dc.contributor.advisor | Stuart Madnick. | en_US |
dc.contributor.author | Lee, Jae Hyung,S. M.Massachusetts Institute of Technology. | en_US |
dc.contributor.other | Massachusetts Institute of Technology. Engineering and Management Program. | en_US |
dc.contributor.other | System Design and Management Program. | en_US |
dc.date.accessioned | 2019-07-18T20:29:48Z | |
dc.date.available | 2019-07-18T20:29:48Z | |
dc.date.copyright | 2019 | en_US |
dc.date.issued | 2019 | en_US |
dc.identifier.uri | https://hdl.handle.net/1721.1/121793 | |
dc.description | Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2019 | en_US |
dc.description | Cataloged from PDF version of thesis. Page 150 blank. | en_US |
dc.description | Includes bibliographical references (pages 119-149). | en_US |
dc.description.abstract | Recent hacks into blockchain systems and heists from such systems have raised serious questions about whether this new technology can be secured from ongoing, evolving cyberattacks. While the technology is known to provide an environment that is fundamentally safer than other existing centralized systems offer, security professionals warn that the current blockchain ecosystem is still immature, harboring many known as well as unknown defects [1]. This thesis draws upon a number of research studies and various other inquiries into blockchain systems security. In addition, this paper gathers and summarizes information regarding 78 recent blockchain cyberattacks and heists, analyzing and categorizing them as to their cause: platform breach, dApps exploit, access point attack, or endpoint hacking. Two of these attacks (the Ethereum blockchain system and the Bitfinex cryptocurrency exchange) are analyzed in detail using Causal Analysis using System Theory (CAST) method. A novel top-down security assessment method inspired by System Theoretic Process Analysis for Security (STPA-Sec) is used to evaluate a sample blockchain system, such as might be proposed for voting. An analysis of possible vulnerabilities is conducted, and suggestions for remediation and protection. | en_US |
dc.description.statementofresponsibility | by Jae Hyung Lee. | en_US |
dc.format.extent | 150 pages | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Massachusetts Institute of Technology | en_US |
dc.rights | MIT theses are protected by copyright. They may be viewed, downloaded, or printed from this source but further reproduction or distribution in any format is prohibited without written permission. | en_US |
dc.rights.uri | http://dspace.mit.edu/handle/1721.1/7582 | en_US |
dc.subject | Engineering and Management Program. | en_US |
dc.subject | System Design and Management Program. | en_US |
dc.title | Systematic approach to analyzing security and vulnerabilities of blockchain systems | en_US |
dc.type | Thesis | en_US |
dc.description.degree | S.M. in Engineering and Management | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Engineering and Management Program | en_US |
dc.identifier.oclc | 1103445166 | en_US |
dc.description.collection | S.M.inEngineeringandManagement Massachusetts Institute of Technology, System Design and Management Program | en_US |
dspace.imported | 2019-07-18T20:29:45Z | en_US |
mit.thesis.degree | Master | en_US |
mit.thesis.department | SysDes | en_US |