Browse > Article
http://dx.doi.org/10.13089/JKIISC.2018.28.1.5

Security Analysis of Blockchain Systems: Case Study of Cryptocurrencies  

Lee, Sungbum (Protocol Engineering Lab., Sangmyung University)
Lee, Boohyung (Protocol Engineering Lab., Sangmyung University)
Myung, Sein (Protocol Engineering Lab., Sangmyung University)
Lee, Jong-Hyouk (Protocol Engineering Lab., Sangmyung University)
Abstract
With the advance of the 4th industrial revolution, Internet of Things (IoT) technology is actively being studied. In the era of the IoT, a decentralized operation is required to reduce load on servers and enable autonomous IoT data communication rather than focusing on centralized operation of being server client structures. This paper analyzes the security of a blockchain, a new form of distributed database platform that supports integrity and permanence of data. To achieve this, we divide the blockchain's major operations into a consensus process, network communication process, and key management process, and then describe possible attacks and countermeasures in each process. We also describe the attack occurred in typical cryptocurrency platforms such as Bitcoin and Ethereum.
Keywords
Blockchain; Consensus; Network; Security; Cryptocurrency;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Gervais, A., Karame, G. O., Wüst, K., Glykantzis, V., Ritzdorf, H., and Capkun, S. "On the security and performance of proof of work blockchains." Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, pp. 3-16, October. 2016.
2 HEILMAN, E., KENDLER, A., ZOHAR, A., AND GOLDBERG, S., " Eclipse Attacks on Bitcoin's Peer-to-Peer Network.", In 24th USENIX Security Symposium, pp. 129-144, 2015
3 Sung Bok Jeon, "Analysis of BGP Routing Protocol's Vulnerability and it's improvement measures.", Department of Information & Technology, master thesis, sogang University , August, 2008.
4 Apostolaki, Maria, Aviv Zohar, and Laurent Vanbever. "Hijacking bitcoin: Routing attacks on cryptocurrencies." Security and Privacy (SP), 2017 IEEE Symposium on. IEEE, 2017.
5 S. Eskandari, D. Barrera, E. Stobert, and J. Clark. "A first look at the usability of bitcoin key management.", In Workshop on Usable Security (USEC), 2015.
6 Gentilal, Miraje, Paulo Martins, and Leonel Sousa. "TrustZone-backed bitcoin wallet." Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems. ACM, 2017.
7 Reason of Ethereum Hardfork, https://bitcoinmagazine.com/articles/op-ed-why-ethereums-hard-fork-will-cause-problems-coming-year/, last accessed 2017/09/13.
8 Notification of Ethereum Hardfork, https://blog.ethereum.org/2016/07/20/hard-fork-completed/, last accessed 2017/09/13.
9 BGP Hijacking, https://www.securework s.com/research/bgp-hijacking-for-cryptoc urrency-profit, last accessed 2017/09/13.
10 Bitfinex Coin Exchange Hacking, http://www.itworld.co.kr/news/100594, last acc essed 2017/09/13.
11 Yapizon Coin Exchange Hacking, http://www.boannews.com/media/view.asp?idx=54483&kind=1&search=title&find=%BA%F1%C6%AE%C4%DA%C0%CE, last accessed 2017/09/13.
12 BTMINE bitcoin malware, https://themerkle.com/top-3-types-of-bitcoin-mining-malware/, last accessed 2017/09/13.
13 BitCoinMiner bitcoin malware, http://blog.alyac.co.kr/54, last accessed 2017/09/13.
14 ethereum price, https://www.bithumb.com/, last accessed 2017/09/13.
15 bitcoin exchange manipulation, http://www.boannews.com/media/view.asp?idx=5 5031, last accessed 2017/09/13.
16 Satoshi Nakamoto, "Bitcoin:A peer-topeer electronic cash system.", 2008.
17 Kroll, Joshua A., Ian C. Davey, and Edward W. Felten. "The economics of Bitcoin mining, or Bitcoin in the presence of adversaries.", Proc. of WEIS. Vol. 2013. 2013.
18 Jerome Glenn et al., "World Future Report 2050". Kyobo Book, Korea, 2016.
19 Korea Institute of Finance and Information Technology., "Block Chain Technology Application Areas and Case Studies", KISA, Korea, 2016.
20 B. Lee and J.-H. Lee, "Blockchain based secure firmware update for embedded devices in an Internet of Things environment", Journal of Supercomputing, vol. 73, no. 3, pp. 1152-1167, 2017   DOI
21 B. Lee, Y.-J. Lim and J.-H. Lee, "Consensus algorithms in block-chain platforms", Proceedings of Symposium of the Korean Institute of communications and Information Sciences, pp. 386-387, 2017.
22 bitcoin wiki page, https://en.bitcoin.it/wiki/Double-spending, last accessed 2017/09/13.
23 SoHee Kim, JiYeon Yang and Yoonjeong Kim, "A Study on the Selfish Mining of Block Chain", Proceedings of Symposium of the Korean Institute of communications and Information Sciences, pp. 422-423, 2015.
24 I. Eyal, Emin G. Sirer, "Majority is not Enough: Bitcoin Mining is Vulnerable", In Financial Cryptography, pp. 436-454, 2014.
25 Bahack Lear, "Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft)." arXiv preprint arXiv:1312.7013, 2013.
26 HEILMAN, Ethan. One weird trick to stop selfish miners: Fresh bitcoins, a solution for the honest miner. In: International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, pp. 161-162, 2014.