Blockchain technology has become one of the most popular technologies for maintaining digital transactions. From the foundation of Bitcoin to the now-predominant smart contract, blockchain technology promises to induce a shift in thought-about digital transactions in many fields, such as energy, healthcare, Internet of Things, cybersecurity, financial services, and the supply chain. Despite blockchain technology offering many cryptography advantages such as immutability, digital signature, and hashing, it has suffered from several critical cybersecurity threats and vulnerabilities. In this chapter, we build upon the previous studies on vulnerabilities and investigate over 60 real cybersecurity incidents that have been happening on the blockchain networks between 2009 and 2019. We categorize those incidents against the key cybersecurity vulnerabilities in blockchain technologies and have developed a taxonomy that captures five types of cybersecurity threats and vulnerabilities based on five main players in blockchain. The outcome of this research prompted concerns and research direction in developing countermeasures to alleviate these risks. Blockchain; Cybersecurity; Attack; Threat; Vulnerability; Taxonomy.
|Title of host publication||Blockchain for Cybersecurity and Privacy|
|Subtitle of host publication||Architectures, Challenges, and Applications|
|Editors||Yassine Maleh, Mohammad Shojafar, Mamoun Alazab, Imed Romdhani|
|Number of pages||23|
|Publication status||Published - Aug 2020|
Alkhalifah, A., Ng, A., Kayes, A. S. M., Chowdhury, J., Alazab, M., & Watters, P. (2020). A Taxonomy of Blockchain Threats and Vulnerabilities. In Y. Maleh, M. Shojafar, M. Alazab, & I. Romdhani (Eds.), Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications (pp. 3-25). CRC Press. https://doi.org/10.1201/9780429324932