SESSION ID: ACB-RO2 Blockchain and distributed ledger technologies Security risks, threats and vulnerabilities Kurt Callewaert Researchmanager Applied Computer Sciences HOWEST UNIVERSITY @KurtCallewaert Kurt.Callewaert@howest.be #RSAC Blockchain and distributed ledger technologies Are there still security risks, threats and vulnerabilities ? 2 #RSAC Building blocks in Blockchain & DLT technology 3 Blockchain & Tracebility in the foodsector Presenter’s Company Logo – replace or delete on master slide #RSAC 4 Blockchain functional view architecture Presenter’s Company Logo – replace or delete on master slide #RSAC 5 Blockchain Model Presenter’s Company Logo – replace or delete on master slide #RSAC 6 Example block Presenter’s Company Logo – replace or delete on master slide #RSAC 7 Hashing Presenter’s Company Logo – replace or delete on master slide #RSAC 8 Blockchain implementations Presenter’s Company Logo – replace or delete on master slide #RSAC 9 Consensus model Presenter’s Company Logo – replace or delete on master slide #RSAC 10 Smartcontract or chaincode Presenter’s Company Logo – replace or delete on master slide #RSAC 11 Forking Presenter’s Company Logo – replace or delete on master slide #RSAC 12 #RSAC CIA … what are the results of the research project ? 13 Confidentiality Network access : firewall , VPN , VLAN , IDS , … According to the National Institute of Standards and Technology (NIST), confidentiality refers to “the property that sensitive information is not disclosed to unauthorized individuals, entities, or processes” Access control on application level Information Security Management System Cryptography : key generation PKI : Public Key Infrastructure Full encryption of the data blocks Authentication & authorization controls Key management key storage , key loss , key theft Wallet management  Key theft , unauthorised access to data Quantum resistant cryptography  SHA-256 replaced by SHA-384 Integrity Integrity is defined as the “guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity”according to NIST Data encryption - hash comparison – digital signing Immutability -> sequential hashing and cryptography + distributed Consensus models Tracebility – non repudiation -> time stamped and digital signed Smart contracts  S-SDLC Data quality  Trusted oracles : data feed third party service in smart contracts GDPR  Right to be forgotten Consensus Hijack  Fraudulent transactions - Sybil attaque Availability NIST defines availability as “ensuring timely and reliable access to and use of information” No single point of failure  IP based DDos no effect Operational Resilience  Distributed nodes , peer to peer, 24/7 Global internet outage Scalability  unexpected growth of the DLT database Denial of Service  large volumes of small transactions #RSAC ISO/TC 307 Blockchain and distributed ledger technologies 17 Existing Threats #RSAC The first happens at the level of the transaction itself. In this category, the source of the threat is the behavior of a user, because of the user’s incompetence or dishonesty. One example of this category is a double-spending attack. The second happens at the level of transaction validation. In this category, the threat comes from the collective behavior of dishonest miners. One example in this category is the 51% attack problem. Presenter’s Company Logo – replace or delete on master slide 18 Existing vulnerabilities #RSAC User layer vulnerabilities • User apps vulnerabilities • Admin apps vulnerabilities Presenter’s Company Logo – replace or delete on master slide 19 Existing vulnerabilities #RSAC API layer vulnerabilities • • • External interfaces vulnerabilities User API vulnerabilities Admin API vulnerabilities Presenter’s Company Logo – replace or delete on master slide 20

pdf文档 2020_USA20_ACB-R02_01_blockchain-and-dlt-security-risks-threats-and-vulnerabilities

安全研究库 > 国外研究报告 > 应用加密和区块链 > 文档预览
38 页 0 下载 23 浏览 0 评论 0 收藏 3.0分
温馨提示:如果当前文档出现乱码或未能正常浏览,请先下载原文档进行浏览。
2020_USA20_ACB-R02_01_blockchain-and-dlt-security-risks-threats-and-vulnerabilities 第 1 页 2020_USA20_ACB-R02_01_blockchain-and-dlt-security-risks-threats-and-vulnerabilities 第 2 页 2020_USA20_ACB-R02_01_blockchain-and-dlt-security-risks-threats-and-vulnerabilities 第 3 页 2020_USA20_ACB-R02_01_blockchain-and-dlt-security-risks-threats-and-vulnerabilities 第 4 页 2020_USA20_ACB-R02_01_blockchain-and-dlt-security-risks-threats-and-vulnerabilities 第 5 页
下载文档到电脑,方便使用
还有 33 页可预览,继续阅读
本文档由 张玉竹2022-04-08 10:15:05上传分享
给文档打分
您好可以输入 255 个字符
安信天行文库的中文名是什么?( 答案:安信天行 )
评论列表
  • 暂时还没有评论,期待您的金玉良言