Javascript must be enabled to continue!
A taxonomy of endpoint vulnerabilities and affected blockchain architecture layers
View through CrossRef
AbstractBlockchain technology has gained significant attention and adoption due to its decentralized nature, and promising secure and immutable transactions. The interpretation of Blockchain's components has been presented in an innovative manner, illustrating the features they enable or manage. However, its networks do not appear so immune to vulnerabilities like any other technological system. Among the typical weaknesses, endpoint vulnerabilities refer to weaknesses in the endpoints that interact with the blockchain network. They pose a significant risk to the security and integrity of the entire system. These vulnerabilities can affect blockchain networks including smart contract vulnerabilities, wallet vulnerabilities, and communication vulnerabilities. In view of the absence of any viable taxonomic description and associated value, we attempted a novel comprehensive classification of endpoint vulnerabilities. The proposed taxonomy is designed to logically categorize and classify the various endpoint vulnerabilities through a pictorial representation. It encompasses wallet vulnerabilities, malware, cryptojacking and human negligence. Additionally, this paper proposes a novel approach to mapping endpoint vulnerabilities to the blockchain abstract layer. It gives a unique way to study the vulnerabilities and layers' relation. Finally, the corresponding violated principles behind the vulnerabilities have been identified and indicated. By providing a structured taxonomy of endpoint vulnerabilities, this paper aims to enhance the understanding of the security challenges associated with blockchain applications. By understanding and addressing the taxonomy of endpoint vulnerabilities, blockchain practitioners and researchers can enhance blockchain networks' overall security and trustworthiness, paving the way for broader adoption and utilization of this transformative technology. It may have implications in terms of identifying, linking, developing control, and finally mitigating endpoint vulnerabilities in the rapidly changing environment.
Title: A taxonomy of endpoint vulnerabilities and affected blockchain architecture layers
Description:
AbstractBlockchain technology has gained significant attention and adoption due to its decentralized nature, and promising secure and immutable transactions.
The interpretation of Blockchain's components has been presented in an innovative manner, illustrating the features they enable or manage.
However, its networks do not appear so immune to vulnerabilities like any other technological system.
Among the typical weaknesses, endpoint vulnerabilities refer to weaknesses in the endpoints that interact with the blockchain network.
They pose a significant risk to the security and integrity of the entire system.
These vulnerabilities can affect blockchain networks including smart contract vulnerabilities, wallet vulnerabilities, and communication vulnerabilities.
In view of the absence of any viable taxonomic description and associated value, we attempted a novel comprehensive classification of endpoint vulnerabilities.
The proposed taxonomy is designed to logically categorize and classify the various endpoint vulnerabilities through a pictorial representation.
It encompasses wallet vulnerabilities, malware, cryptojacking and human negligence.
Additionally, this paper proposes a novel approach to mapping endpoint vulnerabilities to the blockchain abstract layer.
It gives a unique way to study the vulnerabilities and layers' relation.
Finally, the corresponding violated principles behind the vulnerabilities have been identified and indicated.
By providing a structured taxonomy of endpoint vulnerabilities, this paper aims to enhance the understanding of the security challenges associated with blockchain applications.
By understanding and addressing the taxonomy of endpoint vulnerabilities, blockchain practitioners and researchers can enhance blockchain networks' overall security and trustworthiness, paving the way for broader adoption and utilization of this transformative technology.
It may have implications in terms of identifying, linking, developing control, and finally mitigating endpoint vulnerabilities in the rapidly changing environment.
Related Results
Convergence and representation of blockchain and smart contracts using the semantic web
Convergence and representation of blockchain and smart contracts using the semantic web
The Internet and the World Wide Web were designed with the intention of being decentralised and interoperable, and therefore more democratic, where users have power over their data...
La qualification de la blockchain
La qualification de la blockchain
La création de la blockchain a remis en question les notions traditionnelles de collaboration et d'échange. Cette thèse vise à démontrer que cette innovation n'est pas seulement te...
The architecture of differences
The architecture of differences
Following in the footsteps of the protagonists of the Italian architectural debate is a mark of culture and proactivity. The synthesis deriving from the artistic-humanistic factors...
Anomaly Detection in Blockchain Using Machine Learning
Anomaly Detection in Blockchain Using Machine Learning
Blockchain technology has gained significant attention as a secure and decentralized platform for various applications. However, the immutable and distributed nature of blockchain ...
“The margin between the edge of the world and infinite possibility”
“The margin between the edge of the world and infinite possibility”
Purpose
This paper aims to explore a paradoxical situation, asking whether it is possible to reconcile the immutable ledger known as blockchain with the requirements of the General...
Potential Vulnerabilities of Cryptographic Primitives in Modern Blockchain Platforms
Potential Vulnerabilities of Cryptographic Primitives in Modern Blockchain Platforms
Today, blockchain technologies are a separate, rapidly developing area. With rapid development, they open up a number of scientific problems. One of these problems is the problem o...
Application of the blockchain technology for digital diplomas: problems and prospects
Application of the blockchain technology for digital diplomas: problems and prospects
The purpose of this studyis to analyze possible problems in issuing digital diplomas, using the blockchain technology, and to promote solving these problems as well as to show the ...
Introduction to Blockchain Technology
Introduction to Blockchain Technology
A blockchain is a linked set of records maintained in a decentralized
environment. The records in blockchain are publicly available but cryptographically
secured. The interesting p...

