{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:44:29Z","timestamp":1743000269890,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030146863"},{"type":"electronic","value":"9783030146870"}],"license":[{"start":{"date-parts":[[2019,3,19]],"date-time":"2019-03-19T00:00:00Z","timestamp":1552953600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-14687-0_26","type":"book-chapter","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T05:35:21Z","timestamp":1552887321000},"page":"288-299","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Vulnerabilities and Security Breaches in Cryptocurrencies"],"prefix":"10.1007","author":[{"given":"Gudmundur","family":"Sigurdsson","sequence":"first","affiliation":[]},{"given":"Alberto","family":"Giaretta","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Dragoni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,19]]},"reference":[{"key":"26_CR1","unstructured":"10 things you need to know about ripple. https:\/\/www.coindesk.com\/10-things-you-need-to-know-about-ripple\/"},{"key":"26_CR2","unstructured":"\\$55 million in digital currency stolen from investment fund. https:\/\/www.bankinfosecurity.com\/55-million-in-digital-currency-stolen-from-investment-fund-a-9214"},{"key":"26_CR3","unstructured":"Best Ethereum wallets 2017: hardware vs software vs paper. https:\/\/blockonomi.com\/best-ethereum-wallets\/"},{"key":"26_CR4","unstructured":"Bitcoin: a peer-to-peer electronic cash system. https:\/\/coinmarketcap.com\/all\/views\/all\/"},{"key":"26_CR5","unstructured":"Bitcoin hack highlights cryptocurrency challenges. https:\/\/www.bankinfosecurity.com\/bitcoin-hack-highlights-cryptocurrency-challenges-a-9305"},{"key":"26_CR6","unstructured":"Bitcoin, litecoin exchange platform under DDoS attack, security inadequate. https:\/\/cointelegraph.com\/news\/bitcoin-litecoin-exchange-platform-under-ddos-attack-security-inadequate"},{"key":"26_CR7","unstructured":"Cryptocurrency market capitalizations. https:\/\/coinmarketcap.com\/all\/views\/all\/"},{"key":"26_CR8","unstructured":"Ethereum based proof-of-individuality prevents sybil attacks. https:\/\/decentralize.today\/ethereum-based-proof-of-individuality-prevents-sybil-attacks-9757864bbf61"},{"key":"26_CR9","unstructured":"Hacker uses parity wallet vulnerability to steal \\$30 million worth of Ethereum. https:\/\/www.bleepingcomputer.com\/news\/security\/hacker-uses-parity-wallet-vulnerability-to-steal-30-million-worth-of-ethereum\/"},{"key":"26_CR10","unstructured":"Introducing ripple. https:\/\/bitcoinmagazine.com\/articles\/introducing-ripple\/"},{"key":"26_CR11","unstructured":"New RETADUP variants hit south America, turn to cryptocurrency mining. https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/new-retadup-variants-hit-south-america-turn-cryptocurrency-mining\/"},{"key":"26_CR12","unstructured":"Nicehash hacked at peak BTC prices, loses \\$64 million\u2019s worth of Bitcoin. https:\/\/cryptovest.com\/news\/nicehash-hacked-at-peak-btc-prices-loses-64-millions-worth-of-bitcoin\/"},{"key":"26_CR13","unstructured":"The ongoing Bitcoin malleability attack. https:\/\/cointelegraph.com\/news\/the-ongoing-bitcoin-malleability-attack"},{"key":"26_CR14","unstructured":"Proof of identity on Ethereum (or the \u201cKYC problem\u201d). https:\/\/blog.oraclize.it\/proof-of-identity-on-ethereum-or-the-kyc-problem-f4a9ee40af21"},{"key":"26_CR15","unstructured":"Re: Anonymity. Bitcoin forum. https:\/\/bitcointalk.org\/index.php?topic=241.msg2071#msg2071"},{"key":"26_CR16","unstructured":"Re: Maximum block size? - Ethereum community forum. https:\/\/forum.ethereum.org\/discussion\/1757\/maximum-block-size"},{"key":"26_CR17","unstructured":"Re: What is the incentive to collect transactions. Bitcoin forum thread. https:\/\/bitcointalk.org\/index.php?topic=165.msg1595#msg1595 . Accessed 26 Feb 2018"},{"key":"26_CR18","unstructured":"Timejacking & Bitcoin. http:\/\/culubas.blogspot.dk\/"},{"key":"26_CR19","unstructured":"Transaction fee historical chart. https:\/\/bitinfocharts.com\/comparison\/transactionfees-btc-eth-bch-ltc-dash-xmr-vtc-aur.html"},{"key":"26_CR20","first-page":"1","volume-title":"Financial cryptographyand data security","author":"M Andrychowicz","year":"2015","unstructured":"Andrychowicz M, Dziembowski S, Malinowski D, Mazurek \u0141 (2015) On the malleability of Bitcoin transactions. In: Brenner M, Christin N, Johnson B, Rohloff K (eds) Financial cryptographyand data security. Springer, Heidelberg, pp 1\u201318"},{"key":"26_CR21","unstructured":"Bucko J, Palova D, Vejacka M (2015) Security and trust in cryptocurrencies"},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Conti M, Kumar ES, Lal C, Ruj, S (June 2017) A survey on security and privacy issues of Bitcoin. ArXiv e-prints","DOI":"10.1109\/COMST.2018.2842460"},{"key":"26_CR23","doi-asserted-by":"publisher","unstructured":"McGinn D, Birch D, Akroyd D, Molina-Solana M, Guo Y, Knottenbelt WJ (2016) Visualizing dynamic Bitcoin transaction patterns. Big Data 4(2):109\u2013119. https:\/\/doi.org\/10.1089\/big.2015.0056 , pMID: 27441715","DOI":"10.1089\/big.2015.0056"},{"key":"26_CR24","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/978-3-319-11212-1_18","volume-title":"Computer security - ESORICS 2014","author":"C Decker","year":"2014","unstructured":"Decker C, Wattenhofer R (2014) Bitcoin transaction malleability and MtGox. In: Kuty\u0142owski M, Vaidya J (eds) Computer security - ESORICS 2014. Springer, Cham, pp 313\u2013326"},{"key":"26_CR25","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1007\/978-3-662-45472-5_28","volume-title":"Financial cryptography and data security","author":"I Eyal","year":"2014","unstructured":"Eyal I, Sirer EG (2014) Majority is not enough: Bitcoin mining is vulnerable. In: Christin N, Safavi-Naini R (eds) Financial cryptography and data security. Springer, Heidelberg, pp 436\u2013454"},{"issue":"2","key":"26_CR26","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1093\/cybsec\/tyx012","volume":"3","author":"A Feder","year":"2017","unstructured":"Feder A, Gandal N, Hamrick JT, Moore T (2017) The impact of DDoS and other security shocks on Bitcoin currency exchanges: evidence from mt. Gox. J Cybersecur 3(2):137\u2013144. https:\/\/doi.org\/10.1093\/cybsec\/tyx012","journal-title":"J Cybersecur"},{"key":"26_CR27","unstructured":"Gao Y, Nobuhara H (2017) A proof of stake sharding protocol for scalable blockchains. In: Proceedings of the 14th APAN research workshop 2017"},{"key":"26_CR28","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1007\/978-3-662-44774-1_6","volume-title":"Financial cryptography and data security","author":"B Johnson","year":"2014","unstructured":"Johnson B, Laszka A, Grossklags J, Vasek M, Moore T (2014) Game-theoretic analysis of DDoS attacks against Bitcoin mining pools. In: B\u00f6hme R, Brenner M, Moore T, Smith M (eds) Financial cryptography and data security. Springer, Heidelberg, pp 72\u201386"},{"key":"#cr-split#-26_CR29.1","unstructured":"Kaushal R (2016) Bitcoin: vulnerabilities and attacks. Imperial J Interdiscip Res 2"},{"key":"#cr-split#-26_CR29.2","unstructured":"(7) (2016). http:\/\/www.imperialjournals.com\/index.php\/IJIR\/article\/view\/1238"},{"issue":"9","key":"26_CR30","first-page":"2285","volume":"12","author":"S Latif","year":"2017","unstructured":"Latif S, Mohd M, Mohd Amin M, Mohamad A (2017) Testing the weak form of efficient market in cryptocurrency. J Eng Appl Sci 12(9):2285\u20132288","journal-title":"J Eng Appl Sci"},{"key":"26_CR31","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/978-3-662-44774-1_5","volume-title":"Financial cryptographyand data security","author":"M Vasek","year":"2014","unstructured":"Vasek M, Thornton M, Moore T (2014) Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem. In: B\u00f6hme R, Brenner M, Moore T, Smith M (eds) Financial cryptographyand data security. Springer, Heidelberg, pp 57\u201371"},{"key":"26_CR32","unstructured":"Vyas CA, Lunagaria M (May 2014) Article: Security concerns and issues for Bitcoin. In: IJCA proceedings on national conference cum workshop on bioinformatics and computational biology NCWBCB, no 2, pp 10\u201312. Full text available"},{"key":"26_CR33","doi-asserted-by":"publisher","unstructured":"Xu X, Pautasso C, Zhu L, Gramoli V, Ponomarev A, Tran AB, Chen S (April 2016) The blockchain as a software connector. In: 2016 13th working IEEE\/IFIP conference on software architecture (WICSA), pp 182\u2013191. https:\/\/doi.org\/10.1109\/WICSA.2016.21","DOI":"10.1109\/WICSA.2016.21"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of 6th International Conference in Software Engineering for Defence Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-14687-0_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T15:59:36Z","timestamp":1694707176000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-14687-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,19]]},"ISBN":["9783030146863","9783030146870"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-14687-0_26","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,3,19]]},"assertion":[{"value":"19 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference in Software Engineering for Defence Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"seda2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.sedaconference.eu\/2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}