Attack surface analysis of permissioned blockchain platforms for smart cities

A Davenport, S Shetty, X Liang - 2018 IEEE International Smart …, 2018 - ieeexplore.ieee.org
In this paper, we explore the attack surfaces in open source permissioned blockchain project
Hyperledger Fabric that can be exploited and compromised through cryptographic tactics …

On the security and privacy of hyperledger fabric: Challenges and open issues

S Brotsis, N Kolokotronis, K Limniotis… - 2020 IEEE World …, 2020 - ieeexplore.ieee.org
In the last few years, a countless number of permissioned blockchain solutions have been
proposed, with each one to claim that it revolutionizes the way of the transaction processing …

Software wallet based secure participation in hyperledger fabric networks

AR Thota, P Upadhyay, S Kulkarni… - 2020 International …, 2020 - ieeexplore.ieee.org
Identity plays an important role in blockchain networks, both permissioned and
permissionless. Enterprise applications built on permissioned blockchains, associate access …

Ripping the fabric: Attacks and mitigations on hyperledger fabric

A Dabholkar, V Saraswat - … and Techniques in Information Security: 10th …, 2019 - Springer
In this paper, we take a closer look at the attack surface of permissioned blockchains by
focusing on Hyperledger Fabric and present scenarios where the assumptions of trust could …

[HTML][HTML] Security challenges and defense approaches for blockchain-based services from a full-stack architecture perspective

H Chen, X Luo, L Shi, Y Cao, Y Zhang - Blockchain: Research and …, 2023 - Elsevier
As an advantageous technique and service, the blockchain has shown great development
and application prospects. However, its security has also met great challenges, and many …

On blockchain security and relevant attacks

J Moubarak, E Filiol, M Chamoun - 2018 IEEE Middle East and …, 2018 - ieeexplore.ieee.org
The blockchain technology witnessed a wide adoption and a swift growth in recent years.
This ingenious distributed peer-to-peer design attracted several businesses and solicited …

Tutorial: building secure and trustworthy blockchain applications

C Cai, H Duan, C Wang - 2018 IEEE Cybersecurity …, 2018 - ieeexplore.ieee.org
Beyond cryptocurrencies, blockchain technologies have shown great potential in enabling a
wealth of decentralized applications (DApps), including but not limited to trustworthy auction …

Detecting blockchain security threats

B Putz, G Pernul - 2020 IEEE International Conference on …, 2020 - ieeexplore.ieee.org
In many organizations, permissioned blockchain networks are currently transitioning from a
proof-of-concept stage to production use. A crucial part of this transition is ensuring …

Physical access control management system based on permissioned blockchain

S Rouhani, V Pourheidari… - 2018 IEEE international …, 2018 - ieeexplore.ieee.org
Using blockchain as a decentralized backend infrastructure has been attracting many
startups entrepreneurs' and developers' attention. Blockchain records transactions …

Blockchain service operations-a structured approach to operate a blockchain solution

T Hoiss, K Seidenfad, U Lechner - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Participating in or operating a permissioned blockchain is a complex challenge and poses a
significant hurdle for many organizations. This paper creates a structure for the operation of …