Browse > Article
http://dx.doi.org/10.15207/JKCS.2019.10.10.001

Survey on Analysis and Countermeasure for Hacking Attacks to Cryptocurrency Exchange  

Hong, Sunghyuck (Division of ICT, Information Security Major, Baekseok University)
Publication Information
Journal of the Korea Convergence Society / v.10, no.10, 2019 , pp. 1-6 More about this Journal
Abstract
As the value of technical information increases, hacking attacks are trying to steal technical information through hacking. Recently, hacking of cryptocurrency exchanges is much easier to monetize than existing technical information, making it a major attack target for hackers. In the case of technical information, it is required to seize the technical information and sell it to the black market for cashing.In the case of cryptocurrency, most hacking attacks are concentrated on cryptocurrency exchanges because it is easy to cash out and not easy to track when successful hacking. Although technology cannot be hacked, cryptocurrency transactions traded on cryptocurrency exchanges are not recorded on the blockchain which is simply internal exchanges, so insiders may manipulate the quotes and leave gaps or leak out. Therefore, this research analyzes the recent hacking attacks of cryptocurrency exchanges and proposes solutions to secure cryptocurrency trading.
Keywords
Cryptocurrency; Exchange; Hacking; Blockchain; Token;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 P. C. Mullan. (2014.). Bitcoin Decentralized Virtual Currency, The Digital Currency Challenge: Shaping Online Payment Systems through US Financial Regulations. New York; Palgrave Pivot. DOI:10.1057/9781137382559.0014
2 N. Jain. (2019). A New World of Virtual Currency: Cryptocurrency. 10th International Conference on Digital Strategies for Organizational Success. DOI:10.2139/ssrn.3308559
3 A. Ogunbadewa. (2014). The Virtues and Risks Inherent in the Bitcoin Virtual Currency. SSRN Electronic Journal. DOI:10.2139/ssrn.2425114
4 R. Sassower. (2013). Legality and Morality: Intellectual Property, Virtual Currency, and Corporate Responsibility. Digital Exposure, 51-65. DOI : 10.1057/9781137312402_4
5 A. Ogunbadewa. (2013). The Bitcoin Virtual Currency: A Safe Haven for Money Launderers? SSRN Electronic Journal. DOI:10.2139/ssrn.2402632
6 V. I. Karpunin. (2018). Virtual Project For Virtual Economy: About Crypto Currency And Other Issues. Vestnik of the Plekhanov Russian University of Economics, 3, 33-49. DOI:10.21686/2413-2829-2018-3-33-49.   DOI
7 J. Yang, Y. Chen, W. Trappe & J. Cheng. (2014). Detection and Localizing Multiple Spoofing Attackers. SpringerBriefs in Computer Science Pervasive Wireless Environments: Detecting and Localizing User Spoofing, 23-41. DOI:10.1007/978-3-319-07356-9_4
8 G. Ballabio. (2017). Prime-Partitioned Block Chain: A Scalable and Efficient blockchain Implementation. SSRN Electronic Journal. DOI:10.2139/ssrn.2927669.
9 J. G. Kim & S. K. Lee. (2019). Development of portal web service contents for nursing students' career search. Journal of Digital Convergence, 17(7), 245-254. DOI:10.1109/icphys.2018.8390792   DOI
10 S. H. Hong. (2013). Countermeasure for Anti-financial hacking. Journal of Convergence for Information Technology, 3(1), 43-48.
11 G. G. Dagher, P. B. Marella, M. Milojkovic & J. Mohler. (2018). BroncoVote: Secure Voting System using Ethereum's Blockchain. Proceedings of the 4th International Conference on Information Systems Security and Privacy. DOI:10.5220/0006609700960107
12 C. J. Frances. (2018). The cryptocurrency market: A network analysis. ESIC Market Economics and Business Journal, 49(3), 569-606. DOI:10.7200/esicm.161.0493.4   DOI
13 R. Courtland. (2012). Virtual Currency Gets Real. IEEE Spectrum, 49(6), 52-53. DOI:10.1109/mspec.2012.6204182.   DOI
14 J. Chen & G. Ji. (2010). Multi-class LSTSVM classifier based on optimal directed acyclic graph. 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE). DOI:10.1109/iccae.2010.5452037
15 A. Rodriguez-Perez. (2017). Secret suffrage in remote electronic voting systems. 2017 Fourth International Conference on eDemocracy & eGovernment (ICEDEG), Quito, 277-278. DOI: 10.1109/ICEDEG.2017.7962550