원문정보
초록
영어
The purpose of the study is to contribute to the positive development of blockchain technology by providing data to examine security vulnerabilities and threats to blockchain-based services and review countermeasures. The findings of this study are as follows. Threats to the security of blockchain-based services can be classified into application security threats, smart contract security threats, and network (P2P) security threats. First, application security threats include wallet theft (e-wallet stealing), double spending (double payment attack), and cryptojacking (mining malware infection). Second, smart contract security threats are divided into reentrancy attacks, replay attacks, and balance increasing attacks. Third, network (P2P) security threats are divided into the 51% control attack, Sybil attack, balance attack, eclipse attack (spread false information attack), selfish mining (selfish mining monopoly), block withholding attack, DDoS attack (distributed service denial attack) and DNS/BGP hijacks. Through this study, it is possible to discuss the future plans of the blockchain technology-based ecosystem through understanding the functional characteristics of transparency or some privacy that can be obtained within the blockchain. It also supports effective coping with various security threats.
목차
1. Introduction
2. Literature Review
2.1. Blockchain-based Security Threat
2.2. Security Enhancement Technology Applied to Bitcoin
2.3. Preliminary Research
3. Blockchain-based security threat analysis
3.1. Types and Concepts of Blockchain Security Threats
3.2. Application security threat
3.3. Smart Contract Security Threat
3.4. Network(P2P) Security Threat
4. Conclusion
Acknowledgement
References