{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:51:22Z","timestamp":1765889482700,"version":"3.41.0"},"reference-count":107,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T00:00:00Z","timestamp":1744416000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T00:00:00Z","timestamp":1744416000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s10207-025-01028-w","type":"journal-article","created":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T06:15:17Z","timestamp":1744438517000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A comprehensive analysis of cryptocurrency breaches at endpoint"],"prefix":"10.1007","volume":"24","author":[{"given":"Mohd Azeem Faizi","family":"Noor","sequence":"first","affiliation":[]},{"given":"Khurram","family":"Mustafa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,12]]},"reference":[{"key":"1028_CR1","doi-asserted-by":"publisher","unstructured":"Abuidris, Y., Hassan, A., Hadabi, A., & Elfadul, I.: Risks and opportunities of blockchain based on e-voting systems. In: 2019 16th International Computer Conference on Wavelet Active Media Technology and Information Processing, pp. 365\u2013368 (2019). https:\/\/doi.org\/10.1109\/ICCWAMTIP47768.2019.9067529","DOI":"10.1109\/ICCWAMTIP47768.2019.9067529"},{"key":"1028_CR2","unstructured":"Alam, O.: Understanding the economies of blockchain games: an empirical analysis of Axie infinity. In: Distributed Computing Group Computer Engineering and Networks Laboratory ETH Z\u00fcrich (2022). https:\/\/Pub.Tik.Ee.Ethz.Ch\/Students\/2"},{"key":"1028_CR3","unstructured":"Ali, M.S.: Blockchain security vulnerabilities - a competent solutions to keep away from hacking. In DeveloperOnRent (2019). https:\/\/www.developeronrent.com\/blogs\/blockchain-security-vulnerabilities"},{"key":"1028_CR4","doi-asserted-by":"publisher","unstructured":"Alkhalifah, A., Ng, A., Chowdhury, M.J.M., Kayes, A.S.M., Watters, P.A.: An empirical analysis of blockchain cybersecurity incidents. In: 2019 IEEE Asia-Pacific Conference on Computer Science and Data Engineering, CSDE 2019 (2019). https:\/\/doi.org\/10.1109\/CSDE48274.2019.9162381","DOI":"10.1109\/CSDE48274.2019.9162381"},{"key":"1028_CR5","unstructured":"AllCrypt Staff: What happened, and what\u2019s going on (2015). https:\/\/www.allcrypt.com\/blog\/2015\/03\/what-happened-and-whats-going-on\/"},{"issue":"2","key":"1028_CR6","doi-asserted-by":"publisher","first-page":"841","DOI":"10.14569\/IJACSA.2023.0140296","volume":"14","author":"AM Alqahtani","year":"2023","unstructured":"Alqahtani, A.M., Algarni, A.: A survey on blockchain technology concepts, applications and security. Int. J. Adv. Comput. Sci. Appl. 14(2), 841\u2013847 (2023). https:\/\/doi.org\/10.14569\/IJACSA.2023.0140296","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"1028_CR7","unstructured":"Anirudh Tiwari.: The Cashaa Hack: Investigators Stay Silent as Inside Job Rumors Emerge. Cointelegraph (2020). https:\/\/cointelegraph.com\/news\/the-cashaa-hack-investigators-stay-silent-as-inside-job-rumors-emerge"},{"key":"1028_CR8","unstructured":"Antonopoulos, A.: Not your keys? Not your bitcoin. Available at YouTube (2017). https:\/\/www.youtube.com\/watch?v=dnC5mFaIW3Q"},{"key":"1028_CR9","doi-asserted-by":"publisher","unstructured":"Arsi, S., Ben Khelifa, S., Ghabri, Y., Mzoughi, H.: Cryptocurrencies: key risks and challenges. In: Cryptofinance: A New Currency for a New Economy, pp. 121\u2013145. World Scientific (2022). https:\/\/doi.org\/10.1142\/9789811239670_0007","DOI":"10.1142\/9789811239670_0007"},{"key":"1028_CR10","doi-asserted-by":"publisher","first-page":"02001","DOI":"10.1051\/shsconf\/202110602001","volume":"106","author":"I Astrakhantseva","year":"2021","unstructured":"Astrakhantseva, I., Astrakhantsev, R., Los, A.: Cryptocurrency fraud schemes analysis. SHS Web Conf. 106, 02001 (2021). https:\/\/doi.org\/10.1051\/shsconf\/202110602001","journal-title":"SHS Web Conf."},{"issue":"1","key":"1028_CR11","first-page":"20","volume":"6","author":"M binti Malik","year":"2023","unstructured":"binti Malik, M., Zolkipli, M.F.: Blockchain threats: a look into the most common forms of cryptocurrency attacks. Borneo Int. J. EISSN 6(1), 20\u201332 (2023)","journal-title":"Borneo Int. J. EISSN"},{"issue":"1","key":"1028_CR12","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1353-4858(18)30006-0","volume":"2018","author":"O Boireau","year":"2018","unstructured":"Boireau, O.: Securing the blockchain against hackers. Netw. Secur. 2018(1), 8\u201311 (2018). https:\/\/doi.org\/10.1016\/S1353-4858(18)30006-0","journal-title":"Netw. Secur."},{"key":"1028_CR13","doi-asserted-by":"publisher","unstructured":"Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: SoK: research perspectives and challenges for bitcoin and cryptocurrencies. In: Proceedings\u2014IEEE Symposium on Security and Privacy, pp. 104\u2013121 (2015). https:\/\/doi.org\/10.1109\/SP.2015.14","DOI":"10.1109\/SP.2015.14"},{"key":"1028_CR14","doi-asserted-by":"publisher","unstructured":"Bui, T., Rao, S.P., Antikainen, M., Aura, T.: Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet. In: Proceedings of the 12th European Workshop on Systems Security, pp 1\u20136 (2019). https:\/\/doi.org\/10.1145\/3301417.3312495","DOI":"10.1145\/3301417.3312495"},{"key":"1028_CR15","unstructured":"Buterin, V.: Ethereum white paper. GitHub Repository, 1, 22\u201323. (2013). https:\/\/static.peng37.com\/ethereum_whitepaper_laptop_3.pdf"},{"key":"1028_CR16","unstructured":"CertiK, C.: The blockchain trilemma: decentralized, scalable, and secure? In: Medium. CertiK (2019). https:\/\/medium.com\/certik\/the-blockchain-trilemma-decentralized-scalable-and-secure-e9d8c41a87b3"},{"key":"1028_CR17","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3944435","author":"B Charoenwong","year":"2021","unstructured":"Charoenwong, B., Bernardi, M.: A decade of cryptocurrency \u201chacks\u201d: 2011\u20132021. SSRN (2021). https:\/\/doi.org\/10.2139\/ssrn.3944435","journal-title":"SSRN"},{"key":"1028_CR18","unstructured":"Chawla, V.: The 10 largest crypto hacks and exploits of 2023. In: The Block. The 10 Largest Crypto Hacks and Exploits of 2023 (2024). https:\/\/www.theblock.co\/post\/268831\/the-10-largest-crypto-hacks-and-exploits-of-2023"},{"key":"1028_CR19","unstructured":"Cheng, T., Tjun, T.: What does the future hold for crypto exchanges? WA Joint Research Report by BCG, Bitget and Foresight Ventures, 5 (2022)"},{"key":"1028_CR20","doi-asserted-by":"publisher","unstructured":"Chohan, U.W.: The problems of cryptocurrency thefts and exchange shutdowns (2018). https:\/\/doi.org\/10.2139\/ssrn.3131702","DOI":"10.2139\/ssrn.3131702"},{"key":"1028_CR21","unstructured":"Cimpanu Catalin: IOTA Cryptocurrency Users Lose $4 Million in Clever Phishing Attack. BleepingComputer (2018). https:\/\/www.bleepingcomputer.com\/news\/security\/iota-cryptocurrency-users-lose-4-million-in-clever-phishing-attack\/"},{"key":"1028_CR22","unstructured":"CoinMarketCap.: Cryptocurrency prices, charts and market capitalizations. In: Cryptofinance: A New Currency for a New Economy (2024). https:\/\/coinmarketcap.com\/"},{"key":"1028_CR23","doi-asserted-by":"crossref","unstructured":"Cong, L.W., Grauer, K., Rabetti, D., Updegrave, H.: Blockchain Forensics and Crypto-Related Cybercrimes (2023)","DOI":"10.2139\/ssrn.4358561"},{"issue":"2","key":"1028_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jacceco.2023.101607","volume":"76","author":"LW Cong","year":"2023","unstructured":"Cong, L.W., Landsman, W., Maydew, E., Rabetti, D.: Tax-loss harvesting with cryptocurrencies. J. Account. Econ. 76(2), 101607 (2023). https:\/\/doi.org\/10.1016\/j.jacceco.2023.101607","journal-title":"J. Account. Econ."},{"issue":"4","key":"1028_CR25","doi-asserted-by":"publisher","first-page":"3416","DOI":"10.1109\/COMST.2018.2842460","volume":"20","author":"M Conti","year":"2018","unstructured":"Conti, M., Kumar, E.S., Lal, C., Ruj, S.: A survey on security and privacy issues of bitcoin. IEEE Commun. Surv. Tutor. 20(4), 3416\u20133452 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"1028_CR26","unstructured":"Coppolino, L., D\u2019Antonio, S., Mazzeo, G., Romano, L., Campegiani, P.: Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing. In: 5th Italian Conference on Cybersecurity\u2014CEUR Workshop Proceedings, 2940, pp 298\u2013308 (2021). https:\/\/ceur-ws.org\/Vol-2940\/paper25.pdf"},{"key":"1028_CR27","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.irfa.2018.09.003","volume":"62","author":"S Corbet","year":"2019","unstructured":"Corbet, S., Lucey, B., Urquhart, A., Yarovaya, L.: Cryptocurrencies as a financial asset: a systematic analysis. Int. Rev. Financ. Anal. 62, 182\u2013199 (2019). https:\/\/doi.org\/10.1016\/j.irfa.2018.09.003","journal-title":"Int. Rev. Financ. Anal."},{"issue":"1","key":"1028_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42786-018-00002-6","volume":"3","author":"D Dasgupta","year":"2019","unstructured":"Dasgupta, D., Shrein, J.M., Gupta, K.D.: A survey of blockchain from security perspective. J. Bank. Financ. Technol. 3(1), 1\u201317 (2019). https:\/\/doi.org\/10.1007\/s42786-018-00002-6","journal-title":"J. Bank. Financ. Technol."},{"key":"1028_CR29","unstructured":"DeBeck, C.: Cryptojacking attacks: Who\u2019s mining on your coin? In Security Intelligence (2019). https:\/\/securityintelligence.com\/posts\/cryptojacking-attacks-whos-mining-on-your-coin\/"},{"key":"1028_CR30","unstructured":"Dossett, J.: Axie Infinity\u2019s Ronin Network loses over 600m in one of the largest crypto hacks on record. In: CNET (2022). https:\/\/www.cnet.com\/personal-finance\/crypto\/hackers-stole-over-600-million-from-axie-infinitys-ronin-network\/"},{"key":"1028_CR31","unstructured":"Dr Akartuna, A.: Mixin Network hacked for $200 Million. Elliptic (2023). https:\/\/www.elliptic.co\/blog\/mixin-network-hacked-for-200-million"},{"key":"1028_CR32","unstructured":"Eira, A.: 16 latest Cybercrime Trends Predictions for 2022\/2023 and beyond. In: Financesonline.com (2023). https:\/\/financesonline.com\/cybercrime-trends\/"},{"key":"1028_CR33","unstructured":"Eliasi, B., Javdan, A.: Comparison of blockchain e-wallet implementations. In: Diva-portal (Issue 2019:565, p. 43). School of Electrical Engineering and Computer Science (2019). https:\/\/www.diva-portal.org\/smash\/get\/diva2:1350402\/FULLTEXT01.pdf"},{"key":"1028_CR34","doi-asserted-by":"crossref","unstructured":"Elrom, E.: Security and compliance. In: The Blockchain Developer, pp. 419\u2013466. Springer (2019)","DOI":"10.1007\/978-1-4842-4847-8_11"},{"key":"1028_CR35","doi-asserted-by":"publisher","unstructured":"Eskandari, S., Barrera, D., Stobert, E., Clark, J.: A first look at the usability of bitcoin key management. In: Proceedings 2015 Workshop on Usable Security (2015). https:\/\/doi.org\/10.14722\/usec.2015.23015","DOI":"10.14722\/usec.2015.23015"},{"key":"1028_CR36","doi-asserted-by":"publisher","unstructured":"Eskandari, S., Leoutsarakos, A., Mursch, T., Clark, J.: A first look at browser-based cryptojacking. In: Proceedings\u20143rd IEEE European Symposium on Security and Privacy Workshops, EURO S and PW 2018, pp 58\u201366 (2018). https:\/\/doi.org\/10.1109\/EuroSPW.2018.00014","DOI":"10.1109\/EuroSPW.2018.00014"},{"key":"1028_CR37","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.jnca.2018.10.020","volume":"126","author":"Q Feng","year":"2019","unstructured":"Feng, Q., He, D., Zeadally, S., Khan, M.K., Kumar, N.: A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 126, 45\u201358 (2019). https:\/\/doi.org\/10.1016\/j.jnca.2018.10.020","journal-title":"J. Netw. Comput. Appl."},{"key":"1028_CR38","doi-asserted-by":"publisher","unstructured":"Fr\u00f6hlich, M., Gutjahr, F., Alt, F.: Don\u2019t lose your coin! Investigating security practices of cryptocurrency users. In: DIS 2020\u2014Proceedings of the 2020 ACM Designing Interactive Systems Conference, pp. 1751\u20131763 (2020). https:\/\/doi.org\/10.1145\/3357236.3395535","DOI":"10.1145\/3357236.3395535"},{"key":"1028_CR39","unstructured":"Grauer, K., Kueshner, W., Updegrave, H.: The 2022 Crypto Crime Report: Original Data and Research into Cryptocurrency-Based Crime. Chainalysis (2022). https:\/\/blockbr.com.br\/wp-content\/uploads\/2022\/06\/2022-crypto-crime-report.pdf"},{"key":"1028_CR40","unstructured":"Grobys, K., Dufitinema, J., Sapkota, N., Dufitinema, J.: On the tail risk of cyberattacks in the Bitcoin market (n.d.). https:\/\/ssrn.com\/abstract=3856867"},{"key":"1028_CR41","unstructured":"Groves, K.: List of crypto exchange hacks: Updated 2022. In: HedgewithCrypto (2022). https:\/\/www.hedgewithcrypto.com\/cryptocurrency-exchange-hacks\/"},{"issue":"2","key":"1028_CR42","doi-asserted-by":"publisher","first-page":"100067","DOI":"10.1016\/j.bcra.2022.100067","volume":"3","author":"H Guo","year":"2022","unstructured":"Guo, H., Yu, X.: A survey on blockchain technology and its security. Blockchain Res. Appl. 3(2), 100067 (2022). https:\/\/doi.org\/10.1016\/j.bcra.2022.100067","journal-title":"Blockchain Res. Appl."},{"issue":"2","key":"1028_CR43","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2060","volume":"29","author":"H Hasanova","year":"2019","unstructured":"Hasanova, H., Baek, U., Shin, M., Cho, K., Kim, M.-S.: A survey on blockchain cybersecurity vulnerabilities and possible countermeasures. Int. J. Netw. Manag. 29(2), e2060 (2019)","journal-title":"Int. J. Netw. Manag."},{"key":"1028_CR44","unstructured":"Hashim, A.: Hotbit crypto exchange confirmed it\u2019s hacked\u2014customers\u2019 personal data exposed. In: Latest Hacking News|Cyber Security News, Hacking Tools and Penetration Testing Courses (2021). https:\/\/latesthackingnews.com\/2021\/05\/03\/hotbit-crypto-exchange-confirmed-its-hacked-customers-personal-data-exposed\/"},{"key":"1028_CR45","unstructured":"Hern, A.: A history of bitcoin hacks. In The Guardian. Guardian News and Media (2014). https:\/\/www.theguardian.com\/technology\/2014\/mar\/18\/history-of-bitcoin-hacks-alternative-currency"},{"key":"1028_CR46","unstructured":"Hill, C.: A look back: cyber\/crypto crime in 2021. In: A LOOK BACK: CYBER\/CRYPTO CRIME IN 2021. Penningtons Manches Cooper (2022). https:\/\/www.penningtonslaw.com\/news-publications\/latest-news\/2022\/a-look-back-cyber-crypto-crime-in-2021"},{"key":"1028_CR47","unstructured":"Hon, H., Wang, K., Bolger, M., Wu, W., Joy, Z.: Research and Insights\u2014Crypto market sizing report 2021 and 2022 forecast. Crypto.Com: The Best Place to Buy Bitcoin, Ethereum, and 250+ Altcoins (2022). https:\/\/crypto.com\/research\/2021-crypto-market-sizing-report-2022-forecast"},{"key":"1028_CR48","unstructured":"Huss, M.: Malicious activity on social media and lack of user awareness. In: ProQuest. ProQuest (2019). https:\/\/www.proquest.com\/openview\/7220f652450998b3b1e7b360fffb022a\/1?cbl=18750&diss=y&pq-origsite=gscholar"},{"issue":"3","key":"1028_CR49","doi-asserted-by":"publisher","first-page":"32022","DOI":"10.1088\/1757-899X\/928\/3\/032022","volume":"928","author":"NT Hussein","year":"2020","unstructured":"Hussein, N.T., Kashmar, A.H.: An improvement of ECDSA weak randomness in blockchain. IOP Conf. Ser. Mater. Sci. Eng. 928(3), 32022 (2020)","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"1028_CR50","doi-asserted-by":"publisher","first-page":"76153","DOI":"10.1109\/ACCESS.2021.3081998","volume":"9","author":"M Iqbal","year":"2021","unstructured":"Iqbal, M., Matulevicius, R.: Exploring sybil and double-spending risks in blockchain systems. IEEE Access 9, 76153\u201376177 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3081998","journal-title":"IEEE Access"},{"key":"1028_CR51","unstructured":"Judge, A.: LocalBitcoins Hack Proves Bitcoin Wallets Need Two-Factor Authentication. Silicon (2015). https:\/\/www.silicon.co.uk\/security\/cyberwar\/localbitcoins-hack-proves-bitcoin-wallets-need-two-factor-authentication-160474#"},{"key":"1028_CR52","doi-asserted-by":"publisher","unstructured":"Kamruzzaman, A., Ismat, S., Brickley, J.C., Liu, A., Thakur, K.: A comprehensive review of endpoint security: threats and defenses. In: 2022 International Conference on Cyber Warfare and Security (ICCWS), pp. 1\u20137 (2022). https:\/\/doi.org\/10.1109\/ICCWS56285.2022.9998470","DOI":"10.1109\/ICCWS56285.2022.9998470"},{"key":"1028_CR53","unstructured":"Kellermann, T.: Modern Bank Heists 5.0, The escalation: From heist to hijack, from dwell to destruction (2022). https:\/\/cognizium.io\/uploads\/resources\/vmware%20-%20Modern%20Bank%20Heist%205%20-%202022.pdf"},{"key":"1028_CR54","unstructured":"Kellermann, T., Murphy, R.: Modern bank heists 3.0. Annual \u201cModern Bank Heists. VMware Carbon Black (2020)"},{"key":"1028_CR55","unstructured":"Krishnakumar A (2022) The blockchain trilemma: Can it ever be tackled? In TradingView. Cointelegraph. https:\/\/cointelegraph.com\/explained\/the-blockchain-trilemma-can-it-ever-be-tackled"},{"key":"1028_CR56","doi-asserted-by":"crossref","unstructured":"Krombholz, K., Judmayer, A., Gusenbauer, M., Weippl, E.: The other side of the coin: user experiences with bitcoin security and privacy. In: International Conference on Financial Cryptography and Data Security, pp. 555\u2013580 (2017)","DOI":"10.1007\/978-3-662-54970-4_33"},{"key":"1028_CR57","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/978-3-030-02683-7_26","volume":"881","author":"A Lazarenko","year":"2019","unstructured":"Lazarenko, A., Avdoshin, S.: Financial risks of the blockchain industry: A survey of cyberattacks. Adv. Intell. Syst. Comput. 881, 368\u2013384 (2019). https:\/\/doi.org\/10.1007\/978-3-030-02683-7_26","journal-title":"Adv. Intell. Syst. Comput."},{"key":"1028_CR58","unstructured":"Lee, J.H.: Systematic approach to analyzing security and vulnerabilities of blockchain systems [Massachusetts Institute of Technology] (2019). https:\/\/web.mit.edu\/smadnick\/www\/wp\/2019-05.pdf"},{"key":"1028_CR59","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1016\/j.future.2017.08.020","volume":"107","author":"X Li","year":"2020","unstructured":"Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems. Futur. Gener. Comput. Syst. 107, 841\u2013853 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"1028_CR60","doi-asserted-by":"crossref","unstructured":"Lim, I.-K., Kim, Y.-H., Lee, J.-G., Lee, J.-P., Nam-Gung, H., Lee, J.-K.: The analysis and countermeasures on security breach of bitcoin. In: LNCS, vol. 8582 (2014)","DOI":"10.1007\/978-3-319-09147-1_52"},{"key":"1028_CR61","doi-asserted-by":"crossref","unstructured":"Li X, Wang X, Kong T, Zheng J, Luo M. From bitcoin to solana\u2013innovating blockchain towards enterprise applications. In: International Conference on Blockchain, Springer International Publishing, Cham, pp. 74\u2013100 (2021)","DOI":"10.1007\/978-3-030-96527-3_6"},{"key":"1028_CR62","doi-asserted-by":"publisher","unstructured":"Low, K.F.K., Teo, E.: Legal risks of owning cryptocurrencies. In: Handbook of Blockchain, Digital Finance, and Inclusion, Volume 1: Cryptocurrency, FinTech, InsurTech, and Regulation, pp. 225\u2013247 (2018). Elsevier Inc. https:\/\/doi.org\/10.1016\/B978-0-12-810441-5.00010-5","DOI":"10.1016\/B978-0-12-810441-5.00010-5"},{"key":"1028_CR63","doi-asserted-by":"crossref","unstructured":"Lustig, C., Nardi, B.: Algorithmic authority: the case of Bitcoin. In: 2015 48th Hawaii International Conference on System Sciences, pp. 743\u2013752 (2015)","DOI":"10.1109\/HICSS.2015.95"},{"key":"1028_CR64","doi-asserted-by":"crossref","unstructured":"Marella, V., Kokabha, M.R., Merikivi, J., Tuunainen, V.: Rebuilding trust in cryptocurrency exchanges after cyber-attacks. In: HICSS, pp 1\u201310 (2021)","DOI":"10.24251\/HICSS.2021.684"},{"key":"1028_CR65","unstructured":"Martin, R.: 5 blockchain security risks and how to reduce them. Ignite Ltd (2018). https:\/\/igniteoutsourcing.com\/blockchain\/blockchain-security-vulnerabilities-risks\/"},{"key":"1028_CR66","doi-asserted-by":"publisher","unstructured":"McCorry, P., M\u00f6ser, M., Ali, S.T.: Why preventing a cryptocurrency exchange heist isn\u2019t good enough. In: Cambridge International Workshop on Security Protocols, pp. 225\u2013233 (2018). https:\/\/doi.org\/10.1007\/978-3-030-03251-7_27","DOI":"10.1007\/978-3-030-03251-7_27"},{"key":"1028_CR67","unstructured":"McFarland, C., Hux, T., Wuehler, E., Campbell, S.: Blockchain Threat Report. McAfee: Cryptojacking (2018)"},{"key":"1028_CR68","unstructured":"Memoria, F.: Users report losing 400,000 due to Jaxx Wallet vulnerability. In: CCN.com (2017). https:\/\/www.ccn.com\/users-report-losing-400000-due-to-jaxx-wallet-vulnerability\/"},{"key":"1028_CR69","doi-asserted-by":"crossref","unstructured":"Mercy Praise, P., Basil Xavier, S.J.A, K. G. J. W., A. J.: Variants of crypto-jacking attacks and their detection techniques. In: S. R. and Prabhu Srikanth, L.G., Pokhrel (eds) Applications and Techniques in Information Security, pp 71\u201387. Springer, Singapore (2023)","DOI":"10.1007\/978-981-99-2264-2_6"},{"key":"1028_CR70","doi-asserted-by":"crossref","unstructured":"Mills, D.C., Wang, K., Malone, B., Ravi, A., Marquardt, J., Badev, A.I., Brezinski, T., Fahy, L., Liao, K., Kargenian, V., et al.: Distributed ledger technology in payments, clearing, and settlement (2016)","DOI":"10.17016\/feds.2016.095"},{"key":"1028_CR71","unstructured":"Musch, M., Wressnegger, C., Johns, M., Rieck, K.: Thieves in the Browser:vWeb-based Cryptojacking in the Wild (2018). http:\/\/arxiv.org\/abs\/1808.09474"},{"key":"1028_CR72","unstructured":"Musharraf, M.: What is the Blockchain Trilemma? Ledger (2023). https:\/\/www.ledger.com\/academy\/what-is-the-blockchain-trilemma"},{"key":"1028_CR73","unstructured":"Nakamoto, S.: A peer-to-peer electronic cash system. Bitcoin (2008). https:\/\/Bitcoin.Org\/Bitcoin.Pdf"},{"issue":"1","key":"1028_CR74","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1080\/19361610.2021.1933322","volume":"18","author":"TM Navamani","year":"2023","unstructured":"Navamani, T.M.: A review on cryptocurrencies security. J. Appl. Secur. Res. 18(1), 49\u201369 (2023). https:\/\/doi.org\/10.1080\/19361610.2021.1933322","journal-title":"J. Appl. Secur. Res."},{"key":"1028_CR75","unstructured":"N\u2019dri, A.: The applications of blockchain to cybersecurity. In: Culminating Projects in Information Assurance, 141 (2023). https:\/\/repository.stcloudstate.edu\/msia_etds\/141\/"},{"key":"1028_CR76","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/978-3-319-51064-4_2","volume":"630","author":"D Neilson","year":"2016","unstructured":"Neilson, D., Hara, S., Mitchell, I.: Bitcoin forensics: a tutorial. Commun. Comput. Inform. Sci. 630, 12\u201326 (2016). https:\/\/doi.org\/10.1007\/978-3-319-51064-4_2","journal-title":"Commun. Comput. Inform. Sci."},{"key":"1028_CR77","doi-asserted-by":"crossref","unstructured":"Nguyen, K.Q., Putni\u0146\u0161, T.J.: Stealing digital assets: evidence from cryptocurrency exchange hacks. (2023)","DOI":"10.2139\/ssrn.4525029"},{"key":"1028_CR78","doi-asserted-by":"crossref","unstructured":"Nguyen, X.-T., Maine, J.A.: Crypto Losses. Available at SSRN 4431079 (2023)","DOI":"10.2139\/ssrn.4431079"},{"key":"1028_CR79","doi-asserted-by":"publisher","unstructured":"Noor, M.A.F., Khanum, S., Anwar, T., Ansari, M.: A holistic view on blockchain and its issues. In: Blockchain Applications in IoT Security, pp. 21\u201344. IGI Global (2021). https:\/\/doi.org\/10.4018\/978-1-7998-2414-5.ch002","DOI":"10.4018\/978-1-7998-2414-5.ch002"},{"key":"1028_CR80","doi-asserted-by":"publisher","unstructured":"Noor, M.A.F., Mustafa, K.: Protocols and guidelines to enhance the endpoint security of blockchain at user\u2019s end. In: ICIDSSD 2022: Proceedings of the 3rd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2022, 24\u201325 March 2022, New Delhi, India, pp. 231 (2023). https:\/\/doi.org\/10.4108\/eai.24-3-2022.2318925","DOI":"10.4108\/eai.24-3-2022.2318925"},{"issue":"19","key":"1028_CR81","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.8158","volume":"36","author":"MAF Noor","year":"2024","unstructured":"Noor, M.A.F., Mustafa, K.: A taxonomy of endpoint vulnerabilities and affected blockchain architecture layers. Concurr. Comput. Pract. Exp. 36(19), e8158 (2024). https:\/\/doi.org\/10.1002\/cpe.8158","journal-title":"Concurr. Comput. Pract. Exp."},{"issue":"109","key":"1028_CR82","doi-asserted-by":"publisher","first-page":"1665","DOI":"10.19101\/IJATEE.2023.10101498","volume":"10","author":"M Noor","year":"2023","unstructured":"Noor, M., Mustafa, K.: A systematic literature review on endpoint vulnerabilities of blockchain applications. Int. J. Adv. Technol. Eng. Explor. 10(109), 1665\u20131695 (2023). https:\/\/doi.org\/10.19101\/IJATEE.2023.10101498","journal-title":"Int. J. Adv. Technol. Eng. Explor."},{"key":"1028_CR83","doi-asserted-by":"publisher","unstructured":"Oosthoek, K., Doerr, C.: From hodl to heist: analysis of cyber security threats to bitcoin exchanges. In: 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 1\u20139 (2020). https:\/\/doi.org\/10.1109\/ICBC48266.2020.9169412","DOI":"10.1109\/ICBC48266.2020.9169412"},{"issue":"1","key":"1028_CR84","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.icte.2019.08.002","volume":"7","author":"O Pal","year":"2021","unstructured":"Pal, O., Alam, B., Thakur, V., Singh, S.: Key management for blockchain technology. ICT Express 7(1), 76\u201380 (2021). https:\/\/doi.org\/10.1016\/j.icte.2019.08.002","journal-title":"ICT Express"},{"key":"1028_CR85","unstructured":"Pearson, T.: Hackers raided crypto for 1.7bn in 2023\u2014check out the top 10 heists of the Year. In: Hackers Raided Crypto for 1.7bn in 2023\u2014Check Out the Top 10 Heists of the Year. DL News (2024). https:\/\/www.dlnews.com\/articles\/defi\/check-out-the-10-biggest-crypto-hacks-of-2023\/"},{"key":"1028_CR86","unstructured":"Ramaswamy, A.: 2FA compromise led to $34M Crypto.com hack. TechCrunch (2022). https:\/\/techcrunch.com\/2022\/01\/20\/2fa-compromise-led-to-34m-crypto-com-hack\/"},{"key":"1028_CR87","unstructured":"Raziel, M.: The good and bad news about blockchain security. In: Dark Reading (2018). https:\/\/www.darkreading.com\/endpoint\/the-good-bad-news-about-blockchain-security"},{"issue":"3","key":"1028_CR88","doi-asserted-by":"publisher","first-page":"71","DOI":"10.10520\/EJC-14d902942d","volume":"31","author":"E Reddy","year":"2018","unstructured":"Reddy, E., Minnaar, A.: Cryptocurrency: a tool and target for cybercrime. Acta Criminol. South. Afr. J. Criminol. 31(3), 71\u201392 (2018). https:\/\/doi.org\/10.10520\/EJC-14d902942d","journal-title":"Acta Criminol. South. Afr. J. Criminol."},{"key":"1028_CR89","unstructured":"Robert Lemos.: Bitcoin exchange Bitstamp claims hack siphoned up to $5.2 million (2015). https:\/\/arstechnica.com\/information-technology\/2015\/01\/bitcoin-exchange-bitstamp-claims-hack-siphoned-up-to-5-2-million\/"},{"issue":"3","key":"1028_CR90","doi-asserted-by":"publisher","first-page":"1977","DOI":"10.1109\/COMST.2020.2975999","volume":"22","author":"M Saad","year":"2020","unstructured":"Saad, M., Spaulding, J., Njilla, L., Kamhoua, C., Shetty, S., Nyang, D., Mohaisen, D.: Exploring the attack surface of blockchain: a comprehensive survey. IEEE Commun. Surv. Tutor. 22(3), 1977\u20132008 (2020)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"1028_CR91","unstructured":"Seligman, J.: The rise and fall of cryptocurrency: the three paths forward. Washington University in St. Louis Legal Studies Research Paper, 22\u201306, 1 (2022)"},{"key":"1028_CR92","doi-asserted-by":"publisher","unstructured":"Shrivas, M.K., Dean, T.Y., Brunda, S.S.: The disruptive blockchain security threats and threat categorization. In: 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T), pp. 327\u2013338 (2020). https:\/\/doi.org\/10.1109\/ICPC2T48082.2020.9071475","DOI":"10.1109\/ICPC2T48082.2020.9071475"},{"key":"1028_CR93","unstructured":"Sonicwall: 2024 Sonicwall cyber threat report- navigating the relentless surge in cybercrime (2024). https:\/\/www.sonicwall.com\/resources\/white-papers\/2024-sonicwall-cyber-threat-report"},{"key":"1028_CR94","unstructured":"Squire, M.: End-to-end encryption isn\u2019t enough security for \u201creal people.\u201d In: The Conversation (2017). https:\/\/theconversation.com\/end-to-end-encryption-isnt-enough-security-for-real-people-82054"},{"key":"1028_CR95","unstructured":"Strom, D.: Blockchain exploits and cryptocurrency mining attacks on the rise. In: Security Intelligence (2018). https:\/\/securityintelligence.com\/blockchain-exploits-and-mining-attacks-on-the-rise-as-cryptocurrency-prices-skyrocket\/"},{"key":"1028_CR96","unstructured":"Sunkara, A.: Wallet hacks: How a person lost over 300,000 due to simple mistakes. In: CoinIdolcom RSS. CoinIdol (2017). https:\/\/coinidol.com\/wallet-hacks-how-person-lost-funds\/"},{"key":"1028_CR97","unstructured":"Szabo, N.: Trusted Third Parties are Security Holes. 2001 (2018)"},{"key":"1028_CR98","unstructured":"Team, E.: Cryptojacking is on the rise, and it\u2019s here to stay. Excellence-IT (2024). https:\/\/excellence-it.co.uk\/insights\/cryptojacking\/"},{"key":"1028_CR99","doi-asserted-by":"crossref","unstructured":"Tekiner, E., Acar, A., Uluagac, A.S., Kirda, E., Selcuk, A.A.: SoK: cryptojacking malware. In: 2021 IEEE European Symposium on Security and Privacy (EuroS&P), 120\u2013139 (2021)","DOI":"10.1109\/EuroSP51992.2021.00019"},{"key":"1028_CR100","unstructured":"Timothy L.B.: A brief history of bitcoin hacks and frauds (2017). https:\/\/arstechnica.com\/tech-policy\/2017\/12\/a-brief-history-of-bitcoin-hacks-and-frauds\/"},{"key":"1028_CR101","unstructured":"Triple, A.: Global cryptocurrency ownership data. 2023. Triple-a. Io (2023). https:\/\/triple-a.io\/crypto-ownership-data\/"},{"key":"1028_CR102","unstructured":"Tuwiner, J.: 63+ cryptocurrency statistics, Facts and Trends (2022). https:\/\/buybitcoinworldwide.com\/cryptocurrency-statistics\/"},{"key":"1028_CR103","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1016\/j.future.2019.08.034","volume":"102","author":"Z Wang","year":"2020","unstructured":"Wang, Z., Yu, H., Zhang, Z., Piao, J., Liu, J.: ECDSA weak randomness in Bitcoin. Futur. Gener. Comput. Syst. 102, 507\u2013513 (2020). https:\/\/doi.org\/10.1016\/j.future.2019.08.034","journal-title":"Futur. Gener. Comput. Syst."},{"key":"1028_CR104","doi-asserted-by":"publisher","unstructured":"Weber, K., Sch\u00fctz, A. E., Fertig, T., & M\u00fcller, N. H.: Exploiting the human factor: social engineering attacks on cryptocurrency users. In: International Conference on Human-Computer Interaction, pp. 650\u2013668 (2020). https:\/\/doi.org\/10.1007\/978-3-030-50506-6_45","DOI":"10.1007\/978-3-030-50506-6_45"},{"issue":"3","key":"1028_CR105","doi-asserted-by":"publisher","first-page":"546","DOI":"10.3390\/electronics12030546","volume":"12","author":"Z Wenhua","year":"2023","unstructured":"Wenhua, Z., Qamar, F., Abdali, T.-A.N., Hassan, R., Jafri, S.T.A., Nguyen, Q.N.: Blockchain technology: security issues, healthcare applications, challenges and future trends. Electronics 12(3), 546 (2023). https:\/\/doi.org\/10.3390\/electronics12030546","journal-title":"Electronics"},{"key":"1028_CR106","first-page":"146","volume":"1","author":"J Werth","year":"2023","unstructured":"Werth, J., Berenjestanaki, M.H., Barzegar, H.R., El Ioini, N., Pahl, C.: A review of blockchain platforms based on the scalability. Secur. Decentraliz. Trilemma ICEIS 1, 146\u2013155 (2023)","journal-title":"Secur. Decentraliz. Trilemma ICEIS"},{"key":"1028_CR107","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101993","volume":"98","author":"P Xia","year":"2020","unstructured":"Xia, P., Wang, H., Zhang, B., Ji, R., Gao, B., Wu, L., Luo, X., Xu, G.: Characterizing cryptocurrency exchange scams. Comput. Secur. 98, 101993 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.101993","journal-title":"Comput. Secur."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01028-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01028-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01028-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:11:18Z","timestamp":1750500678000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01028-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,12]]},"references-count":107,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1028"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01028-w","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,4,12]]},"assertion":[{"value":"22 March 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 April 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"114"}}