Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild.
Jusop ChoiWonseok ChoiWilliam AikenHyoungshick KimJun Ho HuhTaesoo KimYongdae KimRoss J. AndersonPublished in: CoRR (2022)
Keyphrases
- security measures
- software systems
- countermeasures
- cyber attacks
- key exchange protocol
- information security
- security vulnerabilities
- denial of service attacks
- source code
- fault injection
- intrusion detection
- authentication protocol
- java card
- security management
- malicious attacks
- dos attacks
- authentication mechanism
- attack scenarios
- security requirements
- security policies
- trusted third party
- access control
- encryption algorithm
- statistical databases
- security issues
- network security
- computer security
- malicious users
- information leakage
- secret key
- defense mechanisms
- smart card
- functional requirements
- security threats
- security mechanisms
- key management
- security risks
- user authentication
- key agreement
- security properties