{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T19:57:19Z","timestamp":1776887839949,"version":"3.51.2"},"reference-count":148,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T00:00:00Z","timestamp":1764288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Ministry of Science and Higher Education of the Republic of Kazakhstan","award":["AP23487613"],"award-info":[{"award-number":["AP23487613"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Permissionless blockchains have evolved beyond cryptocurrency into foundations for Web3 applications, decentralized finance (DeFi), and digital asset ownership, yet this rapid expansion has intensified privacy vulnerabilities. This study provides a comprehensive review of recent trends, emerging privacy threats, and mitigation strategies in permissionless blockchain ecosystems. We examine six developments reshaping the landscape: meme coin proliferation on high-throughput networks, real-world asset tokenization linking on-chain activity to regulated identities, perpetual derivatives exposing trading strategies, institutional adoption concentrating holdings under regulatory oversight, prediction markets creating permanent records of beliefs, and blockchain\u2013AI integration enabling both privacy-preserving analytics and advanced deanonymization. Through this work and forensic analysis of documented incidents, we analyze seven critical privacy threats grounded in verifiable 2024\u20132025 transaction data: dust attacks, private key management failures, transaction linking, remote procedure call exposure, maximal extractable value extraction, signature hijacking, and smart contract vulnerabilities. Blockchain exploits reached $2.36 billion in 2024 and $2.47 billion in the first half of 2025, with over 80% attributed to compromised private keys and signature vulnerabilities. We evaluate privacy-enhancing technologies, including zero-knowledge proofs, ring signatures, and stealth addresses, identifying the gap between academic proposals and production deployment. We further propose a Secure Development Lifecycle framework incorporating measurable security controls validated against incident data. This work bridges the disconnect between privacy research and industrial practice by synthesizing current trends, providing insights, documenting real-world threats with forensic evidence, and providing actionable insights for both researchers advancing privacy-preserving techniques and developers building secure blockchain applications.<\/jats:p>","DOI":"10.3390\/fi17120547","type":"journal-article","created":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T08:26:57Z","timestamp":1764318417000},"page":"547","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Permissionless Blockchain Recent Trends, Privacy Concerns, Potential Solutions and Secure Development Lifecycle"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8783-2229","authenticated-orcid":false,"given":"Talgar","family":"Bayan","sequence":"first","affiliation":[{"name":"Department of Computer Science, Nazarbayev University, Qabanbay Batyr Ave 53, Astana 010000, Kazakhstan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9404-9494","authenticated-orcid":false,"given":"Adnan","family":"Yazici","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Nazarbayev University, Qabanbay Batyr Ave 53, Astana 010000, Kazakhstan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0243-9434","authenticated-orcid":false,"given":"Richard","family":"Banach","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Manchester, Oxford Rd, Manchester M13 9PL, UK"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2025,11,28]]},"reference":[{"key":"ref_1","unstructured":"Matsuoka, D., and Lazzarin, E. (2025, November 16). Estimating the Number of Real Crypto Users. Available online: https:\/\/a16zcrypto.com\/posts\/article\/estimating-crypto-users\/."},{"key":"ref_2","unstructured":"Chainalysis (2025, September 11). The Chainalysis 2025 Global Adoption Index. Available online: https:\/\/www.chainalysis.com\/blog\/2025-global-crypto-adoption-index\/."},{"key":"ref_3","unstructured":"TRM Labs (2025). 2025 Crypto Crime Report: Key Trends That Shaped the Illicit Crypto Market in 2024, TRM Labs. Available online: https:\/\/www.trmlabs.com\/reports-and-whitepapers\/2025-crypto-crime-report."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.jnca.2018.10.020","article-title":"A Survey on Privacy Protection in Blockchain System","volume":"126","author":"Feng","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.dcan.2020.05.008","article-title":"Privacy Preservation in Permissionless Blockchain: A Survey","volume":"7","author":"Peng","year":"2021","journal-title":"Digit. Commun. Netw."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MSP.2018.3111245","article-title":"Blockchain Access Privacy: Challenges and Directions","volume":"16","author":"Henry","year":"2018","journal-title":"IEEE Secur. Priv."},{"key":"ref_7","unstructured":"Electric Capital (2022). Electric Capital Developer Report 2022: The Next 7 Years of Crypto Developers, Electric Capital. Technical report."},{"key":"ref_8","unstructured":"Electric Capital (2024). 2024 Crypto Developer Report, Electric Capital. Technical report."},{"key":"ref_9","unstructured":"GitHub (2025, September 11). Crypto Ecosystems: A Taxonomy for Sharing Data Around Crypto, web3, Blockchain, and Decentralized Protocols. Electric-Capital\/Crypto-Ecosystems Repository. Available online: https:\/\/github.com\/electric-capital\/crypto-ecosystems."},{"key":"ref_10","unstructured":"(2025, September 11). DeFiLlama. Total Value Locked All Chains. Available online: https:\/\/defillama.com\/chains."},{"key":"ref_11","unstructured":"(2025, September 11). Etherscan. Ethereum (ETH) Blockchain Explorer. Available online: https:\/\/etherscan.io\/chart\/tx."},{"key":"ref_12","unstructured":"BscScan (2025, September 11). BNB Smart Chain Daily Transactions Chart. Available online: https:\/\/bscscan.com\/chart\/tx."},{"key":"ref_13","unstructured":"Solscan (2025, September 11). Solana Analytics. Available online: https:\/\/solscan.io\/analytics."},{"key":"ref_14","unstructured":"Polygonscan (2025, September 11). Polygon PoS Chain Daily Transactions Chart. Available online: https:\/\/polygonscan.com\/chart\/tx."},{"key":"ref_15","unstructured":"TronScan (2025, September 11). TRON Blockchain Explorer. Available online: https:\/\/tronscan.org\/."},{"key":"ref_16","unstructured":"YCharts (2025, October 02). Bitcoin Transactions Per Day. Available online: https:\/\/ycharts.com\/indicators\/bitcoin_transactions_per_day."},{"key":"ref_17","unstructured":"Near Protocol Explorer (2025, September 11). Explore the NEAR Blockchain. Available online: https:\/\/nearblocks.io\/."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/MNET.011.2000473","article-title":"A Survey on Zero-Knowledge Proof in Blockchain","volume":"35","author":"Sun","year":"2021","journal-title":"IEEE Netw."},{"key":"ref_19","first-page":"305","article-title":"On the Size of Pairing-Based Non-Interactive Arguments","volume":"Volume 9666","author":"Fischlin","year":"2016","journal-title":"Advances in Cryptology\u2014EUROCRYPT 2016, Proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, 8\u201312 May 2016"},{"key":"ref_20","unstructured":"Goodell, B., and Noether, S. (2025, November 16). Concise Linkable Ring Signatures and Forgery Against Adversarial Keys. IACR Cryptology ePrint Archive; Paper 2019\/654. Available online: https:\/\/eprint.iacr.org\/2019\/654."},{"key":"ref_21","unstructured":"Wahrst\u00e4tter, T., Solomon, M., Di Francesco, B., and Buterin, V. (2025, September 11). ERC-5564: Stealth Addresses. Available online: https:\/\/eips.ethereum.org\/EIPS\/eip-5564."},{"key":"ref_22","unstructured":"Halborn Security (2024). 2024 Blockchain Security in Review: Key Lessons Learned, Halborn Security. Technical report."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Bayan, T., and Banach, R. (2023, January 4\u20136). Exploring the Privacy Concerns in Permissionless Blockchain Networks and Potential Solutions. Proceedings of the 2023 IEEE International Conference on Smart Information Systems and Technologies (SIST), Astana, Kazakhstan.","DOI":"10.1109\/SIST58284.2023.10223536"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"e5749","DOI":"10.1002\/cpe.5749","article-title":"Punishment not Reward Blockchain Architecture for a Privacy-Preserving Permissioned Network","volume":"33","author":"Banach","year":"2021","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Wang, Y., Yang, J., Li, T., Zhu, F., and Zhou, X. (2018, January 28\u201330). Anti-Dust: A Method for Identifying and Preventing Blockchain\u2019s Dust Attacks. Proceedings of the 2018 International Conference on Information Systems and Computer Aided Education (ICISCAE), Changchun, China.","DOI":"10.1109\/ICISCAE.2018.8666834"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1977","DOI":"10.1109\/COMST.2020.2975999","article-title":"Exploring the Attack Surface of Blockchain: A Comprehensive Survey","volume":"22","author":"Saad","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"e13600","DOI":"10.2196\/13600","article-title":"Privacy-Preserving Methods for Feature Engineering Using Blockchain: Review, Evaluation, and Proof of Concept","volume":"21","author":"Jones","year":"2019","journal-title":"J. Med. Internet Res."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Stamatellis, C., Papadopoulos, P., Pitropakis, N., Katsikas, S., and Buchanan, W. (2020). A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric. Sensors, 20.","DOI":"10.3390\/s20226587"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"164908","DOI":"10.1109\/ACCESS.2019.2950872","article-title":"Privacy-Preserving Solutions for Blockchain: Review and Challenges","volume":"7","author":"Canovas","year":"2019","journal-title":"IEEE Access"},{"key":"ref_30","unstructured":"Bayan, T., and Banach, R. (2024). A Privacy-Preserving DAO Model Using NFT Authentication for the Punishment not Reward Blockchain Architecture. arXiv."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Bayan, T. (2025). Privacy in Blockchain: Addressing Security Challenges, Trends, Smart Contract Innovations, and a Prototype on PnR Architecture. [Ph.D. Thesis, The University of Manchester].","DOI":"10.2139\/ssrn.5439222"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"108766","DOI":"10.1109\/ACCESS.2020.2994294","article-title":"A Survey on Privacy Protection of Blockchain: The Technology and Application","volume":"8","author":"Wang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Arora, D., Gautham, S., Gupta, H., and Bhushan, B. (2019, January 18\u201319). Blockchain-based Security Solutions to Preserve Data Privacy And Integrity. Proceedings of the 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), Greater Noida, India.","DOI":"10.1109\/ICCCIS48478.2019.8974503"},{"key":"ref_34","first-page":"15","article-title":"A Survey on Privacy Vulnerabilities in Permissionless Blockchains","volume":"11","author":"Junejo","year":"2020","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Huynh, T., Nguyen, T., and Tan, H. (2019, January 20\u201321). A Survey on Security and Privacy Issues of Blockchain Technology. Proceedings of the 2019 International Conference on System Science and Engineering (ICSSE), Dong Hoi, Vietnam.","DOI":"10.1109\/ICSSE.2019.8823094"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Yassein, M., Shatnawi, F., Rawashdeh, S., and Mardin, W. (2019, January 3\u20137). Blockchain Technology: Characteristics, Security and Privacy; Issues and Solutions. Proceedings of the 2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA), Abu Dhabi, United Arab Emirates.","DOI":"10.1109\/AICCSA47632.2019.9035216"},{"key":"ref_37","unstructured":"Ledger (2025, October 06). Top Solana Memecoins in 2025. Available online: https:\/\/www.ledger.com\/academy\/topics\/crypto\/top-solana-memecoins-in-2025."},{"key":"ref_38","unstructured":"ChainCatcher (2025, October 06). Token Deflation Experiment: Hyperliquid and Pump.fun\u2019s Apple-Style Gamble. Available online: https:\/\/www.chaincatcher.com\/en\/article\/2210259."},{"key":"ref_39","unstructured":"CryptoDnes (2025, October 06). Best Solana Meme Coins to Watch in 2025: A Full Guide. Available online: https:\/\/cryptodnes.bg\/en\/cryptocurrency\/best-solana-meme-coins\/."},{"key":"ref_40","unstructured":"B2BinPay (2025, October 06). Solana Meme Coins How to Create & Best Ones to Follow in 2025. Available online: https:\/\/b2binpay.com\/en\/news\/10-best-solana-meme-coins-to-watch-in-2024."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., and Savage, S. (2013, January 23\u201325). A Fistful of Bitcoins: Characterizing Payments Among Men with No Names. Proceedings of the 2013 Internet Measurement Conference, Barcelona, Spain.","DOI":"10.1145\/2504730.2504747"},{"key":"ref_42","unstructured":"InvestaX (2024). 2024: The Year of Institutional Real World Asset Tokenization, InvestaX. Technical Report."},{"key":"ref_43","unstructured":"CoinGecko (2025, October 06). What Are Real World Assets (RWA)? A Complete Guide for 2025. Available online: https:\/\/www.coingecko.com\/learn\/what-are-real-world-assets-exploring-rwa-protocols."},{"key":"ref_44","unstructured":"DeFiLlama (2025, September 11). Real World Assets (RWA) Protocols\u2014Total Value Locked (TVL). Available online: https:\/\/defillama.com\/protocols\/rwa."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Caldarelli, G. (2020). Understanding the Blockchain Oracle Problem: A Call for Action. Information, 11.","DOI":"10.3390\/info11110509"},{"key":"ref_46","unstructured":"Chainlink (2025, October 06). Real-World Assets (RWAs) Explained. Available online: https:\/\/chain.link\/education-hub\/real-world-assets-rwas-explained."},{"key":"ref_47","unstructured":"NEFTURE Security (2025, October 06). Understanding Crypto Perpetual Futures and the Hyperliquid Craze. Available online: https:\/\/medium.com\/coinmonks\/understanding-crypto-perpetual-futures-and-the-hyperliquid-craze-7d1c8b413444."},{"key":"ref_48","unstructured":"CoinLedger (2025, October 06). What Is Hyperliquid?. Available online: https:\/\/coinledger.io\/learn\/what-is-hyperliquid."},{"key":"ref_49","unstructured":"DataWallet (2025, October 06). Best Decentralized Perpetuals Exchanges in 2025. Available online: https:\/\/www.datawallet.com\/crypto\/best-decentralized-perpetuals-exchanges."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s12525-024-00715-1","article-title":"Perpetual Future Contracts in Centralized and Decentralized Exchanges: Mechanism and Traders\u2019 Behavior","volume":"34","author":"Chen","year":"2024","journal-title":"Electron. Mark."},{"key":"ref_51","unstructured":"Chen, E., Ma, M., and Nie, Z. (2024). Exploring the Impact: How Decentralized Exchange Designs Shape Traders\u2019 Behavior on Perpetual Future Contracts. arXiv."},{"key":"ref_52","unstructured":"DeFiLlama (2025, September 11). Perpetuals (Perps)\u2014Perpetual Volume Dashboard. Available online: https:\/\/defillama.com\/perps."},{"key":"ref_53","unstructured":"Ruan, Q., and Streltsov, A. (2022). Perpetual Futures Contracts and Cryptocurrency Market Quality. SSRN Electron. J."},{"key":"ref_54","unstructured":"CCN (2025, October 06). From $0.08 to $2.42: How Aster Became DeFi\u2019s Hottest (and Riskiest) Perp DEX. Available online: https:\/\/www.ccn.com\/education\/crypto\/aster-defi-perpetual-futures-vs-hyperliquid-explained\/."},{"key":"ref_55","unstructured":"Cointelegraph (2025, October 06). Kazakhstan Launches Alem Crypto Fund with First Investment in BNB. Available online: https:\/\/cointelegraph.com\/news\/kazakhstan-state-backed-crypto-fund-bnb-binance."},{"key":"ref_56","unstructured":"CoinMarketCap (2025, October 06). Kazakhstan Launches State Crypto Fund with BNB. Available online: https:\/\/coinmarketcap.com\/academy\/article\/kazakhstan-launches-state-crypto-fund-with-bnb."},{"key":"ref_57","unstructured":"BeInCrypto (2025, October 06). Kazakhstan Launches State-Backed Crypto Fund. Available online: https:\/\/beincrypto.com\/kazakhstan-launches-state-backed-crypto-fund\/."},{"key":"ref_58","unstructured":"The Crypto Basic (2025, October 06). Kazakhstan Launches First Crypto Reserve with BNB. Available online: https:\/\/thecryptobasic.com\/2025\/09\/30\/kazakhstan-launches-first-crypto-reserve-with-bnb\/."},{"key":"ref_59","unstructured":"Wikipedia (2025, October 06). Polymarket. Available online: https:\/\/en.wikipedia.org\/wiki\/Polymarket."},{"key":"ref_60","unstructured":"The New Political (2025, October 06). Polymarket and the Rising Popularity of Political Prediction Markets. Available online: https:\/\/www.thenewpolitical.com\/news\/dvgt9l02yfs3x9vzu86xyus5t047tt."},{"key":"ref_61","unstructured":"University of Cincinnati (2025, October 06). Election Results Show Potential of Prediction Markets, Blockchain. Available online: https:\/\/www.uc.edu\/news\/articles\/2024\/12\/election-results-show-potential-of-prediction-markets.html."},{"key":"ref_62","unstructured":"Fortune (2025, October 06). Exclusive: Election Betting Site Polymarket Gives Trump a 67% Chance of Winning But Is Rife with Fake \u2018Wash\u2019 Trading, Researchers Say. Available online: https:\/\/fortune.com\/crypto\/2024\/10\/30\/polymarket-trump-election-crypto-wash-trading-researchers\/."},{"key":"ref_63","first-page":"70","article-title":"Blockchain-Enabled Federated Learning: A Survey","volume":"55","author":"Qu","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"12806","DOI":"10.1109\/JIOT.2021.3072611","article-title":"Federated Learning Meets Blockchain in Edge Computing: Opportunities and Challenges","volume":"8","author":"Nguyen","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"1513","DOI":"10.1109\/TPDS.2020.3044223","article-title":"Biscotti: A Blockchain System for Private and Secure Federated Learning","volume":"32","author":"Shayan","year":"2021","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"111705","DOI":"10.1016\/j.comnet.2025.111705","article-title":"A Blockchain-Based Federated Learning Framework Against Poisoning Attacks in the Internet of Vehicles","volume":"272","author":"Ullah","year":"2025","journal-title":"Comput. Netw."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Bao, Y., Sun, J., Cheng, X., Qiu, W., and Nie, L. (IEEE Trans. Comput. Soc. Syst., 2025). Blockchain-Based Privacy-Preserving Alternative Credit Data Sharing, IEEE Trans. Comput. Soc. Syst.","DOI":"10.1109\/TCSS.2025.3592262"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"2203","DOI":"10.1007\/s10586-021-03260-0","article-title":"Privacy Challenges of IoT-Based Blockchain: A Systematic Review","volume":"25","author":"Liang","year":"2022","journal-title":"Clust. Comput."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"100971","DOI":"10.1016\/j.iot.2023.100971","article-title":"A Smart E-Health Framework for Monitoring the Health of the Elderly and Disabled","volume":"24","author":"Yazici","year":"2023","journal-title":"Internet Things"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"6947","DOI":"10.1007\/s11063-023-11246-9","article-title":"Designing Efficient and Lightweight Deep Learning Models for Healthcare Analysis","volume":"55","author":"Baltabay","year":"2023","journal-title":"Neural Process. Lett."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"14191","DOI":"10.1109\/JSEN.2021.3061458","article-title":"Activity Recognition and Anomaly Detection in E-Health Applications Using Color-Coded Representation and Lightweight CNN Architectures","volume":"21","author":"Yatbaz","year":"2021","journal-title":"IEEE Sens. J."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"128700","DOI":"10.1016\/j.eswa.2025.128700","article-title":"Enhancing ML-Based Anomaly Detection in Data Management for Security Through Integration of IoT, Cloud, and Edge Computing","volume":"293","author":"Baimukhanov","year":"2025","journal-title":"Expert Syst. Appl."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"e2870","DOI":"10.7717\/peerj-cs.2870","article-title":"Enhancing Healthcare Data Privacy and Interoperability with Federated Learning","volume":"11","author":"Akhmetov","year":"2025","journal-title":"PeerJ Comput. Sci."},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Bayan, T., Galy, M.M., and Ziyashev, A.A. (2025). Image Search Module in a Digital Facilitator Network System: Architecture, Algorithms, and Implementation. Orleu. Bull. Contin. Educ., 83\u201393.","DOI":"10.69927\/EBOS8459"},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Bayan, T., Nurbekova, Z., Galy, M.M., and Baigusheva, K. (2025, January 17\u201321). Enhanced Multimodal Diagram Search for Professional Facilitator Networks: A Web-Based Educational Platform. Proceedings of the 2025 10th International Conference on Computer Science and Engineering (UBMK), Istanbul, Turkiye.","DOI":"10.1109\/UBMK67458.2025.11206913"},{"key":"ref_76","unstructured":"Wash, R., Rader, E., Berman, R., and Wellmer, Z. (2020, January 10\u201311). Understanding Password Choices: How Frequently Entered Passwords Are Re-used Across Websites. Proceedings of the Symposium on Usable Privacy and Security (SOUPS), Boston, MA, USA."},{"key":"ref_77","unstructured":"Hankerson, D., Menezes, A.J., and Vanstone, S. (2004). Guide to Elliptic Curve Cryptography, Springer."},{"key":"ref_78","unstructured":"Chainalysis (2025, September 11). Crypto Hacking Revenue Hits All-Time High as Scam Revenue Declines. Available online: https:\/\/www.chainalysis.com\/blog\/crypto-hacking-stolen-funds-2025\/."},{"key":"ref_79","unstructured":"LastPass (2025, October 07). Notice of Recent Security Incident. LastPass Blog. Available online: https:\/\/blog.lastpass.com\/2023\/03\/security-incident-update-recommended-actions\/."},{"key":"ref_80","unstructured":"CCN (2025, September 11). Crypto Hacks 2025: Full List of Scams, Exchange Exploits & DeFi Vulnerabilities. Available online: https:\/\/www.ccn.com\/education\/crypto\/crypto-hacks-exploits-full-list-scams-vulnerabilities\/."},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Yaga, D., Mell, P., Roby, N., and Scarfone, K. (2019). Blockchain Technology Overview, National Institute of Standards and Technology. NIST Internal Report-8202.","DOI":"10.6028\/NIST.IR.8202"},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Shao, Y. (2024). Research on Blockchain Transaction Privacy Protection Methods Based on Deep Learning. Future Internet, 16.","DOI":"10.3390\/fi16040113"},{"key":"ref_83","unstructured":"Xia, P., Zhang, H., Cao, B., Wang, H., Yu, J., and Wang, B. (2021). Ethereum Name Service: The Good, the Bad, and the Ugly. arXiv."},{"key":"ref_84","unstructured":"TokenInsight (2025, September 11). Unmasking Metamask\u2014Is Web3 Really Decentralized And Private?. Available online: https:\/\/tokeninsight.medium.com\/unmasking-metamask-is-web3-really-decentralized-and-private-307260d720be."},{"key":"ref_85","unstructured":"(2025, September 11). Alchemy. List of 43 RPC Node Providers. Available online: https:\/\/www.alchemy.com\/dapps\/best\/rpc-node-providers."},{"key":"ref_86","unstructured":"Crypto Briefing (2025, September 11). Infura, Alchemy Block Tornado Cash Following Treasury Ban. Available online: https:\/\/cryptobriefing.com\/infura-alchemy-block-tornado-cash-following-treasury-ban\/."},{"key":"ref_87","unstructured":"Bitquery (2025, September 11). Understanding Different MEV Attacks: Frontrunning, Backrunning and Other Attacks. Available online: https:\/\/bitquery.io\/blog\/different-mev-attacks."},{"key":"ref_88","unstructured":"CoinMarketCap (2025, September 11). Frontrunners and MEV Explained: How to Beat the Bots. Available online: https:\/\/coinmarketcap.com\/academy\/article\/frontrunners-and-mev-explained-how-to-beat-the-bots."},{"key":"ref_89","unstructured":"Blockworks (2025, September 11). Ethereum Validator Goes Rogue, Frontruns MEV Bots for $25 M. Available online: https:\/\/blockworks.co\/news\/validator-frontruns-mev-bots."},{"key":"ref_90","unstructured":"Gate.io (2025, September 11). Is Your Wallet Safe? How Hackers Exploit Permit, Uniswap Permit2, and Signatures for Phishing. Available online: https:\/\/www.gate.io\/learn\/articles\/is-your-wallet-safe-how-hackers-exploit-permit-uniswap-permit2-and-signatures-for-phishing\/4197."},{"key":"ref_91","unstructured":"Halborn Security (2025). 2025 Blockchain Security Forecast: Top Threats for the Year Ahead, Halborn Security. Technical report."},{"key":"ref_92","unstructured":"Decrypt (2025, September 11). Pepe Holder Loses $1.4 Million in Uniswap Permit2 Phishing Attack. Available online: https:\/\/decrypt.co\/286076\/pepe-uniswap-permit2-phishing-attack."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s102070100002","article-title":"The Elliptic Curve Digital Signature Algorithm (ECDSA)","volume":"1","author":"Johnson","year":"2001","journal-title":"Int. J. Inf. Secur."},{"key":"ref_94","first-page":"164","article-title":"A Survey of Attacks on Ethereum Smart Contracts (SoK)","volume":"Volume 10204","author":"Atzei","year":"2017","journal-title":"Principles of Security and Trust, Proceedings of the 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, 24\u201325 April 2017"},{"key":"ref_95","unstructured":"OWASP Foundation (2025, September 11). OWASP Smart Contract Top 10. Available online: https:\/\/owasp.org\/www-project-smart-contract-top-10\/."},{"key":"ref_96","unstructured":"OpenZeppelin (2025, September 11). OpenZeppelin Contracts: A Library for Secure Smart Contract Development. GitHub Repository. Available online: https:\/\/github.com\/OpenZeppelin\/openzeppelin-contracts."},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"104142","DOI":"10.1016\/j.jnca.2025.104142","article-title":"A Comprehensive Survey of Smart Contracts Vulnerability Detection Tools: Techniques and Methodologies","volume":"237","author":"Hejazi","year":"2025","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_98","first-page":"111919","article-title":"A Survey on Smart Contract Vulnerabilities: Data Sources, Detection and Repair","volume":"209","author":"Feng","year":"2024","journal-title":"J. Syst. Softw."},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"Iuliano, G., and Di Nucci, D. (2024). Smart Contract Vulnerabilities, Tools, and Benchmarks: An Updated Systematic Literature Review. arXiv.","DOI":"10.2139\/ssrn.5369483"},{"key":"ref_100","first-page":"156","article-title":"Threshold-Optimal DSA\/ECDSA Signatures and an Application to Bitcoin Wallet Security","volume":"Volume 9696","author":"Gennaro","year":"2016","journal-title":"Applied Cryptography and Network Security, Proceedings of the 14th International Conference, ACNS 2016, Guildford, UK, 19\u201322 June 2016"},{"key":"ref_101","unstructured":"LF Decentralized Trust (2025, September 30). A Year of Milestones: Let\u2019s Take a Look at 2024. Available online: https:\/\/www.lfdecentralizedtrust.org\/blog\/a-year-of-milestones-lets-take-a-look-at-2024."},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"15038","DOI":"10.1007\/s11227-024-06056-2","article-title":"Proposal Distribution Optimization for Endorsement Strategy in Hyperledger Fabric","volume":"80","author":"Yu","year":"2024","journal-title":"J. Supercomput."},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"103160","DOI":"10.1016\/j.ipm.2022.103160","article-title":"Performance Analysis of a Private Blockchain Network Built on Hyperledger Fabric for Healthcare","volume":"60","author":"Alkhudary","year":"2023","journal-title":"Inf. Process. Manag."},{"key":"ref_104","doi-asserted-by":"crossref","first-page":"2681","DOI":"10.1007\/s10586-022-03800-2","article-title":"Performance Modeling and Analysis of Hyperledger Fabric","volume":"26","author":"Ke","year":"2023","journal-title":"Cluster Comput."},{"key":"ref_105","doi-asserted-by":"crossref","first-page":"100156","DOI":"10.1016\/j.bcra.2023.100156","article-title":"Hyperledger Fabric Platform for Healthcare Trust Relations\u2014Proof-of-Concept","volume":"4","author":"Hasselgren","year":"2023","journal-title":"Blockchain Res. Appl."},{"key":"ref_106","doi-asserted-by":"crossref","first-page":"101217","DOI":"10.1016\/j.iot.2024.101217","article-title":"Latency Performance Modelling in Hyperledger Fabric Blockchain: Challenges and Directions with an IoT Perspective","volume":"26","author":"Abang","year":"2024","journal-title":"Internet Things"},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"2473","DOI":"10.1007\/s11042-023-15690-6","article-title":"Blockchain-Based Distributed Application for Multimedia System Using Hyperledger Fabric","volume":"83","author":"Sharma","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref_108","unstructured":"Monero Research Lab (2025, November 16). View Tags and How They Reduce Wallet Synchronization Times. Monero Research Lab Technical Note. Available online: https:\/\/github.com\/monero-project\/research-lab\/issues\/73."},{"key":"ref_109","doi-asserted-by":"crossref","unstructured":"Eberhardt, J., and Tai, S. (August, January 30). ZoKrates-Scalable Privacy-Preserving Off-Chain Computations. Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada.","DOI":"10.1109\/Cybermatics_2018.2018.00199"},{"key":"ref_110","doi-asserted-by":"crossref","first-page":"100173","DOI":"10.1016\/j.bcra.2023.100173","article-title":"An Overview of Web3 Technology: Infrastructure, Applications, and Popularity","volume":"5","author":"Huang","year":"2024","journal-title":"Blockchain Res. Appl."},{"key":"ref_111","unstructured":"Wang, S., Yuan, Y., Wang, X., Li, J., Qin, R., and Wang, F. (2022). Exploring Web3 From the View of Blockchain. arXiv."},{"key":"ref_112","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1109\/MNET.2023.3321546","article-title":"Web3 Technologies: Challenges and Opportunities","volume":"38","author":"Liu","year":"2024","journal-title":"IEEE Netw."},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"100050","DOI":"10.1016\/j.joitmc.2023.100050","article-title":"Web3 Toolkits: A User Innovation Theory of Crypto Development","volume":"9","author":"Allen","year":"2023","journal-title":"J. Open Innov. Technol. Mark. Complex."},{"key":"ref_114","unstructured":"SlowMist (2025, October 02). Web3 Project Security Practice Requirements. Available online: https:\/\/github.com\/slowmist\/Web3-Project-Security-Practice-Requirements."},{"key":"ref_115","unstructured":"Trail of Bits (2025, September 11). Echidna: A Fast Smart Contract Fuzzer. GitHub Repository. Available online: https:\/\/github.com\/crytic\/echidna."},{"key":"ref_116","unstructured":"Paradigm (2025, September 11). Foundry: A Blazing Fast, Portable and Modular Toolkit for Ethereum Application Development. GitHub Repository. Available online: https:\/\/github.com\/foundry-rs\/foundry."},{"key":"ref_117","unstructured":"Amazon Web Services (2025, September 11). Git-Secrets: Prevents You From Committing Secrets and Credentials Into Git Repositories. GitHub Repository. Available online: https:\/\/github.com\/awslabs\/git-secrets."},{"key":"ref_118","unstructured":"Nomic Foundation (2025, September 11). Hardhat: Ethereum Development Environment for Professionals. GitHub Repository. Available online: https:\/\/github.com\/NomicFoundation\/hardhat."},{"key":"ref_119","unstructured":"Project Management Institute (2021). A Guide to the Project Management Body of Knowledge (PMBOK Guide), Project Management Institute. [7th ed.]."},{"key":"ref_120","unstructured":"Bayan, T., Banach, R., Nurbekov, A., Galy, M.M., Sabyrbayev, A., and Nurbekova, Z. (2024). Blockchain-enhanced Integrity Verification in Educational Content Assessment Platform: A Lightweight and Cost-Efficient Approach. arXiv."},{"key":"ref_121","doi-asserted-by":"crossref","unstructured":"Filip\u010di\u0107, S. (2022, January 23\u201327). Web3 & DAOs: An Overview of the Development and Possibilities for the Implementation in Research and Education. Proceedings of the 2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia.","DOI":"10.23919\/MIPRO55190.2022.9803324"},{"key":"ref_122","doi-asserted-by":"crossref","unstructured":"Platzer, A., Rozier, A.Y., Pradella, M., and Rossi, M. (2025). Formal Methods 2024, LNCS, Springer.","DOI":"10.1007\/978-3-031-71177-0"},{"key":"ref_123","doi-asserted-by":"crossref","unstructured":"Brain, M., and Polgreen, E. (2025). A Pyramid of (Formal) Software Verification. Formal Methods, Proceedings of the 26th International Symposium, FM 2024, Milan, Italy, 9\u201313 September 2024, Springer.","DOI":"10.1007\/978-3-031-71177-0_24"},{"key":"ref_124","doi-asserted-by":"crossref","unstructured":"Hildenbrandt, E., Saxena, M., Rodrigues, N., Zhu, X., Daian, P., Guth, D., Moore, B., Park, D., Zhang, Y., and Stefanescu, A. (2018, January 9\u201312). KEVM: A Complete Formal Semantics of the Ethereum Virtual Machine. Proceedings of the 2018 IEEE 31st Computer Security Foundations Symposium (CSF), Oxford, UK.","DOI":"10.1109\/CSF.2018.00022"},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Park, D., Zhang, Y., Saxena, M., Daian, P., and Rosu, G. (2018, January 4\u20139). A Formal Verification Tool for Ethereum VM Bytecode. Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC\/FSE-18, Lake Buena Vista, FL, USA.","DOI":"10.1145\/3236024.3264591"},{"key":"ref_126","doi-asserted-by":"crossref","unstructured":"Hirai, Y. (2017). Defining the Ethereum Virtual Machine for Interactive Theorem Provers. Financial Cryptography and Data Security, Proceedings of the FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, 7 April 2017, Springer. Lecture Notes in Computer Science.","DOI":"10.1007\/978-3-319-70278-0_33"},{"key":"ref_127","doi-asserted-by":"crossref","unstructured":"Duan, Z., Mao, H., Chen, Z., Bai, X., Hu, K., and Talpin, J.P. (2018, January 8\u201310). Formal Modeling and Verification of Blockchain System. Proceedings of the 10th International Conference on Computer Modeling and Simulation, ICCMS-18, Sydney, Australia.","DOI":"10.1145\/3177457.3177485"},{"key":"ref_128","doi-asserted-by":"crossref","first-page":"5821997","DOI":"10.1155\/int\/5821997","article-title":"Hybrid Consensus Mechanisms in Blockchain: A Comprehensive Review","volume":"2025","author":"Sikora","year":"2025","journal-title":"Int. J. Intel. Sys."},{"key":"ref_129","unstructured":"Yang, Z., and Lei, H. (2020). A Formal Process Virtual Machine for EOS-Based Smart Contract Security Verification. Intelligent Computing and Block Chain, Proceedings of the First BenchCouncil International Federated Conferences, FICC 2020, Qingdao, China, 30 October\u20133 November 2020, Springer."},{"key":"ref_130","doi-asserted-by":"crossref","unstructured":"Murray, Y., and Anisi, D. (2019, January 24\u201326). Survey of Formal Verification Methods for Smart Contracts on Blockchain. Proceedings of the 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Canary Islands, Spain.","DOI":"10.1109\/NTMS.2019.8763832"},{"key":"ref_131","first-page":"1726","article-title":"Formal Process Virtual Machine for Smart Contracts Verification","volume":"14","author":"Yang","year":"2018","journal-title":"Int. J. Perf. Eng."},{"key":"ref_132","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., Delignat-Lavaud, A., Fournet, C., Gollamudi, A., Gonthier, G., Kobeissi, N., Kulatova, N., Rastogi, A., Sibut-Pinote, T., and Swamy, N. (2016, January 24). Formal Verification of Smart Contracts: Short Paper. Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, Vienna, Austria.","DOI":"10.1145\/2993600.2993611"},{"key":"ref_133","doi-asserted-by":"crossref","unstructured":"Abdellatif, T., and Brousmiche, K.-L. (2018, January 26\u201328). Formal Verification of Smart Contracts Based on Users and Blockchain Behaviors Models. Proceedings of the 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France.","DOI":"10.1109\/NTMS.2018.8328737"},{"key":"ref_134","doi-asserted-by":"crossref","unstructured":"Liu, Z., and Liu, J. (2019, January 15\u201319). Formal Verification of Blockchain Smart Contract Based on Colored Petri Net Models. Proceedings of the 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), Milwaukee, WI, USA.","DOI":"10.1109\/COMPSAC.2019.10265"},{"key":"ref_135","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/3522582","article-title":"A Survey of Practical Formal Methods for Security","volume":"34","author":"Kulik","year":"2022","journal-title":"Form. Asp. Comp."},{"key":"ref_136","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/3300000044","article-title":"Security Analysis and Formal Verification on Blockchain and its Applications","volume":"8","author":"Li","year":"2025","journal-title":"Found. Trends Priv. Sec."},{"key":"ref_137","unstructured":"Shor, P. (1994, January 20\u201322). Algorithms for Quantum Computation: Discrete Logarithms and Factoring. Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA."},{"key":"ref_138","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1137\/S0097539795293172","article-title":"Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer","volume":"26","author":"Shor","year":"1997","journal-title":"Siam J. Comput."},{"key":"ref_139","unstructured":"(2025, September 11). What is Post-Quantum Cryptography?, Available online: https:\/\/www.nist.gov\/cybersecurity\/what-post-quantum-cryptography."},{"key":"ref_140","doi-asserted-by":"crossref","unstructured":"Bernstein, D., Buchmann, J., and Dahmen, E. (2009). Post-Quantum Cryptography, Springer.","DOI":"10.1007\/978-3-540-88702-7"},{"key":"ref_141","unstructured":"(2025, September 11). Module-Lattice-Based Key-Encapsulation Mechanism Standard, Available online: https:\/\/csrc.nist.gov\/pubs\/fips\/203\/final."},{"key":"ref_142","unstructured":"(2025, September 11). Module-Lattice-Based Digital Signature Standard, Available online: https:\/\/csrc.nist.gov\/pubs\/fips\/204\/final."},{"key":"ref_143","unstructured":"(2025, September 11). Stateless Hash-Based Digital Signature Standard, Available online: https:\/\/csrc.nist.gov\/pubs\/fips\/205\/final."},{"key":"ref_144","doi-asserted-by":"crossref","first-page":"100065","DOI":"10.1016\/j.array.2021.100065","article-title":"Vulnerability of Blockchain Technologies to Quantum Attacks","volume":"10","author":"Kearney","year":"2021","journal-title":"Array"},{"key":"ref_145","doi-asserted-by":"crossref","unstructured":"Kulkarni, A., Jain, S., and Kumar, A. (2022). Quantum Computing and Quantum Blockchain: Recent Advancements, Analysis and Future Directions. Quantum and Blockchain for Modern Computing Systems: Vision and Advancements: Quantum and Blockchain Technologies: Current Trends and Challenges, Springer.","DOI":"10.1007\/978-3-031-04613-1_11"},{"key":"ref_146","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1049\/qtc2.12119","article-title":"Quantum blockchain: Trends, technologies, and future directions","volume":"5","author":"Gandhi","year":"2024","journal-title":"IET Quantum Commun."},{"key":"ref_147","doi-asserted-by":"crossref","first-page":"967","DOI":"10.1109\/COMST.2023.3325761","article-title":"A Survey and Comparison of Post-Quantum and Quantum Blockchains","volume":"26","author":"Yang","year":"2024","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_148","unstructured":"SlowMist (2025, September 30). SlowMist Founder Cos Shares at HKU: Blockchain Security\u2014Offense, Defense, and Practices. Available online: https:\/\/slowmist.medium.com\/slowmist-founder-cos-shares-at-hku-blockchain-security-offense-defense-and-practices-ac5970c8fbd8."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/12\/547\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T08:37:39Z","timestamp":1764319059000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/12\/547"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,28]]},"references-count":148,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["fi17120547"],"URL":"https:\/\/doi.org\/10.3390\/fi17120547","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,28]]}}}