CFP last date
20 May 2024
Reseach Article

Security Attacks on Blockchain

by Kameswara Rao Kesavarapu, V. Prasanna Venkatesan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 16
Year of Publication: 2019
Authors: Kameswara Rao Kesavarapu, V. Prasanna Venkatesan
10.5120/ijca2019918942

Kameswara Rao Kesavarapu, V. Prasanna Venkatesan . Security Attacks on Blockchain. International Journal of Computer Applications. 178, 16 ( Jun 2019), 25-28. DOI=10.5120/ijca2019918942

@article{ 10.5120/ijca2019918942,
author = { Kameswara Rao Kesavarapu, V. Prasanna Venkatesan },
title = { Security Attacks on Blockchain },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2019 },
volume = { 178 },
number = { 16 },
month = { Jun },
year = { 2019 },
issn = { 0975-8887 },
pages = { 25-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number16/30620-2019918942/ },
doi = { 10.5120/ijca2019918942 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:50:36.553001+05:30
%A Kameswara Rao Kesavarapu
%A V. Prasanna Venkatesan
%T Security Attacks on Blockchain
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 16
%P 25-28
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Many organizations are considering the adoption of blockchain technology as they believe that hacking the blockchain environment is extremely difficult as information stored on the blockchains use various cryptographic techniques to validate transactions and store them securely. But like other technologies, blockchains are also susceptible to attacks. In this paper, discussed about different types of consensus mechanisms that are used in validating the transactions of a blockchain network. This paper also focuses on key cryptography techniques that are often used in blockchain. This paper highlights security vulnerabilities and various noteworthy attacks that took place in blockchain environment.

References
  1. Linux Foundation, “Blockchain: Understanding Its Uses and Implications,” 2018.
  2. Michael del Castillo & Bailey Reutzel, “$100 Billion Controversy: XRP’s Surge Raises Hard Questions for Ripple,” coindesk.com, Jan 2018.
  3. Emilio Janus, “BITCOIN PUBLIC FULL NODE COUNT SURPASSES 10,000,” bitcoinist.com, Nov 2018.
  4. Alyssa Hertig, “Ethereum’s Big Switch: The New Roadmap to Proof-of-Stake,” coindesk.com, May 2017.
  5. Tommy Koens, Coen Ramaekers and Cees van Wijk, “Efficient Zero-Knowledge Range Proofs in Ethereum,” 2015.
  6. Ehab Zaghloul, “Beginners Guide on Blockchain Security Attacks Part 1 — Network,” medium.com, July 2018.
  7. Andrew Norry, “The History of the Mt Gox Hack: Bitcoin’s Biggest Heist,” blockonomi.com, Nov 2018.
  8. Admin, “Value overflow incident,” en.bitcoin.it, July 2016.
  9. Haseeb Qureshi, “A hacker stole $31M of Ether — how it happened, and what it means for Ethereum,” medium.freecodecamp.org, July 2017
Index Terms

Computer Science
Information Sciences

Keywords

Proof of Work Proof of Stake Cryptography Bitcoin Ethereum Blockchain Security Vulnerabilities.