Post A Status 2
Post A Status 2
Post A Status 2
Article:
Zamani, E. orcid.org/0000-0003-3110-7495, He, Y. and Phillips, M. (2018) On the security
risks of the blockchain. Journal of Computer Information Systems, 60 (6). pp. 495-506.
ISSN 0887-4417
https://doi.org/10.1080/08874417.2018.1538709
Reuse
Items deposited in White Rose Research Online are protected by copyright, with all rights reserved unless
indicated otherwise. They may be downloaded and/or printed for private study, or other acts as permitted by
national copyright laws. The publisher or other rights holders may allow further reproduction and re-use of
the full text version. This is indicated by the licence information on the White Rose Research Online record
for the item.
Takedown
If you consider content in White Rose Research Online to be in breach of UK law, please notify us by
emailing eprints@whiterose.ac.uk including the URL of the record and the reason for the withdrawal request.
eprints@whiterose.ac.uk
https://eprints.whiterose.ac.uk/
ON THE SECURITY RISKS OF THE BLOCKCHAIN
ABSTRACT
The adoption of blockchain technology is taking place at a fast pace. Security features
inherent in blockchain make it resistant to attack, but they do not make it immune, and
blockchain security risks do exists. This paper details the associated risks and concerns of the
blockchain. We explore relevant standards and regulations related to blockchain and survey
and analyse 38 blockchain incidents to determine the root cause in order to provide a view of
the most frequent vulnerabilities exploited. The paper reviews six of these 38 incidents in
greater detail. The selection is made by choosing incidents with the most frequent root cause.
In the review of the incidents, the paper details what happened and why and aims to address
what could have been done to mitigate the attack. The paper concludes with a
recommendation on a framework to reduce cyber security risks when using blockchain
technologies.
Keywords: security; standards; blockchain; root cause analysis; security recommendations
INTRODUCTION
The Blockchain technology was devised by Satoshi Nakamoto, the designer of Bitcoin, set
out in a white paper in 20081. The technology created a ‘peer-to-peer’ online cash system,
whereby a third party, such as a financial institution, was no longer needed. The benefits of
using such a technology are transparency, authenticity and auditing as it takes away the need
for trust between two parties participating in a transaction2.
Since the inception of the Blockchain, several hacks and attacks have occurred, bringing into
question the security of the technology. The causes of these incidents range from smart
contract vulnerabilities3, application vulnerabilities4, cloud infrastructure/server breach5,
insider breaches to social engineering breaches6. Some of the causes are not publicly known.
A study performed by Luu et al.7 discovered that 8,833 out of the 19,366 existing Ethereum
contracts are vulnerable. Atzei et al.8 analysed the security vulnerabilities of Ethereum smart
contracts, and provided a taxonomy of common programming pitfalls that may lead to
vulnerabilities, Zimba et al.9 investigated crypto mining attacks by examining malware code
and suggested mitigations, while Li et al.10 analysed the vulnerabilities in Blockchain systems
and compiled a list of security risks to Blockchain systems.
Yet current research places an imbalanced focus on the technical aspects of Blockchain.
There is limited work in regulatory frameworks, Blockchain standards and best practices.
Presently, businesses and organisations operate under a lack of standards, where there is
currently only one in development11. This creates legal liability issues as Blockchain systems
often run on cloud platforms and integrate with 3rd party applications, notably in a public and
consortium driven type12, and to date it is unclear how legal liabilities are determined if
Blockchain incidents do occur. Therefore, there is a need to understand and identify the
applicability of the existing standards and regulations that are connected to Blockchain.
Ideally, organisations learn lessons from previous incidents. Public information sharing is
necessary at the earliest opportunity. This also allows new industries adopting the technology
to learn from other communities, as despite their reasons for using the Blockchain may be
different the vulnerabilities remain the same. Although some incidents are publicly known,
the information is not always complete or accurate. As a result, organisations cannot
effectively benefit from the mistakes of others, since there doesn’t seem to exist a procedure
to properly document and report incidents. However, experience can be borrowed from the
general cyber security area related to the incident response (IR). A complete IR lifecycle
encompasses incident identification, notification, analysis, containment, mitigation, incident
learning and dissemination, where lessons learned are cycled back to the incident
identification stage of the IR lifecycle13.
In this paper we identify current security and other standards that may be pertinent for the
blockchain technology. Through the examination of existing cases of security breaches based
on a root cause analysis approach, we analyse Blockchain security incidents with a focus on
standards, information governance and regulatory frameworks. This analysis informs a set of
recommendation on what a cyber security blockchain framework should include and have
implications for the creation of the Blockchain specific security standard.
AN OVERVIEW OF THE BLOCKCHAIN TECHNOLOGY
‘Blockchain’ or ‘Blockchain technology’ is seen as the backbone of the Bitcoin protocol, and
as an online, distributed and publicly available ledger that is updated by the nodes of a peer-
to-peer (P2P) network, based on consensus, without the mediation of a trusted third party,
where all transactions are secured by cryptographic means14. The blockchain is essentially a
very restricted data structure, which is open, public and append only.
It contains all transactions ever made within ‘blocks’, each of which contains groups of
transactions, linked together based on cryptography rules15. Regardless of whether the
transactions are purely financial or not, the underlying mode of operation is always the same
(Figure 1). First a transaction request is made and broadcasted across a network of peers. This
could be a contract, an update of a record, a financial transaction or anything that is
transactional information. The nodes check the validity of the transaction through a process
called mining, trying to solve a very difficult computationally-wise mathematical problem,
which is resource-intensive, and then broadcast the solution to the other miners for
confirmation. Once confirmed, the original miner is rewarded in bitcoins for their effort and
the transaction itself is then added into a confirmed block. This block is timestamped and
linked to the previous block, because the very solution to the mathematical problem is based
on the unique cryptographic signature (hash) of the previous block. This means that all blocks
are linked together in sequence, i.e., there is a clear and unique path from block 0 all the way
to block n16.
As blocks are identified, miners add them in their local copy of the blockchain and broadcast
them to the network. The rest of the miners, when they receive the information about this
newly identified block, they validate it (which is not resource-intensive like mining), and
assuming that the information is indeed validated, i.e., the solution to the mathematical
problem is correct, then they also update their local copy of the blockchain. As a result, all
miners across the network have access and maintain to the same copy at all times15.
Blockchain Typology based on access rights
Blockchains can be categorised in different ways. Okada et al. propose their classification
based on the existence or absence of a trusted authority with certain control over the chain,
and the existence or absence of incentives in the form of an operational market around the
blockchain system17. Equally, other classifications have to do with the permission rights and
the ownership of the chain, or the degree of decentralisation and the computing approach for
service delivery (peer to peer or cloud-based). One can identify three main types of
blockchains: public, private and consortium-driven. Public blockchains are permissionless
and anyone can send transactions as well as participate in the process of deciding whether a
given block gets added to the overall chain. In addition, third parties and intermediaries are
not needed, or needed to be trusted. Private and consortium blockchains are both types of
permissioned chains. In a private blockchain, one organisation owns the ‘write’ permissions.
‘Read’ permissions can be made available to the public or trusted others if necessary via the
authorisation of the owner organisation. As a result, private blockchains are permissioned and
need somebody trusted for the chain to operate18. This is ideal for database management or
auditing within a single company. In a consortium blockchain, the validation process is
controlled by several pre-selected nodes19. For example, the rules of the blockchain may be
that two banks and a regulator must sign each block for it to be added. Again, the right to
read the blockchain can be made public if required and consortium-based blockchain can be
thought of as partially decentralised20.
IEE std c37.240-201444 International cyber security Not designed specifically for
requirements for substation blockchain but can be applied.
automation, protection and control
systems.
Common Criteria for International standard that removes Not specific to blockchain, but
Information Technology redundant evaluation activities that do applicable when building blockchain
Security Evaluation (CC not contribute significantly to the final based applications or products.
v3.1)45 assurance of a product
Federal Information Comprehensive framework to protect Not directly related to blockchain, but
Security Management Act government operations, assets and applicable when looking at aspects of
2014 (FISMA)46 information from threats. This is information security.
United States federal law.
ISO/IEC 27001:201347 International information security Can be applied to blockchain
management standard that defines best technology since it can be thought of
practice for an information security as a security management system. The
management system. standard could be applied to any part
of a business.
ISO/IEC 27005:2011 Supports implementation of ISO/IEC As with ISO 27001 it can be applied to
2700548 27001. blockchain but is not tailor made.
General Data Protection Synchronise European data privacy GDPR says that people can demand
Regulation (GDPR)41 laws, as well as to protect and that their personal data is rectified or
empower all EU citizens data privacy. deleted under several circumstances.
Enforceable from 25th May 2018. This must be a key consideration for
blockchain technology where personal
data is used as it is essentially a
growing record with a traceable
history. Therefore, GDPR compliance
could be a barrier.
ISO/IEC 27017:201549 Information technology, security Directly related to cloud technology
techniques and code of practice for which blockchain platforms can be ran
information security controls based on on.
ISO/IEC 27002 for cloud services.
ISO/IEC 27018:201450 Information technology, security Specific to PII on Cloud services.
techniques and code of practice for Blockchain platforms can be run on
protection of personally identifiable cloud services.
information (PII) in public clouds
acting as PII processors.
Regulations that affect areas that can benefit by Blockchain technologies
Sarbanes-Oxley Act of Reform corporate financial reporting Blockchain has the potential to assist
2002 (SOX)51 and accounting. This is United States companies with compliance to SOX 52
federal law.
Health Insurance Security and privacy of specific health Blockchain has potential to assist with
Portability and data to ensure its protection. This is HIPAA compliance, improving patient
Accountability Act of United States federal law. care as well as operational efficiency
1996 (HIPAA)53 in the healthcare industry 54
Gramm-Leach-Bliley Act United States Act that requires Blockchain has potential to assist with
(1999)42 financial institutes to be clear with compliance to the act. If crypto
their information sharing practices and currency exchanges get classified as
details the responsibility of the financial institutions, then they would
organisation to safeguard sensitive also be obliged to adhere to the cyber
data. security policies and procedures within
the Act 55.
Payment Card Industry The standard developed consists of Applicable should financial
Data Security Standard twelve requirements created to institutions look to move cardholder
(PCI DSS) (2004)56 improve cardholder data security. data onto blockchain networks.
Directly related to the Blockchain
ISO/TC 307 (In Standardises distributed ledger and Directly related to blockchain, but it is
development)11 blockchain technologies. There are not yet completed. Will cover aspects
currently 8 ISO standards in the including Smart contracts, governance
development stage under ISO/TC 307. and interoperability.
Incidents Incident Type What are the root causes? What is required to prevent the
incident?
The DAO58,59 Application Software vulnerability in the Peer-review and testing of code
Vulnerability/ ‘split’ function, allowing before deployment
Smart Contract hackers to run split multi-times Smart contract audits by
Code Error to drain the DAO of its value; independent testing facilities
Poor design of the smart
contract
Bitfinex58 Server/Infrastruct Key parties of the multi- Systematic controls to prevent and
ure Breach signature key management detect analogous transactions;
system blindly signing off End to end security review using
transactions scenarios
Coindash60,61 Server/Infrastruct Coindash website hack resulting Web-based attack detection and
ure Breach in Ethereum address changed to prevention
the hackers’ wallet address Defence against malicious insiders
Suspicious malicious insiders
Parity61,62 Application Smart contract vulnerability in Smart contract code review and
Vulnerability/ the library code; audits;
Smart Contract Code containing self-destruct Formal procedures and tooling for
Code Error function; testing complex live smart
Restructured code (light contracts
version) not reviewed
Zerocoin63,64 Application A programming error (‘==’ Routine code reviews and internal
Vulnerability/ being used instead of ‘=’) and external audits;
Smart Contract allowing an attacker to duplicate Formal agreements and automated
Code Error serial numbers and generate procedure in emergent blockchain
multiple spends incident handling
Social Engineering
Insider Threat
Root Cause
Cloud Platform
Unknown
Server/Infrastructure Breach
0 2 4 6 8 10 12 14
Incident Frequency
RECOMMENDATIONS
Based on the increasing use of blockchain technologies and the incidents reviewed, we
propose a framework of best practices to reduce the chance of cyber security vulnerabilities.
This framework provides solutions for the interactions surrounding blockchain as opposed to
altering the technology itself. As explored in previous sections, blockchain technology itself
is not usually compromised; instead vulnerabilities arise due to its improper use. We further
provide security recommendations for both providers and consumers of the blockchain
technology.
Regulatory Compliance - Blockchain solutions are often implemented on cloud platforms,
and we have already seen hacks due to the cloud infrastructure (see Figure 2). Stakeholders
need to carefully investigate the risks of the cloud platform itself70, and ensure they choose an
appropriate platform to host permissioned blockchains, especially within a regulated industry.
Blockchain providers need to ensure their cloud infrastructures are at least compliant with
ISO 27001 and ISO 270017. Blockchain consumers dealing with personally identifiable
information (PII) should also ensure their providers are compliant with ISO 270018. This will
help ensure that the necessary security controls are in place. Blockchain providers should also
consider industrial specific compliance requirements. In the healthcare industry, platforms
should be built with compliance to country specific acts, such HIPAA. This allows adopters
to meet the needs of the industry more easily keeping patient data secure. In the finance
industry, there are also platforms on offer, such as IBM Blockchain framework71, to help with
compliance with FISMA, SOX and Gramm Bleach Bliley.
Blockchain Providers Selection - Blockchain consumers should carefully consider platforms
available when choosing a third-party provider. The question they should ask is: will this
provider help me to be compliant with the needs of my industry? Likewise, Blockchain
providers need to have the consumer in mind by ensuring that their blockchain frameworks
contain detailed guidance on how they can help consumers to satisfy their industrial needs.
Good practices are the IBM and Microsoft blockchain frameworks71,72 that specify their
country specific and industrial specific standards that they have addressed and also provide
considerations that the consumer must undertake to avoid security breaches. In essence, a
successful blockchain framework must inform an organisation to select a provider that meets
all their needs.
Routine Audits – Our review flagged the need for formal reviews of all smart code contracts.
Mistakes can compromise the entire system as seen with The DAO incident58. The
blockchain framework should contain detail of how an internal formal code review should be
carried out73, and who should carry out the review, what experience is required to undertake
the review and what seniority level is required for sign off. This may vary between industry
sectors. Details should be provided on how often external reviews should take place. It is
unrealistic for all smart code contracts to be externally audited, however all should go
through detailed internal reviews. The framework should also state that if a code has been
audited for a specific purpose, it should not be used for other purposes. Using the code in an
alternative way would constitute the need for another review for the new suggested purpose.
This would have helped mitigate the Parity Vulnerability review62
Automation of Blockchain Incident Response - We identified the need for a formal process to
be agreed upon by communities for incident response. In the case of the Zerocoin hack, if
there were an automated way to inform mining pools about the incident, activities could have
been suspended until fixed63. This example is specific to the cryptocurrency world; however,
automation of blockchain incident response should be considered in all other industries.
Furthermore, in the root cause analysis, it was noted that in many cases the root causes of
hacks were not discussed or recorded. This results in a lack of ability for the wider
blockchain community to learn from security breaches. Companies can therefore fall victim
to the same attacks that could otherwise have been prevented. Therefore, it is recommended
that mandatory public information sharing is necessary at the earliest opportunity. This will
also allow other organisations adopting the technology to learn from other communities, as
although their purpose in using the blockchain may be different, the vulnerabilities remain
the same.
Use of Hot Wallets and Cold Wallets - Hot wallets were identified earlier as a key risk, with
some incidents being the result of hackers gaining access to hot wallets. Although the
vulnerability may have been elsewhere, if cold storage had been used, the attack could have
been mitigated. This is not to say that cold storage is completely secure, but we have seen
many more hot wallet breaches in comparison to cold storage (see Figure 2). Therefore, it is
recommended that keys of value are stored using cold storage methods. It would be difficult
to eradicate the use of hot wallets as they aid the efficiency of transactions, however the data
stored in hot wallets should be strongly considered prior to use. It is suggested that major
exchanges should keep most funds in cold storage10.
End-to-end Product Life Cycle Reviews - Detailed end-to-end reviews should be part of the
business process to try and identify vulnerabilities through risk-based scenarios. This would
aid proactive identification of risk rather than waiting until they materialise. There is limited
research in blockchain risk management in the product life cycle review. Experience can be
borrowed from cyber security risk assessment (Rauter, et, al., 2016) that key blockchain risk
factors throughout the product life cycle should be identified, measured, prioritised and
mitigated (e.g. avoiding, minimising, transferring or containing) to an acceptable level that is
benchmarked or predefined.
Automated Checks - Where possible automated checks74 should be in place to ensure the
systems and processes are working as expected. For example, in the Zerocoin incident, if they
had noticed that total Zerocoin spend did not align with the total Zerocoin minted earlier, the
amount stolen would have been much less (Insom, 2017). In this respect, ‘Automated
Management Information Reports’ could be designed to check such totals and send an alert
when a mis-match is detected.
CONCLUSIONS AND FUTURE WORK
The Blockchain is designed to be secure and the technology has great potential benefits.
However, through the interactions with software systems, web-based systems, clouds and
other platforms, security risks can be introduced to Blockchain systems. It must be used
appropriately with the use of a security framework. Currently, businesses and organisations
operate under a lack of standards. Based on an extensive review of the existing standards and
regulations, we identified their applicability that is connected to Blockchain. The incidents
reviewed highlight key points that should be included in a blockchain specific framework,
including regulatory compliance, Blockchain provider selection, the need for thorough smart
contract code reviews and both internal and external audits, the automation of incident
response methods and checks, appropriate use of cold storage techniques where possible and
end-to-end product life cycle reviews and automated checks. Our intention is not to provide
an all-encompassing framework, but to highlight ways for identifying, exploring and
addressing risks related to Blockchain technology. This also contributes to the creation of the
Blockchain specific security standard regarding what security concerns need to be included
and addressed. One limitation of this work is that the derived root causes and recommended
security solutions have not been scientifically verified or executed in experiments. Future
work should improve on this by verifying the framework through experimentation. Future
work will be focusing on the elaboration of the above-mentioned seven aspects within the
framework and borrow experience from general information security area including
regulatory compliance, risk assessment, incident response, access control, auditing and
contingency planning.
REFERENCES
1. Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. Nakamoto Institute. 2008.
2. Psaila S. Blockchain: A game changer for audit processes? Deloitte Malta; 2018. Audit &
Assurance. https://www2.deloitte.com/mt/en/pages/audit/articles/mt-blockchain-a-game-changer-for-
audit.html
3. Nikolic I, Kolluri A, Sergey I, Saxena P, Hobor A. Finding The Greedy, Prodigal, and Suicidal
Contracts at Scale. arXiv:1802.06038 [cs]. 2018 Feb 16 [accessed 2018 Jul 11].
http://arxiv.org/abs/1802.06038
4. 360TS. 360 Discovered an Epic BlockChain Vulnerability in EOS and All Transaction Can Be
Manipulated. 360 Total Security Blog. 2018 May 29 [accessed 2018 Jul 11].
https://blog.360totalsecurity.com/en/360-discovered-epic-blockchain-vulnerability-transaction-can-
manipulated/
5. Tosh DK, Shetty S, Liang X, Kamhoua CA, Kwiat KA, Njilla L. Security Implications of
Blockchain Cloud with Analysis of Block Withholding Attack. In: 2017 17th IEEE/ACM
International Symposium on Cluster, Cloud and Grid Computing (CCGRID). Madrid, Spain: IEEE;
2017. p. 458–467. http://ieeexplore.ieee.org/document/7973732/. doi:10.1109/CCGRID.2017.111
6. Rizzo P. Hackers Steal Over $300k From One of Blockchain’s Biggest VCs. CoinDesk. 2016 Dec
6 [accessed 2018 Jul 11]. https://www.coindesk.com/hackers-stole-300k-blockchain-investor/
7. Luu L, Chu D-H, Olickel H, Saxena P, Hobor A. Making Smart Contracts Smarter. In: 2016 ACM
SIGSAC Conference on Computer and Communications Security. Vienna, Austria: ACM Press;
2016. p. 254–269. http://dl.acm.org/citation.cfm?doid=2976749.2978309.
doi:10.1145/2976749.2978309
8. Atzei N, Bartoletti M, Cimoli T. A Survey of Attacks on Ethereum Smart Contracts (SoK). In:
Maffei M, Ryan M, editors. Principles of Security and Trust. Vol. 10204. Berlin, Heidelberg: Springer
Berlin Heidelberg; 2017. p. 164–186. http://link.springer.com/10.1007/978-3-662-54455-6_8.
doi:10.1007/978-3-662-54455-6_8
9. Zimba A, Wang Z, Mulenga M, Odongo NH. Crypto Mining Attacks in Information Systems: An
Emerging Threat to Cyber Security. Journal of Computer Information Systems. 2018 May 31:1–12.
doi:10.1080/08874417.2018.1477076
10. Li X, Jiang P, Chen T, Luo X, Wen Q. A survey on the security of blockchain systems. Future
Generation Computer Systems. 2017 [accessed 2018 Jul 11];forthcoming.
http://linkinghub.elsevier.com/retrieve/pii/S0167739X17318332. doi:10.1016/j.future.2017.08.020
11. ISO. Blockchain and distributed ledger technologies. 2016. Report No.: ISO/TC 307.
https://www.iso.org/committee/6266604.html
13. Luttgens JT, Pepe M, Mandia K. Incident Response & Computer Forensics. 3rd ed. New York:
McGraw-Hill Education Group; 2014.
14. Zamani ED, Giaglis GM. With a little help from the miners: distributed ledger technology and
market disintermediation. Industrial Management & Data Systems. 2018;118(3):637–652.
doi:10.1108/IMDS-05-2017-0231
15. Conti M, E SK, Lal C, Ruj S. A Survey on Security and Privacy Issues of Bitcoin. IEEE
Communications Surveys & Tutorials. 2018;forthcoming:1–39. doi:10.1109/COMST.2018.2842460
16. Lu Q, Xu X. Adaptable Blockchain-Based Systems: A Case Study for Product Traceability. IEEE
Software. 2017;34(6):21–27. doi:10.1109/MS.2017.4121227
18. Swan M. Blockchain for Business: Next-Generation Enterprise Artificial Intelligence Systems.
Advances in Computers. 2018;111(1):121–162. doi:10.1016/bs.adcom.2018.03.013
20. Killmeyer J, White M, Chew B. Will blockchain transform the public sector? Blockchain basics
for government. UK: Deloitte University Press; 2017.
https://www2.deloitte.com/content/dam/insights/us/articles/4185_blockchain-public-sector/DUP_will-
blockchain-transform-public-sector.pdf
21. Peck ME. Why the Biggest Bitcoin Mines Are in China. IEEE Spectrum. 2017 Oct 4 [accessed
2018 Jun 11]. https://spectrum.ieee.org/computing/networks/why-the-biggest-bitcoin-mines-are-in-
china
22. Fairley P. Blockchain world - Feeding the blockchain beast if bitcoin ever does go mainstream,
the electricity needed to sustain it will be enormous. IEEE Spectrum. 2017;54(10):36–59.
doi:10.1109/MSPEC.2017.8048837
23. Efanov D, Roschin P. The All-Pervasiveness of the Blockchain Technology. Procedia Computer
Science. 2018;123:116–121. doi:10.1016/j.procs.2018.01.019
24. Naheem MA. Regulating virtual currencies - the challenges of applying fiat currency laws to
digital technology services Futter A, editor. Journal of Financial Crime. 2018;25(2):562–575.
doi:10.1108/JFC-08-2016-0055
25. Hsu S. China’s Shutdown Of Bitcoin Miners Isn’t Just About Electricity. Forbes. 2018 Jan 15
[accessed 2018 Jun 12]. https://www.forbes.com/sites/sarahsu/2018/01/15/chinas-shutdown-of-
bitcoin-miners-isnt-just-about-electricity/#6836c806369b
26. Xu JJ. Are blockchains immune to all malicious attacks? Financial Innovation. 2016;2(1):25–34.
doi:10.1186/s40854-016-0046-5
27. Mokoena T, Zuva T. Malware Analysis and Detection in Enterprise Systems. In: 2017 IEEE
International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE
International Conference on Ubiquitous Computing and Communications (ISPA/IUCC). Guangzhou,
China: IEEE; 2017. p. 1304–1310. https://ieeexplore.ieee.org/document/8367429/.
doi:10.1109/ISPA/IUCC.2017.00199
28. Zhang R, Preneel B. Publish or Perish: A Backward-Compatible Defense Against Selfish Mining
in Bitcoin. In: Handschuh H, editor. Topics in Cryptology – CT-RSA 2017. Vol. 10159. San
Francisco: Springer International Publishing; 2017. p. 277–292. http://link.springer.com/10.1007/978-
3-319-52153-4_16. doi:10.1007/978-3-319-52153-4_16
30. Biggs J. A 15-year-old hacked the secure Ledger crypto wallet. TechCrunch. 2018 [accessed 2018
Jun 18]. http://social.techcrunch.com/2018/03/21/a-15-year-old-hacked-the-secure-ledger-crypto-
wallet/
31. Tu KV, Meredith M. Rethinking Virtual Currency Regulation in the Bitcoin Age. Washington
Law Review. 2015;90:271–347.
32. Burge ME. Apple Pay, Bitcoin, and Consumers: The ABCs of Future Public Payments Law.
Hastings Law Journal. Texas A&M University School of Law Legal Studies. 2015;67:1493–1550.
33. van Deventer O, Berkers F, Vos M, Zandee A, Vreuls T, van Piggelen L, Blom A, Heeringa B,
Akdim S, van Helvoort P, et al. Techruption Consortium Blockchain – what it takes to run a
blockchain together. In: 1st ERCIM Blockchain Workshop 2018. Vol. 2, no 9. Amsterdam,
Netherlands; 2018. https://dl.eusset.eu/handle/20.500.12015/3162. doi:10.18420/blockchain2018_06
34. Berke A. How Safe Are Blockchains? It Depends. Harvard Business Review. 2017 Mar 7
[accessed 2018 Jun 18]. https://hbr.org/2017/03/how-safe-are-blockchains-it-depends
35. Guardian Analytics. The Risks of Private Blockchain: Too Many. Guardian Analytics. 2017
[accessed 2018 Jan 16]. https://guardiananalytics.com/risks-of-private-blockchain-too-many-chains/
36. Singh I, Lee S-W. Comparative Requirements Analysis for the Feasibility of Blockchain for
Secure Cloud. In: Kamalrudin M, Ahmad S, Ikram N, editors. Requirements Engineering for Internet
of Things. Vol. 809. Singapore: Springer Singapore; 2018. p. 57–72.
http://link.springer.com/10.1007/978-981-10-7796-8_5. doi:10.1007/978-981-10-7796-8_5
37. Lee J. Strategic risk analysis for information technology outsourcing in hospitals. Information &
Management. 2017;54(8):1049–1058. doi:10.1016/j.im.2017.02.010
38. von Solms R. Information security management: why standards are important. Information
Management & Computer Security. 1999;7(1):50–58. doi:10.1108/09685229910255223
40. UK Government. Computer Misuse Act 1990. 2018 [accessed 2018 Mar 11].
https://www.legislation.gov.uk/ukpga/1990/18/contents
41. European Commission. EUR-Lex - 52018DC0043 - EN - EUR-Lex. 2018 [accessed 2018 Jun 19].
https://eur-lex.europa.eu/legal-
content/EN/TXT/?qid=1517578296944&uri=CELEX%3A52018DC0043
42. US Congress. GRAMM–LEACH–BLILEY ACT. 1999. Report No.: Public Law 106-102.
43. IT GOVERNANCE. PAS 555 2013 Cyber Security Risk Governance and Management
Specification. 2013 [accessed 2018 Jan 11]. https://www.itgovernance.co.uk/shop/product/pas-555-
2013-cyber-security-risk-governance-and-management-specification
44. IEEE. IEEE Std C37.240-2014 – IEEE Standard Cybersecurity Requirements for Substation
Automation, Protection, and Control Systems. 2014 [accessed 2018 Jan 14].
https://standards.ieee.org/findstds/standard/C37.240-2014.html
45. COMMON CRITERIA. Common Criteria for Information Technology Security Evaluation. 2012
[accessed 2018 Feb 6]. http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf
46. Congress.Gov. S.2521 - Federal Information Security Modernization Act of 2014. Congress.Gov.
2014 Jun 24 [accessed 2018 Jan 19]. https://www.congress.gov/bill/113th-congress/senate-bill/2521
47. IT GOVERNANCE. ISO 27001, the international information security standard. 2017 [accessed
2017 Dec 10]. https://www.itgovernance.co.uk/iso27001
48. ISO. ISO/IEC 27005:2011 - Information technology -- Security techniques -- Information security
risk management. 2011 [accessed 2018 Jun 19]. https://www.iso.org/standard/56742.html
49. ISO. ISO/IEC 27017:2015 - Information technology -- Security techniques -- Code of practice for
information security controls based on ISO/IEC 27002 for cloud services. 2015 [accessed 2018 Jun
19]. https://www.iso.org/standard/43757.html
50. ISO. ISO/IEC 27018:2014 - Information technology -- Security techniques -- Code of practice for
protection of personally identifiable information (PII) in public clouds acting as PII processors. 2014
[accessed 2018 Jun 19]. https://www.iso.org/standard/61498.html
51. SOXLAW. The Sarbanes-Oxley Act 2002. Addison-Hewitt Associates. 2006 [accessed 2018 Jun
19]. http://www.soxlaw.com/
52. King M. Reinventing reconciliation with Blockchain technology. 2016 [accessed 2018 Jun 19].
https://www.greshamtech.com/blog/reinventing-reconciliation-with-blockchain-technology
53. Office for Civil Rights (OCR). Summary of the HIPAA Privacy Rule. HHS.gov. 2008 May 7
[accessed 2018 Jun 19]. https://www.hhs.gov/hipaa/for-professionals/privacy/laws-
regulations/index.html
54. Zhang P, Schmidt DC, White J, Lenz G. Blockchain Technology Use Cases in Healthcare.
Advances in Computers. 2018;111(forthcoming):1–41. doi:10.1016/bs.adcom.2018.03.006
55. Accenture. Editing the Uneditable Blockchain. Why distributed ledger technology must adapt to
an imperfect world. London, UK; 2016. https://www.accenture.com/t20160927T033514Z__w__/ae-
en/_acnmedia/PDF-33/Accenture-Editing-Uneditable-Blockchain.pdf
56. Kalkan K, Kwansa F, Cobanoglu C. Payment Card Industry Data Security Standards (PCI DSS)
Compliance in Restaurants. Journal of Hospitality Financial Management. 2010;6(2):1–24.
58. Nagaraj K, Maguire E. Securing the Chain. KPMG International; 2017. kpmg.com/blockchain360.
https://assets.kpmg.com/content/dam/kpmg/xx/pdf/2017/05/securing-the-chain.pdf
59. DuPont Q. Experiments in algorithmic governance : A history and ethnography of “The DAO,” a
failed decentralized autonomous organization. Bitcoin and Beyond (Open Access). 2017 Nov 28
[accessed 2018 Oct 12]. https://www.taylorfrancis.com/. doi:10.4324/9781315211909-8
60. Jabotinsky HY. The Regulation of Cryptocurrencies - Between a Currency and a Financial
Product. SSRN Electronic Journal. 2018 Feb 7 [accessed 2018 Jul 11].
https://papers.ssrn.com/abstract=3119591
61. Leyden J. CoinDash crowdfunding hack further dents trust in crypto-trading world. The Register.
2017 Jul 18 [accessed 2018 Jul 11]. https://www.theregister.co.uk/2017/07/18/coindash_hack/
62. Parity Technologies. A Postmortem on the Parity Multi-Sig Library Self-Destruct. ParityTech.
2017 Nov 15 [accessed 2018 Jul 13]. https://paritytech.io/a-postmortem-on-the-parity-multi-sig-
library-self-destruct/
63. Insom P. Zcoin’s Zerocoin bug explained in detail. Zcoin, New York City. 2017 [accessed 2018
Jul 13]. https://zcoin.io/zcoins-zerocoin-bug-explained-in-detail/
64. Miers I, Garman C, Green M, Rubin AD. Zerocoin: Anonymous Distributed E-Cash from Bitcoin.
In: 2013 IEEE Symposium on Security and Privacy. Berkeley, CA, USA: IEEE; 2013. p. 397–411.
http://ieeexplore.ieee.org/document/6547123/
65. McMillan R. $1.2M Hack Shows Why You Should Never Store Bitcoins on the Internet. Wired,
California, USA. 2013 Nov 7 [accessed 2018 Jul 16]. https://www.wired.com/2013/11/inputs/
66. Inayat Z, Gani A, Anuar NB, Anwar S, Khan MK. Cloud-Based Intrusion Detection and Response
System: Open Research Issues, and Solutions. Arabian Journal for Science and Engineering.
2017;42(2):399–423. doi:10.1007/s13369-016-2400-3
67. Tasca P, Tessone CJ. Taxonomy of Blockchain Technologies. Principles of Identification and
Classification. London, UK: University College London; 2017. http://arxiv.org/abs/1708.04872
68. Amsler DB, Allen N, Messer S, Healy T. Automated internet threat detection and mitigation
system and associated methods. 2016 Feb 9 [accessed 2018 Jul 11].
https://patents.google.com/patent/US9258321B2/en
69. Omar M. Insider Threats: Detecting and Controlling Malicious Insiders. In: New Threats and
Countermeasures in Digital Crime and Cyber Terrorism. USA: IGI Global; 2015. p. 162–172.
https://www.igi-global.com/chapter/insider-threats/131402
70. Choi J, Nazareth DL, Ngo-Ye TL. The Effect of Innovation Characteristics on Cloud Computing
Diffusion. Journal of Computer Information Systems. 2018;58(4):325–333.
doi:10.1080/08874417.2016.1261377
71. Gautham. IBM Announces Security Focused Blockchain Framework. NewsBTC. 2016 [accessed
2018 Jul 16]. https://www.newsbtc.com/2016/05/03/ibm-announces-security-focused-blockchain-
framework/
72. Microsoft. Microsoft helps launch world’s first blockchain-based investment product. Microsoft
News Centre UK. 2018 [accessed 2018 Jul 16]. https://news.microsoft.com/en-
gb/2018/03/21/microsoft-azure-helps-nivaura-launch-worlds-first-blockchain-based-investment-
product/
73. Bharadwaj K. Blockchain 2.0: Smart Contracts. linkÐapps. 2016 [accessed 2018 Jul 16].
http://www.linkdapps.com/Blockchain2.0-SmartContracts.pdf
75. Osborne C. Bitcoin exchange Cryptoine hacked | ZDNet. ZDNet. 2015 Mar 26 [accessed 2018
Oct 12]. https://www.zdnet.com/article/bitcoin-exchange-cryptoine-hacked/
76. DeMartino I. CryptoThrift Suffers Security Breach, 15 BTC Stolen, Escrow Service Suspended.
Cointelegraph. 2014 Oct 7 [accessed 2018 Oct 12]. https://cointelegraph.com/news/cryptothrift-
suffers-security-breach-15-btc-stolen-escrow-service-suspended
77. Rizzo P. Poloniex Loses 12.3% of its Bitcoins in Latest Bitcoin Exchange Hack. Coindesk. 2014
Jun 3 [accessed 2018 Oct 12]. https://www.coindesk.com/poloniex-loses-12-3-bitcoins-latest-bitcoin-
exchange-hack/
78. Hern A. Bitcoin bank Flexcoin closes after hack attack. the Guardian. 2014 Apr 3 [accessed 2018
Oct 12]. https://www.theguardian.com/technology/2014/mar/04/bitcoin-bank-flexcoin-closes-after-
hack-attack
79. Redman J. The Bitcoin Exchange Thefts You May Have Forgotten. Bitcoin News. 2017 [accessed
2018 Oct 12]. https://news.bitcoin.com/bitcoin-exchange-thefts-forgotten/
80. Altcoin News. [Another] Crypto Wallet Hack Sees Theft of $400,000 in Stellar Lumens. CCN.
2018 Jan 15 [accessed 2018 Oct 12]. https://www.ccn.com/yet-another-crypto-wallet-hack-causes-
users-lose-400000/
81. Bradley. Bitcoin mining service “Cloudminr.io” Hacked. Hacker’s List. 2017 [accessed 2018 Oct
12]. https://www.hackers-list.com/bitcoin-mining-service-cloudminr-io-hacked-users-database-sale/
82. Higgins S. Gatecoin Claims $2 Million in Bitcoins and Ethers Lost in Security Breach. CoinDesk.
2016 May 16 [accessed 2018 Oct 12]. https://www.coindesk.com/gatecoin-2-million-bitcoin-ether-
security-breach/
83. ShepeShift. A Timeline: ShapeShift Hacking Incident. ShapeShift. 2016 [accessed 2018 Oct 12].
https://info.shapeshift.io/blog/2016/04/19/blog-2016-04-19-timeline-shapeshift-hacking-incident/
84. Buntinx JP. Coinsecure Confirms Victims of Recent Hack Will be Refunded Soon. NewsBTC.
2018 [accessed 2018 Oct 12]. https://www.newsbtc.com/2018/04/17/coinsecure-confirms-victims-
recent-hack-will-refunded/
85. Higgins S. Cryptsy CEO Stole Millions From Exchange, Court Receiver Alleges. CoinDesk. 2016
Aug 11 [accessed 2018 Oct 12]. https://www.coindesk.com/cryptsy-ceo-millions-digital-currency-
steal/
86. Pick L. Justcoin shutting down today, cites bank account closure, comes weeks after $300k
“goxing.” Finance Magnates | Financial and business news. 2014 Oct 29 [accessed 2018 Oct 12].
https://www.financemagnates.com/cryptocurrency/exchange/justcoin-shutting-down-today-cites-
bank-account-closure-weeks-after-300k-goxing/
87. Bradbury D. Silk Road 2 Loses Over $2.6 Million in Bitcoins in Alleged Hack. CoinDesk. 2014
Feb 13 [accessed 2018 Oct 12]. https://www.coindesk.com/silk-road-2-loses-bitcoins-hack/
88. Higgins S. Bitcoin Exchange Youbit to Declare Bankruptcy After Hack. CoinDesk. 2017 Dec 19
[accessed 2018 Oct 12]. https://www.coindesk.com/south-korean-bitcoin-exchange-declare-
bankruptcy-hack/
89. Russell J. Tether, a startup that works with bitcoin exchanges, claims a hacker stole $31M |
TechCrunch. TechCrunch. 2017 Nov 20 [accessed 2018 Oct 12].
https://techcrunch.com/2017/11/20/tether-claims-a-hacker-stole-31m/
90. Allison D. Atlanta’s Bitpay got hacked for $1.8 million in bitcoin. Atlanta Business Chronicle.
2015 Sep 16 [accessed 2018 Oct 12].
https://www.bizjournals.com/atlanta/blog/atlantech/2015/09/atlantas-bitpay-got-hacked-for-1-8-
million-in.html
91. Muscat I. Lessons to Learn from the AllCrypt Hack. Acunetix. 2015 [accessed 2018 Oct 12].
https://www.acunetix.com/blog/articles/lessons-to-learn-from-the-allcrypt-hack/
92. Sharwood S. Supposedly secure Dogecoin service Dogevault goes offline. 2014 May 13 [accessed
2018 Oct 12].
https://www.theregister.co.uk/2014/05/13/supposedly_secure_dogecoin_service_dogevault_goes_offl
ine/
93. Securus Global. Bitcoin wallet service suspended following security incident | Securus Global
Blog. 2013 [accessed 2018 Oct 12]. https://www.securusglobal.com/community/2013/04/04/bitcoin-
wallet-service-suspended-following-security-incident/
94. Dotson K. Bitcoin7 Hacked, Funds Recovery Requires Sensitive Personal Information -
SiliconANGLE. 2011 Jul 10 [accessed 2018 Oct 12]. https://siliconangle.com/2011/10/07/bitcoin7-
hacked-funds-recovery-requires-sensitive-personal-information/
95. BBC. Biggest ever digital currency “theft.” 2018 Jan 27 [accessed 2018 Oct 12].
https://www.bbc.com/news/world-asia-42845505
96. Novak M. NiceHash says attacked probably from non-EU IP address. Reuters. 2017 Dec 8
[accessed 2018 Oct 12]. https://uk.reuters.com/article/us-cyber-nicehash/nicehash-says-attacked-
probably-from-non-eu-ip-address-idUKKBN1E21Q7
97. Fincham N. Slush’s bitcoin mining pool hacked. MineForeman.com. 2013 Apr 24 [accessed 2018
Oct 12]. https://mineforeman.com/2013/04/24/slushs-bitcoin-mining-pool-hacked/
98. Higgins S. Details of $5 Million Bitstamp Hack Revealed. CoinDesk. 2015 Jul 1 [accessed 2018
Oct 12]. https://www.coindesk.com/unconfirmed-report-5-million-bitstamp-bitcoin-exchange/
99. McMillan R. Hackers Pull Off $12,000 Bitcoin Heist. Wired, California, USA. 2013 Mar 7
[accessed 2018 Oct 12]. https://www.wired.com/2013/03/digital-thieves-pull-off-12000-bitcoin-heist/
100. Shares D. Names, phone numbers, and emails leaked in BitQuick exchange hack. Bitcoin News.
2016 [accessed 2018 Oct 12]. https://news.bitcoin.com/names-phone-numbers-emails-leaked-
bitquick-exchange-hack/
101. Traderman. Coinkite Says “we may have leaked a copy of our database.” NullTX, San Francisco,
CA, USA. 2016 [accessed 2018 Oct 12]. https://nulltx.com/coinkite-says-we-may-have-leaked-a-
copy-of-our-database/
102. Higgins S. Bitcoin Exchange Cointrader Shuts Down After Alleged Hack. CoinDesk. 2016 Mar
30 [accessed 2018 Oct 12]. https://www.coindesk.com/bitcoin-exchange-cointrader-shuts-down/
103. Khandelwal S. Danish Bitcoin exchange BIPS hacked and 1,295 Bitcoins worth $1 Million
Stolen. The Hacker News. 2013 Nov 25 [accessed 2018 Oct 12].
https://thehackernews.com/2013/11/danish-bitcoin-exchange-bips-hacked-and_25.html
104. Riley D. Mintpal scammer Ryan Kennedy arrested in U.K. over theft of 3,700 Bitcoins.
SiliconANGLE. 2015 [accessed 2018 Oct 12]. https://siliconangle.com/2015/02/23/mintpal-scammer-
ryan-kennedy-arrested-in-u-k-over-theft-of-3700-bitcoins/
105. Adamowski J. Polish Bitcoin Exchange Bidextreme.pl Hacked, Bitcoin Wallets Emptied. 2013
Nov 20 [accessed 2018 Oct 12]. https://www.coindesk.com/hacker-attack-polands-bitcoin-exchange/
106. Dotson K. Third Largest Bitcoin Exchange Bitomat Lost Their Wallet, Over 17,000 Bitcoins
Missing. 2011 Jan 8 [accessed 2018 Oct 12]. https://siliconangle.com/2011/08/01/third-largest-
bitcoin-exchange-bitomat-lost-their-wallet-over-17000-bitcoins-missing/