Blockchain Threat Report
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
IOTA: a Cryptographic Perspective
IOTA: A Cryptographic Perspective Bryan Baek Jason Lin Harvard University Georgia Institute of Technology [email protected] [email protected] 1 Introduction IOTA is an open-source distributed ledger protocol that presents a unique juxtaposition to the blockchain-based Bitcoin. Instead of using the traditional blockchain approach, IOTA stores individual transactions in a directed-acyclic graph (DAG) called Tangle. IOTA claims that this allows several benefits over its blockchain-based predecessors such as quantum-proof properties, no transaction fees, fast transactions, secure data transfer, and infinite scalability. Currently standing at 16th place in the CoinMarketCap, it topped 7 during the height of the bullish period of late 2017. Given these claims and attractions, this paper seeks to analyze the benefits and how they create vulnerabilities and/or disadvantages compared to the standard blockchain approach. Based upon our findings, we will discuss the future of IOTA and its potential of being a viable competitor to blockchain technology for transactions. 2 Background IOTA, which stands for Internet of Things Application [1], is a crypto technology in the form of a distributed ledger that facilitates transactions between Internet of Things (IoT) devices. IoT encompass smart home devices, cameras, sensors, and other devices that monitor conditions in commercial, industrial, and domestic settings [2]. As IoT becomes integrated with different facets of our life, their computational power and storage is often left to waste when idle. David Sonstebo, Sergey Ivancheglo, Dominik Schiener, and Serguei Popov founded the IOTA Foundation in June 2015 after working in the IoT industry because they saw the need to create an ecosystem where IoT devices share and allocate resources efficiently [3]. -
Wallance, an Alternative to Blockchain for Iot Loïc Dalmasso, Florent Bruguier, Achraf Lamlih, Pascal Benoit
Wallance, an Alternative to Blockchain for IoT Loïc Dalmasso, Florent Bruguier, Achraf Lamlih, Pascal Benoit To cite this version: Loïc Dalmasso, Florent Bruguier, Achraf Lamlih, Pascal Benoit. Wallance, an Alternative to Blockchain for IoT. IEEE 6th World Forum on Internet of Things (WF-IoT 2020), Jun 2020, New Orleans, LA, United States. 10.1109/WF-IoT48130.2020.9221474. hal-02893953v2 HAL Id: hal-02893953 https://hal.archives-ouvertes.fr/hal-02893953v2 Submitted on 1 Oct 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Wallance, an Alternative to Blockchain for IoT Loïc Dalmasso, Florent Bruguier, Achraf Lamlih, Pascal Benoit LIRMM University of Montpellier, CNRS Montpellier, France [email protected] Abstract—Since the expansion of the Internet of Things a decentralized Machine-to-Machine (M2M) communication (IoT), connected devices became smart and autonomous. Their protocol. A security mechanism has to ensure the trust exponentially increasing number and their use in many between devices, securing all interactions without a central application domains result in a huge potential of cybersecurity authority like Cloud. In this context, the blockchain system threats. Taking into account the evolution of the IoT, security brings many benefits in terms of reliability and security. -
Examining the Lightning Network on a Protocol Level
Examining the Lightning network on a protocol level Rene Pickhardt (Data Science Consultant) https://www.rene-pickhardt.de & https://twitter.com/renepickhardt München 19.7.2018 I've been told I should start any talk with something everybody in the audience should know A standard Bitcoin Transaction has 6 data fields ( The following is a brief summary of https://en.bitcoin.it/wiki/Transaction#Input ) ● Version number (4 Bytes) ● In-Counter (1-9 Bytes) ● List of inputs (depending on the Value of <In-Counter>) ● Out-Counter (1-9 Bytes) ● List of Outputs (depending on the Value of <Out-Counter>) ● Lock_time (4 Bytes) ( Bitcoin Transaction with 3 inputs and 2 outputs Data consists mainly of executable scripts! A chain of Bitcoin Transactions with 3 UTXO ● Outputs are references by the inputs ● The Script in the output defines how the transaction can be spent ● Owning Bitcoins means being able to spend the output of an unspent transaction ○ Provide an input script ○ Concatenate it with with some outputscript of an unspent transaction ○ The combined Script needs to evaluate to True Spending a Pay-to-PubkeyHash (standard TX) ● ScriptPubKey (aka the Output Script) ○ OP_DUP OP_HASH160 <pubKeyHash> OP_EQUALVERIFY OP_CHECKSIG ● ScriptSig: (aka the Input Script) ○ <sig> <pubKey> ● Explainations ○ OP_CODES are the instructions of the script language within Bitcoin ○ <data> is depicted like html tags with lesser than and greater than signs ○ The complete script is concatenated as Input || Output and then being executed on a Stack machine <sig> <pubKey> -
Motion Record of the Trustee (Returnable
- 32 - cryptocurrency business. In its investigation and review of text and email communications, the Monitor noted that certain TPPs were instructed by Mr. Cotten to provide limited information to the financial institutions in relation to the intended use of the account and its association with the cryptocurrency industry to limit scrutiny by the financial institutions. 80. The Monitor identified a number of accounts that were frozen or closed subsequent to the financial institution becoming aware of the nature of the underlying transactions. The Monitor’s investigation indicates that frequently, Quadriga’s approach to addressing financial institution queries into the nature of the account usage was often to simply move on to another financial institution to avoid further questioning. 81. The Monitor’s investigation also identified many “cash” transactions where certain Users repeatedly funded their Accounts with large cash deposits. The Monitor has been advised that this involved the User physically handing cash in the form of legal tender to a representative of Quadriga. As an example, the Platform recorded $12.1 million of “In person Payments” received from one User through a series of nineteen (19) cash transactions over a 5-month period. The Monitor has been unable to verify how or if these cash deposits were appropriately deposited into the Quadriga treasury system through TPP accounts or other accounts. The Monitor has also reviewed communications which appear to indicate that Mr. Cotten sometimes credited a User’s account with a deposit with the understanding that the User would deliver cash at some point in the future. The deposits, once credited to the User’s Account, were subsequently used by the User to trade and remove Cryptocurrency off Platform. -
ERP Applications Under Fire How Cyberattackers Target the Crown Jewels
ERP Applications Under Fire How cyberattackers target the crown jewels July 2018 v1.0 With hundreds of thousands of implementations across the globe, Enterprise Resource Planning (ERP) applications are supporting the most critical business processes for the biggest organizations in the world. This report is the result of joint research performed by Digital Shadows and Onapsis, aimed to provide insights into how the threat landscape has been evolving over time for ERP applications. We have concentrated our efforts on the two most widely-adopted solutions across the large enterprise segment, SAP and Oracle E-Business Suite, focusing on the risks and threats organizations should care about. According to VP Distinguished Analyst, Neil MacDonald “As financially motivated attackers turn their attention ‘up the stack’ to the application layer, business applications such as ERP, CRM and human resources are attractive targets. In many organizations, the ERP application is maintained by a completely separate team and security has not been a high priority. As a result, systems are often left unpatched for years in the name of operational availability.” Gartner, Hype Cycle for Application Security, 2017, July 2017 1 1 Gartner, Hype Cycle for Application Security, 2017, Published: 28 July 2017 ID: G00314199, Analyst(s): Ayal Tirosh, https://www.gartner.com/doc/3772095/hype-cycle-application-security- 02 Executive Summary With hundreds of thousands of implementations across the globe, Enterprise Resource Planning (ERP) applications support the most critical business processes and house the most sensitive information for the biggest organizations in the world. The vast majority of these large organizations have implemented ERP applications from one of the two market leaders, SAP and Oracle. -
On the Relationship of Cryptocurrency Price with US Stock and Gold Price Using Copula Models
mathematics Article On the Relationship of Cryptocurrency Price with US Stock and Gold Price Using Copula Models Jong-Min Kim 1 , Seong-Tae Kim 2 and Sangjin Kim 3,* 1 Statistics Discipline, University of Minnesota at Morris, Morris, MN 56267, USA; [email protected] 2 Department of Mathematics, North Carolina A&T State University, Greensboro, NC 27411, USA; [email protected] 3 Department of Management and Information Systems, Dong-A University, Busan 49236, Korea * Correspondence: [email protected] Received: 15 September 2020; Accepted: 20 October 2020; Published: 23 October 2020 Abstract: This paper examines the relationship of the leading financial assets, Bitcoin, Gold, and S&P 500 with GARCH-Dynamic Conditional Correlation (DCC), Nonlinear Asymmetric GARCH DCC (NA-DCC), Gaussian copula-based GARCH-DCC (GC-DCC), and Gaussian copula-based Nonlinear Asymmetric-DCC (GCNA-DCC). Under the high volatility financial situation such as the COVID-19 pandemic occurrence, there exist a computation difficulty to use the traditional DCC method to the selected cryptocurrencies. To solve this limitation, GC-DCC and GCNA-DCC are applied to investigate the time-varying relationship among Bitcoin, Gold, and S&P 500. In terms of log-likelihood, we show that GC-DCC and GCNA-DCC are better models than DCC and NA-DCC to show relationship of Bitcoin with Gold and S&P 500. We also consider the relationships among time-varying conditional correlation with Bitcoin volatility, and S&P 500 volatility by a Gaussian Copula Marginal Regression (GCMR) model. The empirical findings show that S&P 500 and Gold price are statistically significant to Bitcoin in terms of log-return and volatility. -
Crypto-Asset Markets: Potential Channels for Future Financial Stability
Crypto-asset markets Potential channels for future financial stability implications 10 October 2018 The Financial Stability Board (FSB) is established to coordinate at the international level the work of national financial authorities and international standard-setting bodies in order to develop and promote the implementation of effective regulatory, supervisory and other financial sector policies. Its mandate is set out in the FSB Charter, which governs the policymaking and related activities of the FSB. These activities, including any decisions reached in their context, shall not be binding or give rise to any legal rights or obligations under the FSB’s Articles of Association. Contacting the Financial Stability Board Sign up for e-mail alerts: www.fsb.org/emailalert Follow the FSB on Twitter: @FinStbBoard E-mail the FSB at: [email protected] Copyright © 2018 Financial Stability Board. Please refer to: www.fsb.org/terms_conditions/ Contents Executive Summary ................................................................................................................... 1 1. Introduction ......................................................................................................................... 3 2. Primary risks in crypto-asset markets ................................................................................. 5 2.1 Market liquidity risks ............................................................................................... 5 2.2 Volatility risks ......................................................................................................... -
Pwc I 2Nd Global Crypto M&A and Fundraising Report
2nd Global Crypto M&A and Fundraising Report April 2020 2 PwC I 2nd Global Crypto M&A and Fundraising Report Dear Clients and Friends, We are proud to launch the 2nd edition of our Global Crypto M&A and Fundraising Report. We hope that the market colour and insights from this report will be useful data points. We will continue to publish this report twice a year to enable you to monitor the ongoing trends in the crypto ecosystem. PwC has put together a “one stop shop” offering, focused on crypto services across our various lines of services in over 25 jurisdictions, including the most active crypto jurisdictions. Our goal is to service your needs in the best possible way leveraging the PwC network and allowing you to make your project a success. Our crypto clients include crypto exchanges, crypto investors, crypto asset managers, ICOs/IEOs/STOs/stable and asset backed tokens, traditional financial institutions entering the crypto space as well as governments, central banks, regulators and other policy makers looking at the crypto ecosystem. As part of our “one stop shop” offering, we provide an entire range of services to the crypto ecosystem including strategy, legal, regulatory, accounting, tax, governance, risk assurance, audit, cybersecurity, M&A advisory as well as capital raising. More details are available on our global crypto page as well as at the back of this report. 2nd Global Crypto M&A and Fundraising Report April 2020 PwC 2 3 PwC I 2nd Global Crypto M&A and Fundraising Report 5 Key takeaways when comparing 2018 vs 2019 There -
Deviant Decentralized Exchange
DDEEVVXX Deviant Decentralized Exchange A hybrid exchange leveraging Smartcoins on the Bitshares (BTS) blockchain. CONTENTS 03 What is the current landscape for trading crypto assets? 05 Centralized Exchanges 08 Decentralized Exchanges 11 Hybrid Exchanges 13 DEVX Platform 14 Platform Overview 16 DEVX Smart Coin 17 DEVX off-chain engine - The DEVX Transient Protocol (DEVTP) 19 Trading Process 25 What is the status of development / roadmap for these innovations? 26 DEVX Team 03 Crypto assets are here to stay. According to Apple co-founder Steve Wozniak, Bitcoin and WHAT IS THE blockchain will be the next major IT revolution, and will achieve full CURRENT potential in a decade. According to LANDSCAPE FOR Paypal co-founder Peter Thiel, Bitcoin is the next Digital Gold. TRADING CRYPTO Since Bitcoin’s release in 2009, 1,622 altcoin variants have been issued. ASSETS? 2018 has already broken all records with 345 Initial Coin Offerings, and over US$ 7.7 billion of capital raised. DEVX the next revolution 04 Growth in the number of crypto assets has also driven an increase in crypto asset trading, in order to satisfy the requirements of the increasingly numerous universe of holders, investors, arbitrageurs, market makers, speculators and hedgers. There are presently more than 500 crypto asset exchanges to bring together buyers and sellers, where crypto assets are traded for either different digital currencies, or for other assets such as conventional fiat money. These exchanges operate mostly outside Western countries, and range from fully-online platforms to bricks-and-mortar businesses. Currently, almost two thirds of all daily global crypto asset trading volume results from activity on just ten of these exchanges. -
An Anonymous Trust-Marking Scheme on Blockchain Systems
An Anonymous Trust-Marking Scheme on Blockchain Systems Teppei Sato Keita Emura Tomoki Fujitani Kazumasa Omote University of Tsukuba National Institute of University of Tsukuba University of Tsukuba Japan Information and National Institute of National Institute of Communications Technology Information and Information and Japan Communications Technology Communications Technology Japan Japan Abstract—During the Coincheck incident, which recorded During the Coincheck incident, which recorded the largest the largest damages in cryptocurrency history in 2018, it was damages in cryptocurrency history in 2018, some volun- demonstrated that using Mosaic token can have a certain effect. teers tracked leaked New Economy Movement (NEM) cryp- Although it seems attractive to employ tokens as countermea- sures for cryptocurrency leakage, Mosaic is a specific token tocurrencies using Mosaic, which is a NEM-specific fea- for the New Economy Movement (NEM) cryptocurrency and ture allowing a self-made token to be sent on the NEM is not employed for other blockchain systems or cryptocurren- blockchain. These volunteers sent Mosaic to addresses that cies. Moreover, although some volunteers tracked leaked NEM received leaked NEMs from Coincheck addresses and warned using Mosaic in the CoinCheck incident, it would be better the recipients that these should not be exchanged for other to verify that the volunteers can be trusted. Simultaneously, if someone (e.g., who stole cryptocurrencies) can identify the cryptocurrencies or legal currencies. A criminal can discard volunteers, then that person or organization may be targets of such marked addresses, so it can be seen as a cat-and- them. In this paper, we propose an anonymous trust-marking mouse game. -
Vulnerability of Blockchain Technologies to Quantum Attacks
Vulnerability of Blockchain Technologies to Quantum Attacks Joseph J. Kearneya, Carlos A. Perez-Delgado a,∗ aSchool of Computing, University of Kent, Canterbury, Kent CT2 7NF United Kingdom Abstract Quantum computation represents a threat to many cryptographic protocols in operation today. It has been estimated that by 2035, there will exist a quantum computer capable of breaking the vital cryptographic scheme RSA2048. Blockchain technologies rely on cryptographic protocols for many of their essential sub- routines. Some of these protocols, but not all, are open to quantum attacks. Here we analyze the major blockchain-based cryptocurrencies deployed today—including Bitcoin, Ethereum, Litecoin and ZCash, and determine their risk exposure to quantum attacks. We finish with a comparative analysis of the studied cryptocurrencies and their underlying blockchain technologies and their relative levels of vulnerability to quantum attacks. Introduction exist to allow the legitimate owner to recover this account. Blockchain systems are unlike other cryptosys- tems in that they are not just meant to protect an By contrast, in a blockchain system, there is no information asset. A blockchain is a ledger, and as central authority to manage users’ access keys. The such it is the asset. owner of a resource is by definition the one hold- A blockchain is secured through the use of cryp- ing the private encryption keys. There are no of- tographic techniques. Notably, asymmetric encryp- fline backups. The blockchain, an always online tion schemes such as RSA or Elliptic Curve (EC) cryptographic system, is considered the resource— cryptography are used to generate private/public or at least the authoritative description of it. -
Is Bitcoin Really Untethered?
THE JOURNAL OF FINANCE • VOL. LXXV, NO. 4 • AUGUST 2020 Is Bitcoin Really Untethered? JOHN M. GRIFFIN and AMIN SHAMS∗ ABSTRACT This paper investigates whether Tether, a digital currency pegged to the U.S. dollar, influenced Bitcoin and other cryptocurrency prices during the 2017 boom. Using al- gorithms to analyze blockchain data, we find that purchases with Tether are timed following market downturns and result in sizable increases in Bitcoin prices. The flow is attributable to one entity, clusters below round prices, induces asymmetric auto- correlations in Bitcoin, and suggests insufficient Tether reserves before month-ends. Rather than demand from cash investors, these patterns are most consistent with the supply-based hypothesis of unbacked digital money inflating cryptocurrency prices. INNOVATION, EXCESSIVE SPECULATION, AND DUBIOUS behavior are often closely linked. Periods of extreme price increases followed by implosion, commonly known as “bubbles,” are often associated with legitimate inventions, technolo- gies, or opportunities. However, they can be carried to excess. In particu- lar, financial bubbles often coincide with the belief that a rapid gain can be ∗John M. Griffin is at the McCombs School of Business, University of Texas at Austin. Amin Shams is at the Fisher College of Business, Ohio State University. Helpful comments were received from Stefan Nagel (the editor); an associate editor; two anonymous referees; Cesare Fracassi; Sam Kruger; Shaun MaGruder; Gregor Matvos; Nikolai Roussanov; Clemens Sialm; and seminar and conference