International Journal of Advanced Technology and Engineering Exploration (IJATEE) ISSN (P): 2394-5443 ISSN (O): 2394-7454 Vol - 10, Issue - 109, December 2023
  1. 1
    Google Scholar
A systematic literature review on endpoint vulnerabilities of blockchain applications

Mohd Azeem Faizi Noor and Khurram Mustafa

Abstract

Blockchain technology is a publicly accessible decentralized and immutable transaction log that significantly simplifies the recording of transactions and asset management in a corporate network. An asset can be tangible like a house, car, cash, or land, or intangible like intellectual property, patents, copyrights, or branding. It may considered as a unique identifier for every data, with each block in the ledger having its own hash and containing the previous block’s hash. It is one of the most emerging technologies with added built-in flexibility that has changed the world. Because of its all-encompassing nature, it is being accepted and endorsed as a promising technology by financial and non-financial transaction platforms. However, like any other developing technology, it too has its own set of concerns, bottlenecks and obstacles including scalability, privacy, regulation, and security issues. Recent heists and hacks have raised serious questions about its existence and security. Endpoint vulnerabilities are one such crucial and inherently particular security concern that must be addressed. Thus, this study systematically reviews the literature to bring about the state-of-the-art to determine the possible factors, aspects, and causes of the endpoint vulnerabilities with some mitigation countermeasures. Several recent studies were selected to mine the endpoint vulnerability information and focus on the pertinent issues. The major revelation is the lack of user knowledge, insufficient security mechanism, no security layer other than authentication, keylogger malware behind endpoint vulnerability exploitation. It explains the various factors and root causes of endpoint vulnerabilities and provides a relation between the endpoint and its attribute/components. Lacking adequate mechanisms to counteract endpoint vulnerability attacks, users are more likely to make technical and behavioral blunders. Moreover, it fulfills the lack of any systematic literature review (SLR) on endpoint vulnerabilities. It aims to raise security awareness among users, enhance security measures for developers, and provide valuable insights for further investigation by researchers. This study is a step towards understanding and improving the security posture at the endpoints of blockchain networks.

Keyword

Endpoint vulnerabilities, Blockchain, Key, Wallet, Cryptojacking.

Cite this article

Noor MA, Mustafa K

Refference

[1][1]Khan MA, Salah K. IoT security: review, blockchain solutions, and open challenges. Future Generation Computer Systems. 2018; 82:395-411.

[2][2]Noor MA, Mustafa K. Protocols and guidelines to enhance the endpoint security of blockchain at user’s end. In proceedings of the 3rd international conference on ICT for digital, smart, and sustainable development 2023 (pp. 231-41). European Alliance for Innovation.

[3][3]https://learn.microsoft.com/en-us/mem/intune/protect/endpoint-security. Accessed 04 November 2023.

[4][4]https://www.selecthub.com/endpoint-security/endpoint-security-software-requirements/. Accessed 04 November 2023.

[5][5]Khanum S, Mustafa K. A systematic literature review on sensitive data protection in blockchain applications. Concurrency and Computation: Practice and Experience. 2023; 35(1):e7422.

[6][6]Levis D, Fontana F, Ughetto E. A look into the future of blockchain technology. Plos One. 2021; 16(11):1-20.

[7][7]Houy S, Schmid P, Bartel A. Security aspects of cryptocurrency wallets—a systematic literature review. ACM Computing Surveys. 2023; 56(1):1-31.

[8][8]Nakamoto S. A peer-to-peer electronic cash system. Bitcoin. 2008: 1-24.

[9][9]Noor MA, Khanum S, Anwar T, Ansari M. A holistic view on blockchain and its issues. In blockchain applications in IoT security 2021 (pp. 21-44). IGI Global.

[10][10]Zheng XR, Lu Y. Blockchain technology–recent research and future trend. Enterprise Information Systems. 2022; 16(12):1939895.

[11][11]Baygin N, Baygin M, Karakose M. Blockchain technology: applications, benefits and challenges. In 1st international informatics and software engineering conference 2019 (pp. 1-5). IEEE.

[12][12]Saad M, Spaulding J, Njilla L, Kamhoua C, Shetty S, Nyang D, et al. Exploring the attack surface of blockchain: a comprehensive survey. IEEE Communications Surveys & Tutorials. 2020; 22(3):1977-2008.

[13][13]Laroiya C, Saxena D, Komalavalli C. Applications of blockchain technology. In Handbook of Research on Blockchain Technology 2020 (pp. 213-43). Academic Press.

[14][14]Sunyaev A, Sunyaev A. Distributed ledger technology. Internet Computing: Principles of Distributed Systems and Emerging Internet-Based Technologies. 2020:265-99.

[15][15]Gugueoth V, Safavat S, Shetty S, Rawat D. A review of IoT security and privacy using decentralized blockchain techniques. Computer Science Review. 2023; 50:100585.

[16][16]Panwar A, Bhatnagar V. Distributed ledger technology (DLT): the beginning of a technological revolution for blockchain. In 2nd international conference on data, engineering and applications 2020 (pp. 1-5). IEEE.

[17][17]Alkhodair AJ, Mohanty SP, Kougianos E. Consensus algorithms of distributed ledger technology--a comprehensive analysis. arXiv preprint arXiv:2309.13498. 2023.

[18][18]Yermack D, Fingerhut A. Blockchain technologys potential in the financial system. In proceedings of the financial market’s conference 2019 (pp.1-20).

[19][19]Firdaus A, Razak MF, Feizollah A, Hashem IA, Hazim M, Anuar NB. The rise of “blockchain”: bibliometric analysis of blockchain study. Scientometrics. 2019; 120:1289-331.

[20][20]Garriga M, Dalla PS, Arias M, De RA, Pareschi R, Andrew TD. Blockchain and cryptocurrencies: a classification and comparison of architecture drivers. Concurrency and Computation: Practice and Experience. 2021; 33(8):e5992.

[21][21]Chohan UW. Non-fungible tokens: blockchains, scarcity, and value. Critical Blockchain Research Initiative (CBRI) Working Papers. 2021: 1-14.

[22][22]Auer R, Haslhofer B, Kitzler S, Saggese P, Victor F. The technology of decentralized finance (DeFi). Bank for International Settlements, Monetary and Economic Department; 2023:1-37.

[23][23]Wang S, Yuan Y, Wang X, Li J, Qin R, Wang FY. An overview of smart contract: architecture, applications, and future trends. In intelligent vehicles symposium (IV) 2018 (pp. 108-13). IEEE.

[24][24]Lee JH. Systematic approach to analyzing security and vulnerabilities of blockchain systems (Doctoral Dissertation, Massachusetts Institute of Technology). 2019:119-49.

[25][25]Kim H, Kim D. A taxonomic hierarchy of blockchain consensus algorithms: an evolutionary phylogeny approach. Sensors. 2023; 23(5):1-27.

[26][26]Dhanya D, Jha B, Jha D. Moderated mediation model of the factors influencing intention to invest in cryptocurrency among millennials and generation Z. Scope. 2023; 13(3):201-13.

[27][27]Al-hashedi KG, Magalingam P, Maarop N, Samy GN, Manaf AA. A conceptual model to identify illegal activities on the bitcoin system. In international conference on advances in cyber security 2021 (pp. 18-34). Singapore: Springer Singapore.

[28][28]Latifa ER, Omar A. Blockchain: bitcoin wallet cryptography security, challenges and countermeasures. Journal of Internet Banking and Commerce. 2017; 22(3):1-29.

[29][29]Dasgupta D, Shrein JM, Gupta KD. A survey of blockchain from security perspective. Journal of Banking and Financial Technology. 2019; 3:1-7.

[30][30]Halaburda H. Blockchain revolution without the blockchain? Communications of the ACM. 2018; 61(7):27-9.

[31][31]Frizzo-barker J, Chow-white PA, Adams PR, Mentanko J, Ha D, Green S. Blockchain as a disruptive technology for business: a systematic review. International Journal of Information Management. 2020; 51:102029.

[32][32]Alqahtani AM, Algarni A. A survey on blockchain technology concepts, applications and security. International Journal of Advanced Computer Science and Applications. 2023; 14(2):841-44.

[33][33]Mustafa MK, Waheed S. A governance framework with permissioned blockchain for the transparency in e-tendering process. International Journal of Advanced Technology and Engineering Exploration. 2019; 6(61):274-80.

[34][34]Kombe C, Dida M, Sam A. A review on healthcare information systems and consensus protocols in blockchain technology. International Journal of Advanced Technology and Engineering Exploration. 2019; 5(49):473-83.

[35][35]Crosby M, Pattanayak P, Verma S, Kalyanaraman V. Blockchain technology: beyond bitcoin. Applied Innovation. 2016; 2(6-10):1-19.

[36][36]Adlaon JK. A systematic literature review of Ransomware attacks in healthcare. Electronic Theses, Projects, and Dissertations. 2023.

[37][37]Fatrah A, El KS, Haqiq A, Salah K. Proof of concept blockchain-based voting system. In proceedings of the 4th international conference on big data and internet of things 2019 (pp. 1-5).

[38][38]Agbo CC, Mahmoud QH, Eklund JM. Blockchain technology in healthcare: a systematic review. Healthcare. 2019; 7(2):1-30.

[39][39]Farouk A, Alahmadi A, Ghose S, Mashatan A. Blockchain platform for industrial healthcare: vision and future opportunities. Computer Communications. 2020; 154:223-35.

[40][40]Heston T. A case study in blockchain healthcare innovation. SSRN Journal. 2017: 1-3.

[41][41]Iqtait A. Blockchain technology in MENA: sociopolitical impacts. Available at SSRN 4475898. 2023: 1-18.

[42][42]Abuidris Y, Hassan A, Hadabi A, Elfadul I. Risks and opportunities of blockchain based on e-voting systems. In 16th international computer conference on wavelet active media technology and information processing 2019 (pp. 365-8). IEEE.

[43][43]https://igniteoutsourcing.com/blockchain/blockchain-security-vulnerabilities-risks/. Accessed 04 November 2023.

[44][44]Rasool MA, Muhammad SH. Blockchain technology: a new domain for cyber forensics. Master Thesis, Halmstad University. 2018.

[45][45]Patel R, Sethia A, Patil S. Blockchain–future of decentralized systems. In international conference on computing, power and communication technologies 2018 (pp. 369-74). IEEE.

[46][46]https://www.cloudcodes.com/blog/endpoint-security-risks-due-to-blockchain.html. Accessed 04 November 2023.

[47][47]https://www.darkreading.com/endpoint/the-good-bad-news-about-blockchain-security. Accessed 04 November 2023.

[48][48]Conti M, Kumar ES, Lal C, Ruj S. A survey on security and privacy issues of bitcoin. IEEE Communications Surveys & Tutorials. 2018; 20(4):3416-52.

[49][49]Taylor PJ, Dargahi T, Dehghantanha A, Parizi RM, Choo KK. A systematic literature review of blockchain cyber security. Digital Communications and Networks. 2020; 6(2):147-56.

[50][50]Zamani E, He Y, Phillips M. On the security risks of the blockchain. Journal of Computer Information Systems. 2020; 60(6):495-506.

[51][51]Zhang R, Xue R, Liu L. Security and privacy on blockchain. ACM Computing Surveys. 2019; 52(3):1-34.

[52][52]Hasanova H, Baek UJ, Shin MG, Cho K, Kim MS. A survey on blockchain cybersecurity vulnerabilities and possible countermeasures. International Journal of Network Management. 2019; 29(2):e2060.

[53][53]https://blockchaintrainingalliance.com/blogs/news/blockchain-security-vs-standard-cybersecurity. Accessed 04 November 2023.

[54][54]Charoenwong B, Bernardi M. A decade of cryptocurrency ‘hacks’: 2011–2021. Available at SSRN 3944435. 2021.

[55][55]Eskandari S, Clark J, Barrera D, Stobert E. A first look at the usability of bitcoin key management. arXiv preprint arXiv:1802.04351. 2018.

[56][56]Atiquzzaman M, Yen N, Xu Z. Big data analytics for cyber-physical system in smart city: BDCPS 2019 (pp.28-9), Shenyang, China. Springer Nature.

[57][57]Marella V, Kokabha MR, Merikivi J, Tuunainen V. Rebuilding trust in cryptocurrency exchanges after cyber-attacks. In Hawaii international conference on system sciences 2021 (pp. 5636-46).

[58][58]Lazarenko A, Avdoshin S. Financial risks of the blockchain industry: a survey of cyberattacks. In proceedings of the future technologies conference 2019 (pp. 368-84). Springer International Publishing.

[59][59]Mccorry P, Möser M, Ali ST. Why preventing a cryptocurrency exchange heist isn’t good enough. In security protocols XXVI: 26th international workshop, Cambridge, UK, 2018 (pp. 225-33). Springer International Publishing.

[60][60]Rafi S, Yu W, Akbar MA, Mahmood S, Alsanad A, Gumaei A. Readiness model for DevOps implementation in software organizations. Journal of Software: Evolution and Process. 2021; 33(4):e2323.

[61][61]Keele S. Guidelines for performing systematic literature reviews in software engineering. EBSE Technical Report. 2007.

[62][62]Guo H, Yu X. A survey on blockchain technology and its security. Blockchain: Research and Applications. 2022; 3(2):100067.

[63][63]Shrivas MK, Dean TY, Brunda SS. The disruptive blockchain security threats and threat categorization. In first international conference on power, control and computing technologies 2020 (pp. 327-38). IEEE.

[64][64]Coppolino L, Dantonio S, Mazzeo G, Romano L, Campegiani P. Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing. In ITASEC 2021 (pp. 298-308).

[65][65]Yli-huumo J, Ko D, Choi S, Park S, Smolander K. Where is current research on blockchain technology?—a systematic review. PloS One. 2016; 11(10):1-27.

[66][66]Brengel M, Rossow C. Identifying key leakage of bitcoin users. In research in attacks, intrusions, and defenses: 21st international symposium, RAID 2018, Heraklion, Crete, Greece, 2018 (pp. 623-43). Springer International Publishing.

[67][67]Pal O, Alam B, Thakur V, Singh S. Key management for blockchain technology. ICT Express. 2021; 7(1):76-80.

[68][68]Kiktenko EO, Kudinov MA, Fedorov AK. Detecting brute-force attacks on cryptocurrency wallets. In international conference on business information systems 2019 (pp. 232-42). Cham: Springer International Publishing.

[69][69]Singh S, Hosen AS, Yoon B. Blockchain security attacks, challenges, and solutions for the future distributed IoT network. IEEE Access. 2021; 9:13938-59.

[70][70]Li X, Jiang P, Chen T, Luo X, Wen Q. A survey on the security of blockchain systems. Future Generation Computer Systems. 2020; 107:841-53.

[71][71]Lu Y. The blockchain: state-of-the-art and research challenges. Journal of Industrial Information Integration. 2019; 15:80-90.

[72][72]Casino F, Dasaklis TK, Patsakis C. A systematic literature review of blockchain-based applications: current status, classification and open issues. Telematics and Informatics. 2019; 36:55-81.

[73][73]Tavares B, Correia FF, Restivo A, Faria JP, Aguiar A. A survey of blockchain frameworks and applications. In international conference on soft computing and pattern recognition 2018 (pp. 308-17). Cham: Springer International Publishing.

[74][74]Antipova T, Emelyanova I. Cryptocurrency in digital wallet: pros and cons. In international conference on digital science 2018 (pp. 313-22). Cham: Springer International Publishing.

[75][75]Chaudhry N, Yousaf MM. Consensus algorithms in blockchain: comparative analysis, challenges and opportunities. In 12th international conference on open source systems and technologies 2018 (pp. 54-63). IEEE.

[76][76]Sayadi S, Rejeb SB, Choukair Z. Blockchain challenges and security schemes: a survey. In seventh international conference on communications and networking 2018 (pp. 1-7). IEEE.

[77][77]Moubarak J, Filiol E, Chamoun M. On blockchain security and relevant attacks. In middle East and North Africa communications conference 2018 (pp. 1-6). IEEE.

[78][78]Oosthoek K, Doerr C. From hodl to heist: analysis of cyber security threats to bitcoin exchanges. In international conference on blockchain and cryptocurrency 2020 (pp. 1-9). IEEE.

[79][79]Van ENJ, Waltman L. VOS viewer manual. Manual for VOS viewer version. 2011; 1:1-27.

[80][80]Wenhua Z, Qamar F, Abdali TA, Hassan R, Jafri ST, Nguyen QN. Blockchain technology: security issues, healthcare applications, challenges and future trends. Electronics. 2023; 12(3):1-28.

[81][81]Amiet N. Blockchain vulnerabilities in practice. Digital Threats: Research and Practice. 2021; 2(2):1-7.

[82][82]Sigurdsson G, Giaretta A, Dragoni N. Vulnerabilities and security breaches in cryptocurrencies. In proceedings of 6th international conference in software engineering for defence applications: SEDA 2018 (pp. 288-99). Springer International Publishing.

[83][83]Wang Z, Yu H, Zhang Z, Piao J, Liu J. ECDSA weak randomness in Bitcoin. Future Generation Computer Systems. 2020; 102:507-13.

[84][84]Talat R, Obaidat MS, Muzammal M, Sodhro AH, Luo Z, Pirbhulal S. A decentralised approach to privacy preserving trajectory mining. Future Generation Computer Systems. 2020; 102:382-92.

[85][85]Wang N, Chen Y, Yang Y, Fang Z, Sun Y. Blockchain private key storage algorithm based on image information hiding. In artificial intelligence and security: 5th international conference, 2019 (pp. 542-52). Springer International Publishing.

[86][86]Shah P, Manjunath P, Mishra S, Sudarsanan H. Exploratory analysis of block chain security vulnerabilities. Australian Journal of Wireless Technologies, Mobility and Security. 2019; 1-5.

[87][87]Aydar M, Cetin SC, Ayvaz S, Aygun B. Private key encryption and recovery in blockchain. arXiv preprint arXiv:1907.04156. 2019.

[88][88]Mahmoud QH, Lescisin M, Altaei M. Research challenges and opportunities in blockchain and cryptocurrencies. Internet Technology Letters. 2019; 2(2):e93.

[89][89]Bui T, Rao SP, Antikainen M, Aura T. Pitfalls of open architecture: how friends can exploit your cryptocurrency wallet. In proceedings of the 12th European workshop on systems security 2019 (pp. 1-6). ACM.

[90][90]Feng Q, He D, Zeadally S, Khan MK, Kumar N. A survey on privacy protection in blockchain system. Journal of Network and Computer Applications. 2019; 126:45-58.

[91][91]https://www.mcafee.com/enterprise/en-us/assets/reports/rp-blockchain-security-risks.pdf. Accessed 04 November 2023.

[92][92]Mosakheil JH. Security threats classification in blockchains. Culminating Projects in Information Assurance, St. Cloud State University. 2018.

[93][93]Yakubov A, Shbair W, Wallbom A, Sanda D. A blockchain-based PKI management framework. In the first international workshop on managing and managed by blockchain 2018 (pp. 1-6). IEEE

[94][94]Steichen M, Hommes S, State R. ChainGuard—a firewall for blockchain applications using SDN with open flow. In principles, systems and applications of IP telecommunications 2017 (pp. 1-8). IEEE.

[95][95]Vasek M, Bonneau J, Castellucci R, Keith C, Moore T. The bitcoin brain drain: examining the use and abuse of bitcoin brain wallets. In financial cryptography and data security: 20th international conference, 2017 (pp. 609-18). Springer Berlin Heidelberg.

[96][96]Decker C, Wattenhofer R. Bitcoin transaction malleability and MtGox. In computer security-ESORICS 2014: 19th European symposium on research in computer security, Wroclaw, Poland, 2014. Proceedings, Part II 2014 (pp. 313-26). Springer International Publishing.

[97][97]https://securityintelligence.com/blockchain-exploits-and-mining-attacks-on-the-rise-as-cryptocurrency-prices-skyrocket/. Accessed 04 November 2023.

[98][98]Alkurdi F, Elgendi I, Munasinghe KS, Sharma D, Jamalipour A. Blockchain in IoT security: a survey. In 28th international telecommunication networks and applications conference 2018 (pp. 1-4). IEEE.

[99][99]Bergman S, Asplund M, Nadjm‐tehrani S. Permissioned blockchains and distributed databases: a performance study. Concurrency and Computation: Practice and Experience. 2020; 32(12):e5227.

[100][100]Semmouni MC, Nitaj A, Belkasmi M. Bitcoin security with a twisted Edwards curve. Journal of Discrete Mathematical Sciences and Cryptography. 2022; 25(2):353-71.

[101][101]Bos JW, Halderman JA, Heninger N, Moore J, Naehrig M, Wustrow E. Elliptic curve cryptography in practice. In financial cryptography and data security: 18th international conference, 2014 (pp. 157-75). Springer Berlin Heidelberg.

[102][102]Poddebniak D, Somorovsky J, Schinzel S, Lochter M, Rösler P. Attacking deterministic signature schemes using fault attacks. In European symposium on security and privacy 2018 (pp. 338-52). IEEE.

[103][103]https://github.com/bitcoin/bips/blob/master/bip-0062.mediawiki. Accessed 04 November 2023.

[104][104]Pornin T. Deterministic usage of the digital signature algorithm (DSA) and elliptic curve digital signature algorithm (ECDSA). 2013.

[105][105]Mollajafari S, Bechkoum K. Blockchain technology and related security risks: towards a seven-layer perspective and taxonomy. Sustainability. 2023; 15(18):1-24.

[106][106]Ulla MM, Sakkari DS. Research on elliptic curve crypto system with bitcoin curves–SECP256k1, NIST256p, NIST521p and LLL. Journal of Cyber Security and Mobility. 2023:103-28.

[107][107]Bamert T, Decker C, Wattenhofer R, Welten S. Bluewallet: the secure bitcoin wallet. In security and trust management: 10th international workshop, 2014 (pp. 65-80). Springer International Publishing.

[108][108]Kaushik A, Choudhary A, Ektare C, Thomas D, Akram S. Blockchain—literature survey. In 2nd international conference on recent trends in electronics, information & communication technology 2017 (pp. 2145-8). IEEE.

[109][109]Maxwell G, Poelstra A, Seurin Y, Wuille P. Simple schnorr multi-signatures with applications to bitcoin. Designs, Codes and Cryptography. 2019; 87(9):2139-64.

[110][110]Weber K, Schütz AE, Fertig T, Müller NH. Exploiting the human factor: social engineering attacks on cryptocurrency users. In learning and collaboration technologies. human and technology ecosystems: 7th international conference, LCT 2020, Held as Part of the 22nd HCI international conference, HCII, Copenhagen, Denmark, Proceedings, Part II 2020 (pp. 650-68). Springer International Publishing.

[111][111]Chanti S, Chithralekha T. A literature review on classification of phishing attacks. International Journal of Advanced Technology and Engineering Exploration. 2022; 9(89):446-76.

[112][112]Astrakhantseva I, Astrakhantsev R, Los A. Cryptocurrency fraud schemes analysis. In SHS web of conferences 2021 (pp. 1-7). EDP Sciences.

[113][113]Elrom E, Elrom E. Security and compliance. The blockchain developer: a practical guide for designing, implementing, publishing, testing, and securing Distributed Blockchain-based Projects. 2019:419-66.

[114][114]Wijesekara PA, Gunawardena S. A review of blockchain technology in knowledge-defined networking, its application, benefits, and challenges. Network. 2023; 3(3):343-421.

[115][115]Aziz AB, Ngah SB, Dun YT, Bee TF. Coinhive’s monero drive-by crypto-jacking. In IOP conference series: materials science and engineering 2020 (pp. 1-9). IOP Publishing.

[116][116]Pallas R. Bitcoin security. [Unpublished Master Dissertation]. Tallin University of Technology. 2012.

[117][117]Eskandari S, Leoutsarakos A, Mursch T, Clark J. A first look at browser-based cryptojacking. In European symposium on security and privacy workshops (EuroS&PW) 2018 (pp. 58-66). IEEE.

[118][118]Kim S, Kim J. POSTER: mining with proof-of-probability in blockchain. In proceedings of the 2018 on Asia conference on computer and communications security 2018 (pp. 841-3). ACM.

[119][119]https://www.dropzone.dev/. Accessed 04 November 2023.

[120][120]https://www.cnet.com/tech/computing/devilrobber-trojan-steals-bitcoins-and-data/. Accessed 04 November 2023.

[121][121]Franco P. Understanding bitcoin: cryptography, engineering and economics. John Wiley & Sons; 2014.

[122][122]Cohen S, Rosenthal A, Zohar A. Reasoning about the future in blockchain databases. In 36th international conference on data engineering 2020 (pp. 1930-3). IEEE.

[123][123]Furneaux N. Investigating cryptocurrencies: understanding, extracting, and analyzing blockchain evidence. John Wiley & Sons; 2018.

[124][124]Nowroozi E, Seyedshoari S, Mekdad Y, Savaş E, Conti M. Cryptocurrency wallets: assessment and security. In blockchain for cybersecurity in cyber-physical systems 2022 (pp. 1-19). Cham: Springer International Publishing.

[125][125]Erinle Y, Kethepalli Y, Feng Y, Xu J. SoK: design, vulnerabilities and defense of cryptocurrency wallets. arXiv preprint arXiv:2307.12874. 2023.

[126][126]Mills DC, Wang K, Malone B, Ravi A, Marquardt J, Badev AI, et al. Distributed ledger technology in payments, clearing, and settlement. Finance and Economics Discussion Series 2016-095. Washington: Board of Governors of the Federal Reserve System.2016:1-36.

[127][127]Davenport A, Shetty S. Air gapped wallet schemes and private key leakage in permissioned blockchain platforms. In international conference on blockchain (Blockchain) 2019 (pp. 541-5). IEEE.

[128][128]Yin LH, Liu H. Searching activity trajectories with semantics. Journal of Computer Science and Technology. 2019; 34:775-94.

[129][129]Ndri A. The applications of blockchain to cybersecurity. Culminating Projects in Information Assurance, St. Cloud State University. 2013.