Attacking the trust machine

Developing an information systems research agenda for blockchain cybersecurity

Journal Article (2023)
Author(s)

Vincent Schlatt (Fraunhofer Institute for Applied Information Technology FIT, University of Bayreuth)

Tobias Guggenberger (University of Bayreuth, Fraunhofer Institute for Applied Information Technology FIT)

J. Schmid (TU Delft - Transport and Logistics)

Nils Urbach (Frankfurt University of Applied Sciences, Fraunhofer Institute for Applied Information Technology FIT)

Research Group
Transport and Logistics
Copyright
© 2023 Vincent Schlatt, Tobias Guggenberger, J. Schmid, Nils Urbach
DOI related publication
https://doi.org/10.1016/j.ijinfomgt.2022.102470
More Info
expand_more
Publication Year
2023
Language
English
Copyright
© 2023 Vincent Schlatt, Tobias Guggenberger, J. Schmid, Nils Urbach
Research Group
Transport and Logistics
Volume number
68
Pages (from-to)
12
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Blockchain-based systems become increasingly attractive targets for cybercrime due to the rising amount of value transacted in respective systems. However, a comprehensive overview of existing attack vectors and a directive discussion of resulting research opportunities are missing. Employing a structured literature review, we extract and analyze 87 relevant attacks on blockchain-based systems and assign them to common attack vectors. We subsequently derive a research framework and agenda for information systems research on the cybersecurity of blockchain-based systems. We structure our framework along the users, developers, and attackers of both blockchain applications and blockchain infrastructure, highlighting the reciprocal relationships between these entities. Our results show that especially socio-technical aspects of blockchain cybersecurity are underrepresented in research and require further attention.

Files

1-s2.0-S0268401222000019-main.... (pdf)
(pdf | 1.14 Mb)
- Embargo expired in 29-08-2024
License info not available