Skip to main content

Showing 1–4 of 4 results for author: Hum, Q

Searching in archive cs. Search in all archives.
.
  1. arXiv:2006.10280  [pdf, other

    cs.CR

    CoinWatch: A Clone-Based Approach For Detecting Vulnerabilities in Cryptocurrencies

    Authors: Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, Ivan Homoliak, Yun Lin, Jun Sun

    Abstract: Cryptocurrencies have become very popular in recent years. Thousands of new cryptocurrencies have emerged, proposing new and novel techniques that improve on Bitcoin's core innovation of the blockchain data structure and consensus mechanism. However, cryptocurrencies are a major target for cyber-attacks, as they can be sold on exchanges anonymously and most cryptocurrencies have their codebases pu… ▽ More

    Submitted 28 October, 2020; v1 submitted 18 June, 2020; originally announced June 2020.

  2. The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses

    Authors: Ivan Homoliak, Sarad Venugopalan, Qingze Hum, Daniel Reijsbergen, Richard Schumi, Pawel Szalachowski

    Abstract: Blockchains are distributed systems, in which security is a critical factor for their success. However, despite their increasing popularity and adoption, there is a lack of standardized models that study blockchain-related security threats. To fill this gap, the main focus of our work is to systematize and extend the knowledge about the security and privacy aspects of blockchains and contribute to… ▽ More

    Submitted 28 October, 2020; v1 submitted 22 October, 2019; originally announced October 2019.

  3. arXiv:1904.06898  [pdf, other

    cs.CR

    A Security Reference Architecture for Blockchains

    Authors: Ivan Homoliak, Sarad Venugopalan, Qingze Hum, Pawel Szalachowski

    Abstract: Due to their interesting features, blockchains have become popular in recent years. They are full-stack systems where security is a critical factor for their success. The main focus of this work is to systematize knowledge about security and privacy issues of blockchains. To this end, we propose a security reference architecture based on models that demonstrate the stacked hierarchy of various thr… ▽ More

    Submitted 15 April, 2019; originally announced April 2019.

  4. arXiv:1806.04358  [pdf, other

    cs.CR

    Rethinking Blockchain Security: Position Paper

    Authors: Vincent Chia, Pieter Hartel, Qingze Hum, Sebastian Ma, Georgios Piliouras, Daniel Reijsbergen, Mark van Staalduinen, Pawel Szalachowski

    Abstract: Blockchain technology has become almost as famous for incidents involving security breaches as for its innovative potential. We shed light on the prevalence and nature of these incidents through a database structured using the STIX format. Apart from OPSEC-related incidents, we find that the nature of many incidents is specific to blockchain technology. Two categories stand out: smart contracts, a… ▽ More

    Submitted 24 April, 2019; v1 submitted 12 June, 2018; originally announced June 2018.

    Comments: 8 pages, 1 figure, accepted for presentation as a regular paper at IEEE Blockchain 2018 (Halifax, Canada)