Google Scholar]
[50]Zamani E, He Y, Phillips M. On the security risks of the blockchain. Journal of Computer Information Systems. 2020; 60(6):495-506.
[Crossref] [Google Scholar]
[51]Zhang R, Xue R, Liu L. Security and privacy on blockchain. ACM Computing Surveys. 2019; 52(3):1-34.
[Crossref] [Google Scholar]
[52]Hasanova H, Baek UJ, Shin MG, Cho K, Kim MS. A survey on blockchain cybersecurity vulnerabilities and possible countermeasures. International Journal of Network Management. 2019; 29(2):e2060.
[Crossref] [Google Scholar]
[53]https://blockchaintrainingalliance.com/blogs/news/blockchain-security-vs-standard-cybersecurity. Accessed 04 November 2023.
[54]Charoenwong B, Bernardi M. A decade of cryptocurrency ‘hacks’: 2011–2021. Available at SSRN 3944435. 2021.
[Google Scholar]
[55]Eskandari S, Clark J, Barrera D, Stobert E. A first look at the usability of bitcoin key management. arXiv preprint arXiv:1802.04351. 2018.
[Crossref] [Google Scholar]
[56]Atiquzzaman M, Yen N, Xu Z. Big data analytics for cyber-physical system in smart city: BDCPS 2019 (pp.28-9), Shenyang, China. Springer Nature.
[Google Scholar]
[57]Marella V, Kokabha MR, Merikivi J, Tuunainen V. Rebuilding trust in cryptocurrency exchanges after cyber-attacks. In Hawaii international conference on system sciences 2021 (pp. 5636-46).
[Google Scholar]
[58]Lazarenko A, Avdoshin S. Financial risks of the blockchain industry: a survey of cyberattacks. In proceedings of the future technologies conference 2019 (pp. 368-84). Springer International Publishing.
[Crossref] [Google Scholar]
[59]Mccorry P, Möser M, Ali ST. Why preventing a cryptocurrency exchange heist isn’t good enough. In security protocols XXVI: 26th international workshop, Cambridge, UK, 2018 (pp. 225-33). Springer International Publishing.
[Crossref] [Google Scholar]
[60]Rafi S, Yu W, Akbar MA, Mahmood S, Alsanad A, Gumaei A. Readiness model for DevOps implementation in software organizations. Journal of Software: Evolution and Process. 2021; 33(4):e2323.
[Crossref] [Google Scholar]
[61]Keele S. Guidelines for performing systematic literature reviews in software engineering. EBSE Technical Report. 2007.
[Google Scholar]
[62]Guo H, Yu X. A survey on blockchain technology and its security. Blockchain: Research and Applications. 2022; 3(2):100067.
[Crossref] [Google Scholar]
[63]Shrivas MK, Dean TY, Brunda SS. The disruptive blockchain security threats and threat categorization. In first international conference on power, control and computing technologies 2020 (pp. 327-38). IEEE.
[Crossref] [Google Scholar]
[64]Coppolino L, Dantonio S, Mazzeo G, Romano L, Campegiani P. Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing. In ITASEC 2021 (pp. 298-308).
[Google Scholar]
[65]Yli-huumo J, Ko D, Choi S, Park S, Smolander K. Where is current research on blockchain technology?—a systematic review. PloS One. 2016; 11(10):1-27.
[Crossref] [Google Scholar]
[66]Brengel M, Rossow C. Identifying key leakage of bitcoin users. In research in attacks, intrusions, and defenses: 21st international symposium, RAID 2018, Heraklion, Crete, Greece, 2018 (pp. 623-43). Springer International Publishing.
[Crossref] [Google Scholar]
[67]Pal O, Alam B, Thakur V, Singh S. Key management for blockchain technology. ICT Express. 2021; 7(1):76-80.
[Crossref] [Google Scholar]
[68]Kiktenko EO, Kudinov MA, Fedorov AK. Detecting brute-force attacks on cryptocurrency wallets. In international conference on business information systems 2019 (pp. 232-42). Cham: Springer International Publishing.
[Crossref] [Google Scholar]
[69]Singh S, Hosen AS, Yoon B. Blockchain security attacks, challenges, and solutions for the future distributed IoT network. IEEE Access. 2021; 9:13938-59.
[Crossref] [Google Scholar]
[70]Li X, Jiang P, Chen T, Luo X, Wen Q. A survey on the security of blockchain systems. Future Generation Computer Systems. 2020; 107:841-53.
[Crossref] [Google Scholar]
[71]Lu Y. The blockchain: state-of-the-art and research challenges. Journal of Industrial Information Integration. 2019; 15:80-90.
[Crossref] [Google Scholar]
[72]Casino F, Dasaklis TK, Patsakis C. A systematic literature review of blockchain-based applications: current status, classification and open issues. Telematics and Informatics. 2019; 36:55-81.
[Crossref] [Google Scholar]
[73]Tavares B, Correia FF, Restivo A, Faria JP, Aguiar A. A survey of blockchain frameworks and applications. In international conference on soft computing and pattern recognition 2018 (pp. 308-17). Cham: Springer International Publishing.
[Crossref] [Google Scholar]
[74]Antipova T, Emelyanova I. Cryptocurrency in digital wallet: pros and cons. In international conference on digital science 2018 (pp. 313-22). Cham: Springer International Publishing.
[Crossref] [Google Scholar]
[75]Chaudhry N, Yousaf MM. Consensus algorithms in blockchain: comparative analysis, challenges and opportunities. In 12th international conference on open source systems and technologies 2018 (pp. 54-63). IEEE.
[Crossref] [Google Scholar]
[76]Sayadi S, Rejeb SB, Choukair Z. Blockchain challenges and security schemes: a survey. In seventh international conference on communications and networking 2018 (pp. 1-7). IEEE.
[Crossref] [Google Scholar]
[77]Moubarak J, Filiol E, Chamoun M. On blockchain security and relevant attacks. In middle East and North Africa communications conference 2018 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[78]Oosthoek K, Doerr C. From hodl to heist: analysis of cyber security threats to bitcoin exchanges. In international conference on blockchain and cryptocurrency 2020 (pp. 1-9). IEEE.
[Crossref] [Google Scholar]
[79]Van ENJ, Waltman L. VOS viewer manual. Manual for VOS viewer version. 2011; 1:1-27.
[Google Scholar]
[80]Wenhua Z, Qamar F, Abdali TA, Hassan R, Jafri ST, Nguyen QN. Blockchain technology: security issues, healthcare applications, challenges and future trends. Electronics. 2023; 12(3):1-28.
[Crossref] [Google Scholar]
[81]Amiet N. Blockchain vulnerabilities in practice. Digital Threats: Research and Practice. 2021; 2(2):1-7.
[Crossref] [Google Scholar]
[82]Sigurdsson G, Giaretta A, Dragoni N. Vulnerabilities and security breaches in cryptocurrencies. In proceedings of 6th international conference in software engineering for defence applications: SEDA 2018 (pp. 288-99). Springer International Publishing.
[Crossref] [Google Scholar]
[83]Wang Z, Yu H, Zhang Z, Piao J, Liu J. ECDSA weak randomness in Bitcoin. Future Generation Computer Systems. 2020; 102:507-13.
[Crossref] [Google Scholar]
[84]Talat R, Obaidat MS, Muzammal M, Sodhro AH, Luo Z, Pirbhulal S. A decentralised approach to privacy preserving trajectory mining. Future Generation Computer Systems. 2020; 102:382-92.
[Crossref] [Google Scholar]
[85]Wang N, Chen Y, Yang Y, Fang Z, Sun Y. Blockchain private key storage algorithm based on image information hiding. In artificial intelligence and security: 5th international conference, 2019 (pp. 542-52). Springer International Publishing.
[Crossref] [Google Scholar]
[86]Shah P, Manjunath P, Mishra S, Sudarsanan H. Exploratory analysis of block chain security vulnerabilities. Australian Journal of Wireless Technologies, Mobility and Security. 2019; 1-5.
[Google Scholar]
[87]Aydar M, Cetin SC, Ayvaz S, Aygun B. Private key encryption and recovery in blockchain. arXiv preprint arXiv:1907.04156. 2019.
[Crossref] [Google Scholar]
[88]Mahmoud QH, Lescisin M, Altaei M. Research challenges and opportunities in blockchain and cryptocurrencies. Internet Technology Letters. 2019; 2(2):e93.
[Crossref] [Google Scholar]
[89]Bui T, Rao SP, Antikainen M, Aura T. Pitfalls of open architecture: how friends can exploit your cryptocurrency wallet. In proceedings of the 12th European workshop on systems security 2019 (pp. 1-6). ACM.
[Crossref] [Google Scholar]
[90]Feng Q, He D, Zeadally S, Khan MK, Kumar N. A survey on privacy protection in blockchain system. Journal of Network and Computer Applications. 2019; 126:45-58.
[Crossref] [Google Scholar]
[91]https://www.mcafee.com/enterprise/en-us/assets/reports/rp-blockchain-security-risks.pdf. Accessed 04 November 2023.
[92]Mosakheil JH. Security threats classification in blockchains. Culminating Projects in Information Assurance, St. Cloud State University. 2018.
[Google Scholar]
[93]Yakubov A, Shbair W, Wallbom A, Sanda D. A blockchain-based PKI management framework. In the first international workshop on managing and managed by blockchain 2018 (pp. 1-6). IEEE
[Google Scholar]
[94]Steichen M, Hommes S, State R. ChainGuard—a firewall for blockchain applications using SDN with open flow. In principles, systems and applications of IP telecommunications 2017 (pp. 1-8). IEEE.
[Crossref] [Google Scholar]
[95]Vasek M, Bonneau J, Castellucci R, Keith C, Moore T. The bitcoin brain drain: examining the use and abuse of bitcoin brain wallets. In financial cryptography and data security: 20th international conference, 2017 (pp. 609-18). Springer Berlin Heidelberg.
[Crossref] [Google Scholar]
[96]Decker C, Wattenhofer R. Bitcoin transaction malleability and MtGox. In computer security-ESORICS 2014: 19th European symposium on research in computer security, Wroclaw, Poland, 2014. Proceedings, Part II 2014 (pp. 313-26). Springer International Publishing.
[Crossref] [Google Scholar]
[97]https://securityintelligence.com/blockchain-exploits-and-mining-attacks-on-the-rise-as-cryptocurrency-prices-skyrocket/. Accessed 04 November 2023.
[98]Alkurdi F, Elgendi I, Munasinghe KS, Sharma D, Jamalipour A. Blockchain in IoT security: a survey. In 28th international telecommunication networks and applications conference 2018 (pp. 1-4). IEEE.
[Crossref] [Google Scholar]
[99]Bergman S, Asplund M, Nadjm‐tehrani S. Permissioned blockchains and distributed databases: a performance study. Concurrency and Computation: Practice and Experience. 2020; 32(12):e5227.
[Crossref] [Google Scholar]
[100]Semmouni MC, Nitaj A, Belkasmi M. Bitcoin security with a twisted Edwards curve. Journal of Discrete Mathematical Sciences and Cryptography. 2022; 25(2):353-71.
[Crossref] [Google Scholar]
[101]Bos JW, Halderman JA, Heninger N, Moore J, Naehrig M, Wustrow E. Elliptic curve cryptography in practice. In financial cryptography and data security: 18th international conference, 2014 (pp. 157-75). Springer Berlin Heidelberg.
[Crossref] [Google Scholar]
[102]Poddebniak D, Somorovsky J, Schinzel S, Lochter M, Rösler P. Attacking deterministic signature schemes using fault attacks. In European symposium on security and privacy 2018 (pp. 338-52). IEEE.
[Crossref] [Google Scholar]
[103]https://github.com/bitcoin/bips/blob/master/bip-0062.mediawiki. Accessed 04 November 2023.
[104]Pornin T. Deterministic usage of the digital signature algorithm (DSA) and elliptic curve digital signature algorithm (ECDSA). 2013.
[Google Scholar]
[105]Mollajafari S, Bechkoum K. Blockchain technology and related security risks: towards a seven-layer perspective and taxonomy. Sustainability. 2023; 15(18):1-24.
[Crossref] [Google Scholar]
[106]Ulla MM, Sakkari DS. Research on elliptic curve crypto system with bitcoin curves–SECP256k1, NIST256p, NIST521p and LLL. Journal of Cyber Security and Mobility. 2023:103-28.
[Crossref] [Google Scholar]
[107]Bamert T, Decker C, Wattenhofer R, Welten S. Bluewallet: the secure bitcoin wallet. In security and trust management: 10th international workshop, 2014 (pp. 65-80). Springer International Publishing.
[Crossref] [Google Scholar]
[108]Kaushik A, Choudhary A, Ektare C, Thomas D, Akram S. Blockchain—literature survey. In 2nd international conference on recent trends in electronics, information & communication technology 2017 (pp. 2145-8). IEEE.
[Crossref] [Google Scholar]
[109]Maxwell G, Poelstra A, Seurin Y, Wuille P. Simple schnorr multi-signatures with applications to bitcoin. Designs, Codes and Cryptography. 2019; 87(9):2139-64.
[Crossref] [Google Scholar]
[110]Weber K, Schütz AE, Fertig T, Müller NH. Exploiting the human factor: social engineering attacks on cryptocurrency users. In learning and collaboration technologies. human and technology ecosystems: 7th international conference, LCT 2020, Held as Part of the 22nd HCI international conference, HCII, Copenhagen, Denmark, Proceedings, Part II 2020 (pp. 650-68). Springer International Publishing.
[Crossref] [Google Scholar]
[111]Chanti S, Chithralekha T. A literature review on classification of phishing attacks. International Journal of Advanced Technology and Engineering Exploration. 2022; 9(89):446-76.
[Crossref] [Google Scholar]
[112]Astrakhantseva I, Astrakhantsev R, Los A. Cryptocurrency fraud schemes analysis. In SHS web of conferences 2021 (pp. 1-7). EDP Sciences.
[113]Elrom E, Elrom E. Security and compliance. The blockchain developer: a practical guide for designing, implementing, publishing, testing, and securing Distributed Blockchain-based Projects. 2019:419-66.
[Crossref] [Google Scholar]
[114]Wijesekara PA, Gunawardena S. A review of blockchain technology in knowledge-defined networking, its application, benefits, and challenges. Network. 2023; 3(3):343-421.
[Crossref] [Google Scholar]
[115]Aziz AB, Ngah SB, Dun YT, Bee TF. Coinhive’s monero drive-by crypto-jacking. In IOP conference series: materials science and engineering 2020 (pp. 1-9). IOP Publishing.
[Crossref] [Google Scholar]
[116]Pallas R. Bitcoin security. [Unpublished Master Dissertation]. Tallin University of Technology. 2012.
[Google Scholar]
[117]Eskandari S, Leoutsarakos A, Mursch T, Clark J. A first look at browser-based cryptojacking. In European symposium on security and privacy workshops (EuroS&PW) 2018 (pp. 58-66). IEEE.
[Crossref] [Google Scholar]
[118]Kim S, Kim J. POSTER: mining with proof-of-probability in blockchain. In proceedings of the 2018 on Asia conference on computer and communications security 2018 (pp. 841-3). ACM.
[Crossref] [Google Scholar]
[119]https://www.dropzone.dev/. Accessed 04 November 2023.
[120]https://www.cnet.com/tech/computing/devilrobber-trojan-steals-bitcoins-and-data/. Accessed 04 November 2023.
[121]Franco P. Understanding bitcoin: cryptography, engineering and economics. John Wiley & Sons; 2014.
[Google Scholar]
[122]Cohen S, Rosenthal A, Zohar A. Reasoning about the future in blockchain databases. In 36th international conference on data engineering 2020 (pp. 1930-3). IEEE.
[Crossref] [Google Scholar]
[123]Furneaux N. Investigating cryptocurrencies: understanding, extracting, and analyzing blockchain evidence. John Wiley & Sons; 2018.
[Google Scholar]
[124]Nowroozi E, Seyedshoari S, Mekdad Y, Savaş E, Conti M. Cryptocurrency wallets: assessment and security. In blockchain for cybersecurity in cyber-physical systems 2022 (pp. 1-19). Cham: Springer International Publishing.
[Crossref] [Google Scholar]
[125]Erinle Y, Kethepalli Y, Feng Y, Xu J. SoK: design, vulnerabilities and defense of cryptocurrency wallets. arXiv preprint arXiv:2307.12874. 2023.
[Crossref] [Google Scholar]
[126]Mills DC, Wang K, Malone B, Ravi A, Marquardt J, Badev AI, et al. Distributed ledger technology in payments, clearing, and settlement. Finance and Economics Discussion Series 2016-095. Washington: Board of Governors of the Federal Reserve System.2016:1-36.
[Crossref] [Google Scholar]
[127]Davenport A, Shetty S. Air gapped wallet schemes and private key leakage in permissioned blockchain platforms. In international conference on blockchain (Blockchain) 2019 (pp. 541-5). IEEE.
[Crossref] [Google Scholar]
[128]Yin LH, Liu H. Searching activity trajectories with semantics. Journal of Computer Science and Technology. 2019; 34:775-94.
[Crossref] [Google Scholar]
[129]Ndri A. The applications of blockchain to cybersecurity. Culminating Projects in Information Assurance, St. Cloud State University. 2013.
[Google Scholar]