Sok: Not quite water under the bridge: Review of cross-chain bridge hacks

SS Lee, A Murashkin, M Derka… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The blockchain ecosystem has evolved into a multi-chain world with various blockchains
vying for use. Although each blockchain may have its own native cryptocurrency or digital …

Attacks against cross-chain systems and defense approaches: A contemporary survey

L Duan, Y Sun, W Ni, W Ding, J Liu… - IEEE/CAA Journal of …, 2023 - ieeexplore.ieee.org
The blockchain cross-chain is a significant technology for inter-chain interconnection and
value transfer among different blockchain networks. Cross-chain overcomes the “information …

Xscope: Hunting for cross-chain bridge attacks

J Zhang, J Gao, Y Li, Z Chen, Z Guan… - Proceedings of the 37th …, 2022 - dl.acm.org
Cross-Chain bridges have become the most popular solution to support asset
interoperability between heterogeneous blockchains. However, while providing efficient and …

An empirical analysis of blockchain cybersecurity incidents

A Alkhalifah, A Ng, MJM Chowdhury… - 2019 IEEE Asia …, 2019 - ieeexplore.ieee.org
The establishment of Bitcoin in 2008 has introduced Blockchain technology to become the
predominant new ways in digital transactions in many fields, such as energy, healthcare …

Hephaestus: Modeling, Analysis, and Performance Evaluation of Cross-Chain Transactions

R Belchior, P Somogyvari… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Ecosystems of multiple blockchains are now a reality. Multichain applications and protocols
are perceived as necessary to enable scalability, privacy, and composability. Despite being …

[PDF][PDF] A Structured Overview of Attacks on Blockchain Systems.

T Guggenberger, V Schlatt, J Schmid, N Urbach - PACIS, 2021 - researchgate.net
Blockchain systems become increasingly attractive targets for cybercrime due to the rising
amount of value transacted in respective systems. However, researchers and practitioners …

A taxonomy of blockchain threats and vulnerabilities

A Alkhalifah, A Ng, ASM Kayes… - … for Cybersecurity and …, 2020 - taylorfrancis.com
Blockchain technology has become one of the most popular technologies for maintaining
digital transactions. From the foundation of Bitcoin to the now-predominant smart contract …

[PDF][PDF] An overview of blockchain security analysis

H Wang, Y Wang, Z Cao, Z Li… - Cyber Security: 15th …, 2019 - library.oapen.org
The blockchain, with its own characteristics, has received much attention at the beginning of
its birth and been applied in many fields. At the same time, however, its security issues are …

Denial of Chain: Evaluation and prediction of a novel cyberattack in Blockchain-supported systems

B Bordel, R Alcarria, T Robles - Future Generation Computer Systems, 2021 - Elsevier
Blockchain has arisen as a revolutionary technology to provide trust in scenarios where
several independent agents must agree about certain information. This characteristic makes …

Detecting blockchain security threats

B Putz, G Pernul - 2020 IEEE International Conference on …, 2020 - ieeexplore.ieee.org
In many organizations, permissioned blockchain networks are currently transitioning from a
proof-of-concept stage to production use. A crucial part of this transition is ensuring …