DC FieldValueLanguage
dc.contributor.authorEisentraut, Julia-
dc.contributor.authorHolzer, Stephan-
dc.contributor.authorKlioba, Katharina-
dc.contributor.authorKřetínský, Jan-
dc.contributor.authorPin, Lukas-
dc.contributor.authorWagner, Alexander-
dc.date.accessioned2021-10-01T10:57:21Z-
dc.date.available2021-10-01T10:57:21Z-
dc.date.issued2021-09-
dc.identifier.citationInternational Colloquium on Theoretical Aspects of Computing (ICTAC 2021)de_DE
dc.identifier.isbn978-303085314-3de_DE
dc.identifier.issn0302-9743de_DE
dc.identifier.urihttp://hdl.handle.net/11420/10423-
dc.description.abstractCryptocurrencies such as Bitcoin have been one of the new major technologies of the last decade. In this paper, we assess the security of Bitcoin using attack-defense trees, an established formalism to evaluate the security of systems. In this paper, our main contributions are as follows: (1) We provide an extended attack-defense tree model for attacks on Bitcoin. (2) We demonstrate the general usability of existing analysis methods for attack-defense trees in this context. (3) We highlight further research directions necessary to extend attack-defense trees to a full-fledged overarching model for security assessment.en
dc.language.isoende_DE
dc.relation.ispartofLecture notes in computer sciencede_DE
dc.titleAssessing Security of Cryptocurrencies with Attack-Defense Trees: Proof of Concept and Future Directionsde_DE
dc.typeinProceedingsde_DE
dc.type.dinicontributionToPeriodical-
dcterms.DCMITypeText-
tuhh.abstract.englishCryptocurrencies such as Bitcoin have been one of the new major technologies of the last decade. In this paper, we assess the security of Bitcoin using attack-defense trees, an established formalism to evaluate the security of systems. In this paper, our main contributions are as follows: (1) We provide an extended attack-defense tree model for attacks on Bitcoin. (2) We demonstrate the general usability of existing analysis methods for attack-defense trees in this context. (3) We highlight further research directions necessary to extend attack-defense trees to a full-fledged overarching model for security assessment.de_DE
tuhh.publisher.doi10.1007/978-3-030-85315-0_13-
tuhh.publication.instituteMathematik E-10de_DE
tuhh.type.opusInProceedings (Aufsatz / Paper einer Konferenz etc.)-
dc.type.drivercontributionToPeriodical-
dc.type.casraiConference Paper-
tuhh.container.volume12819 LNCSde_DE
tuhh.container.startpage214de_DE
tuhh.container.endpage234de_DE
dc.relation.conference18th International Colloquium on Theoretical Aspects of Computing, ICTAC 2021de_DE
dc.identifier.scopus2-s2.0-85115170779-
datacite.resourceTypeConference Paper-
datacite.resourceTypeGeneralText-
item.languageiso639-1en-
item.grantfulltextnone-
item.creatorOrcidEisentraut, Julia-
item.creatorOrcidHolzer, Stephan-
item.creatorOrcidKlioba, Katharina-
item.creatorOrcidKřetínský, Jan-
item.creatorOrcidPin, Lukas-
item.creatorOrcidWagner, Alexander-
item.mappedtypeinProceedings-
item.creatorGNDEisentraut, Julia-
item.creatorGNDHolzer, Stephan-
item.creatorGNDKlioba, Katharina-
item.creatorGNDKřetínský, Jan-
item.creatorGNDPin, Lukas-
item.creatorGNDWagner, Alexander-
item.fulltextNo Fulltext-
item.openairetypeinProceedings-
item.openairecristypehttp://purl.org/coar/resource_type/c_5794-
item.cerifentitytypePublications-
crisitem.author.deptMathematik E-10-
crisitem.author.parentorgStudiendekanat Elektrotechnik, Informatik und Mathematik-
Appears in Collections:Publications without fulltext
Show simple item record

Page view(s)

49
Last Week
0
Last month
3
checked on Aug 8, 2022

Google ScholarTM

Check

Add Files to Item

Note about this record

Cite this record

Export

Items in TORE are protected by copyright, with all rights reserved, unless otherwise indicated.