Preprint Review Version 1 Preserved in Portico This version is not peer-reviewed

A Taxonomy of Blockchain Threats and Vulnerabilities

Version 1 : Received: 11 September 2019 / Approved: 11 September 2019 / Online: 11 September 2019 (05:40:01 CEST)

How to cite: Alkhalifah, A.; Ng, A.; Kayes, A.S.M.; Chowdhury, J.; Alazab, M.; Watters, P. A Taxonomy of Blockchain Threats and Vulnerabilities. Preprints 2019, 2019090117. https://doi.org/10.20944/preprints201909.0117.v1 Alkhalifah, A.; Ng, A.; Kayes, A.S.M.; Chowdhury, J.; Alazab, M.; Watters, P. A Taxonomy of Blockchain Threats and Vulnerabilities. Preprints 2019, 2019090117. https://doi.org/10.20944/preprints201909.0117.v1

Abstract

Blockchain technology has become one of the most popular technologies for maintaining digital transactions. From the foundation of Bitcoin to the now predominant smart contract, blockchain technology promises to induce a shift in thought about digital transactions in many fields, such as energy, healthcare, Internet of Things, cybersecurity, financial services and the supply chain. Despite blockchain technology offers many cryptography advantages such as immutability, digital signature and hashing; it has suffered from several critical cybersecurity threats and vulnerabilities. In this paper, we build upon the previous studies on vulnerabilities and investigates over 60 real cybersecurity incidents that have been happening on the blockchain networks between 2009 and 2019. We categorise those incidents against the key cybersecurity vulnerabilities in blockchain technologies; and have developed a taxonomy that captures five types of cybersecurity threats and vulnerabilities based on five main players in blockchain. The outcome of this research prompted concerns and research direction in developing countermeasures to alleviate these risks.

Keywords

blockchain; cybersecurity; attacks; threats; vulnerability

Subject

Computer Science and Mathematics, Information Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.