首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Attacking the trust machine: Developing an information systems research agenda for blockchain cybersecurity
Institution:1. Project Group Business & Information Systems Engineering of the Fraunhofer FIT, Bayreuth, Germany;2. FIM Research Center, Germany;3. University of Bayreuth, Bayreuth, Germany;4. Delft University of Technology, Delft, The Netherlands;5. Frankfurt University of Applied Sciences, Frankfurt am Main, Germany;1. School of Management, University of Science and Technology of China, #96 JinZhai Road, Baohe District, Hefei, Anhui 230026, PR China;2. School of Management, International Institute of Finance, University of Science and Technology of China, #96 JinZhai Road, Baohe District, Hefei, Anhui 230026, PR China;3. School of Economics, Hefei University of Technology, #485 Danxia Road, Hefei, Anhui 230601, PR China;1. Research Center for Enterprise Management, Chongqing Technology and Business University, Chongqing, China;2. School of Business Administration, Chongqing Technology and Business University, Chongqing, China;3. Department of Mechanical Engineering, School of Engineering, Cardiff University, Cardiff CF24 3AA, UK;1. Management Information Systems, Department of Decision and Information Sciences, School of Business Administration, Oakland University, Rochester, MI 48309, USA;2. NOVA Information Management School (NOVA IMS) Universidade Nova de Lisboa, Campus de Campolide, 1070-312 Lisboa, Portugal;3. Business Information Systems, University of Sydney Business School, Darlington, NSW 2006, Australia;1. Department of Computer Science, New Jersey Institute of Technology, USA;2. Department of Computer Science, University of Texas at San Antonio, USA;3. School of Computer Science, University of Sydney, Australia;4. Department of Electrical and Computer Engineering, University of Texas at San Antonio, USA;5. U.S. Air Force Research Laboratory, USA;6. U.S. Air Force 90 COS/CYD, USA;7. Department of Computer Science, University of Colorado Colorado Springs, USA
Abstract:Blockchain-based systems become increasingly attractive targets for cybercrime due to the rising amount of value transacted in respective systems. However, a comprehensive overview of existing attack vectors and a directive discussion of resulting research opportunities are missing. Employing a structured literature review, we extract and analyze 87 relevant attacks on blockchain-based systems and assign them to common attack vectors. We subsequently derive a research framework and agenda for information systems research on the cybersecurity of blockchain-based systems. We structure our framework along the users, developers, and attackers of both blockchain applications and blockchain infrastructure, highlighting the reciprocal relationships between these entities. Our results show that especially socio-technical aspects of blockchain cybersecurity are underrepresented in research and require further attention.
Keywords:Blockchain  IT Security  Structured literature review  Research agenda
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号