Anatomy of a {High-Profile} Data Breach: Dissecting the Aftermath of a {Crypto-Wallet} Case

S Abramova, R Böhme - 32nd USENIX Security Symposium (USENIX …, 2023‏ - usenix.org
Media reports show an alarming increase of data breaches at providers of cybersecurity
products and services. Since the exposed records may reveal security-relevant data, such …

[PDF][PDF] A systematic literature review on endpoint vulnerabilities of blockchain applications

MAF Noor, K Mustafa - International Journal of Advanced …, 2023‏ - researchgate.net
Blockchain technology is a publicly accessible decentralized and immutable transaction log
that significantly simplifies the recording of transactions and asset management in a …

Blockchain Technology in Mobile Payments: A Systematic Review of Security Enhancements in Mobile Commerce.

V Rattanawiboonsom, N Khan - International Journal of …, 2024‏ - search.ebscohost.com
This systematic review aims to examine how blockchain technology enhances security and
trust in mobile commerce transactions, focusing on its application in mobile payments. The …

A taxonomy of endpoint vulnerabilities and affected blockchain architecture layers

MAF Noor, K Mustafa - Concurrency and Computation: Practice …, 2024‏ - Wiley Online Library
Blockchain technology has gained significant attention and adoption due to its decentralized
nature, and promising secure and immutable transactions. The interpretation of Blockchain's …

A Security Analysis of Cryptocurrency Wallets against Password Brute-Force Attacks

H Byun, J Kim, Y Jeong, B Seok, S Gong, C Lee - Electronics, 2024‏ - mdpi.com
Currently, the monetary value of cryptocurrencies is extremely high, leading to frequent theft
attempts. Cyberattacks targeting cryptocurrency wallets and the scale of these attacks are …

A bounded model checker for web cryptocurrency wallets

S Irno Consalvo - 2022‏ - politesi.polimi.it
Cryptocurrency wallets play a crucial role in the web3 ecosystem, not only managing keys
but also facilitating interaction with decentralized applications and protecting valuable …