DC Field | Value | Language |
---|---|---|
dc.contributor.author | Eisentraut, Julia | - |
dc.contributor.author | Holzer, Stephan | - |
dc.contributor.author | Klioba, Katharina | - |
dc.contributor.author | Křetínský, Jan | - |
dc.contributor.author | Pin, Lukas | - |
dc.contributor.author | Wagner, Alexander | - |
dc.date.accessioned | 2021-10-01T10:57:21Z | - |
dc.date.available | 2021-10-01T10:57:21Z | - |
dc.date.issued | 2021-09 | - |
dc.identifier.citation | International Colloquium on Theoretical Aspects of Computing (ICTAC 2021) | de_DE |
dc.identifier.isbn | 978-303085314-3 | de_DE |
dc.identifier.issn | 0302-9743 | de_DE |
dc.identifier.uri | http://hdl.handle.net/11420/10423 | - |
dc.description.abstract | Cryptocurrencies such as Bitcoin have been one of the new major technologies of the last decade. In this paper, we assess the security of Bitcoin using attack-defense trees, an established formalism to evaluate the security of systems. In this paper, our main contributions are as follows: (1) We provide an extended attack-defense tree model for attacks on Bitcoin. (2) We demonstrate the general usability of existing analysis methods for attack-defense trees in this context. (3) We highlight further research directions necessary to extend attack-defense trees to a full-fledged overarching model for security assessment. | en |
dc.language.iso | en | de_DE |
dc.relation.ispartof | Lecture notes in computer science | de_DE |
dc.title | Assessing Security of Cryptocurrencies with Attack-Defense Trees: Proof of Concept and Future Directions | de_DE |
dc.type | inProceedings | de_DE |
dc.type.dini | contributionToPeriodical | - |
dcterms.DCMIType | Text | - |
tuhh.abstract.english | Cryptocurrencies such as Bitcoin have been one of the new major technologies of the last decade. In this paper, we assess the security of Bitcoin using attack-defense trees, an established formalism to evaluate the security of systems. In this paper, our main contributions are as follows: (1) We provide an extended attack-defense tree model for attacks on Bitcoin. (2) We demonstrate the general usability of existing analysis methods for attack-defense trees in this context. (3) We highlight further research directions necessary to extend attack-defense trees to a full-fledged overarching model for security assessment. | de_DE |
tuhh.publisher.doi | 10.1007/978-3-030-85315-0_13 | - |
tuhh.publication.institute | Mathematik E-10 | de_DE |
tuhh.type.opus | InProceedings (Aufsatz / Paper einer Konferenz etc.) | - |
dc.type.driver | contributionToPeriodical | - |
dc.type.casrai | Conference Paper | - |
tuhh.container.volume | 12819 LNCS | de_DE |
tuhh.container.startpage | 214 | de_DE |
tuhh.container.endpage | 234 | de_DE |
dc.relation.conference | 18th International Colloquium on Theoretical Aspects of Computing, ICTAC 2021 | de_DE |
dc.identifier.scopus | 2-s2.0-85115170779 | - |
datacite.resourceType | Conference Paper | - |
datacite.resourceTypeGeneral | Text | - |
item.languageiso639-1 | en | - |
item.grantfulltext | none | - |
item.creatorOrcid | Eisentraut, Julia | - |
item.creatorOrcid | Holzer, Stephan | - |
item.creatorOrcid | Klioba, Katharina | - |
item.creatorOrcid | Křetínský, Jan | - |
item.creatorOrcid | Pin, Lukas | - |
item.creatorOrcid | Wagner, Alexander | - |
item.mappedtype | inProceedings | - |
item.creatorGND | Eisentraut, Julia | - |
item.creatorGND | Holzer, Stephan | - |
item.creatorGND | Klioba, Katharina | - |
item.creatorGND | Křetínský, Jan | - |
item.creatorGND | Pin, Lukas | - |
item.creatorGND | Wagner, Alexander | - |
item.fulltext | No Fulltext | - |
item.openairetype | inProceedings | - |
item.openairecristype | http://purl.org/coar/resource_type/c_5794 | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | Mathematik E-10 | - |
crisitem.author.parentorg | Studiendekanat Elektrotechnik, Informatik und Mathematik | - |
Appears in Collections: | Publications without fulltext |
Add Files to Item
Note about this record
Cite this record
Export
Items in TORE are protected by copyright, with all rights reserved, unless otherwise indicated.