Security in Cryptocurrency
- URL: http://arxiv.org/abs/2310.10768v1
- Date: Mon, 16 Oct 2023 19:03:14 GMT
- Title: Security in Cryptocurrency
- Authors: Chelsea Medina, Lily Shaw, Dissy Vargas, Sundar Krishnan,
- Abstract summary: This paper discusses the mechanisms of cryptocurrency, the idea of using security in the system, and the popularity of it.
The authors provide a background on cryptocurrency and how it works.
The authors discuss the security of cryptocurrency in-depth within the paper.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: This paper discusses the mechanisms of cryptocurrency, the idea of using security in the system, and the popularity of it. To begin, the authors provide a background on cryptocurrency and how it works. The authors understand that while most people may be familiar with the concept, they may not know how it works. Next, the authors discuss the security of cryptocurrency in-depth within the paper. The authors also provide examples of attacks on cryptocurrency systems to show the vulnerabilities within the system. Lastly, the authors discuss the popularity of the system to further express the need for security in cryptocurrency.
Related papers
- Examining Attacks on Consensus and Incentive Systems in Proof-of-Work Blockchains: A Systematic Literature Review [0.0]
Bitcoin's security relies on a decentralized ledger consisting of a consensus and an incentive mechanism.
As Bitcoin's acceptance grows, it faces increasing threats from attacks targeting these mechanisms.
This paper begins by examining individual attacks executed in isolation and their profitability.
It then explores how combining these attacks with each other or with other malicious and non-malicious strategies can enhance their overall effectiveness and profitability.
arXiv Detail & Related papers (2024-11-01T04:18:42Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - Understanding crypter-as-a-service in a popular underground marketplace [51.328567400947435]
Crypters are pieces of software whose main goal is to transform a target binary so it can avoid detection from Anti Viruses (AVs) applications.
The crypter-as-a-service model has gained popularity, in response to the increased sophistication of detection mechanisms.
This paper provides the first study on an online underground market dedicated to crypter-as-a-service.
arXiv Detail & Related papers (2024-05-20T08:35:39Z) - IT Strategic alignment in the decentralized finance (DeFi): CBDC and digital currencies [49.1574468325115]
Decentralized finance (DeFi) is a disruptive-based financial infrastructure.
This paper seeks to answer two main questions 1) What are the common IT elements in the DeFi?
And 2) How the elements to the IT strategic alignment in DeFi?
arXiv Detail & Related papers (2024-05-17T10:19:20Z) - The Rise and Fall of Cryptocurrencies: Defining the Economic and Social
Values of Blockchain Technologies, assessing the Opportunities, and defining
the Financial and Cybersecurity Risks of the Metaverse [1.3597551064547502]
The study examines blockchain technologies and their pivotal role in the evolving Metaverse.
It sheds light on topics such as how to invest in cryptocurrency, the mechanics behind crypto mining, and strategies to effectively buy and trade cryptocurrencies.
It critically assesses whether developed or developing nations are poised to reap greater benefits from these technologies.
arXiv Detail & Related papers (2023-08-09T06:07:41Z) - Argumentation Schemes for Blockchain Deanonymization [3.184882058033374]
We develop argumentation schemes to legal reasoning about cryptocurrency deanonymisation.
We demonstrate the applicability of the resulting schemes through an exemplary real-world case.
Ultimately, we envision that using our schemes in legal practice can solidify the evidential value of blockchain investigations.
arXiv Detail & Related papers (2023-05-26T12:37:55Z) - Crypto Currency Regulation and Law Enforcement Perspectives [0.6445605125467572]
We look at various questions of criminal use and misuse of technology.
The aim of the paper is to raise a set of concerns arising in the criminal justice and policing circles.
We propose a simplified classification of crimes related to crypto currency.
arXiv Detail & Related papers (2021-09-01T09:56:28Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - From Tether to Libra: Stablecoins, Digital Currency and the Future of
Money [62.997667081978825]
It provides a compact definition for stablecoins, identifying the unique features that make them distinct from previously known payment systems.
It surveys the different use cases for stablecoins as well as the underlying economic incentives for creating them.
arXiv Detail & Related papers (2020-05-26T18:13:46Z) - Pump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency Market Manipulations [50.521292491613224]
We perform an in-depth analysis of pump and dump schemes organized by communities over the Internet.
We observe how these communities are organized and how they carry out the fraud.
We introduce an approach to detect the fraud in real time that outperforms the current state of the art.
arXiv Detail & Related papers (2020-05-04T21:36:18Z) - Criptocurrencies, Fiat Money, Blockchains and Databases [0.0]
The characteristics of the use of current fiat money and the operation of two-level banking systems are discussed.
The characteristics of blockchains and databases are described.
arXiv Detail & Related papers (2020-02-04T18:04:10Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.