ACSA  Admin

Starting in Q4 2021, we decided to focus on the use of blockchain technology, cryptography and cryptocurrencies in information security.

What is blockchain?

Blockchain is a distributed database made up of string blocks and designed to avoid subsequent modifications. Once the data has been published in it, using a reliable timing technique and a complex reference to a previous block, it is no longer considered possible to roll back and make any changes to the record. Blockchain has become an invaluable tool, ideal for security, but it is also used for tasks such as data storage and validation, a method now used for data mining (data mining). Blockchain is the result of many years of advances in cryptography and information security. Our future research will focus on the security of cryptocurrencies (Bitcoin, Ethereum, Lightcoin, BNB and others) and their application in people's daily lives.

How can cryptocurrencies and cryptography help information security?

Decentralization

.

Decentralizing blockchain greatly reduces the likelihood of database tampering. The way hackers usually get their hands on information is by attacking the place where all the data is clustered - the mainframe. In blockchain, this is virtually impossible.

Transparency and immutability

A public network has the advantage that all of its data is in the public eye. Any change made to it is inevitably revealed, easily detected and tracked by anyone who follows the changes closely enough. With hundreds or even thousands of eyes on this invisible viewing platform, the likelihood that a change could go unnoticed is virtually nil.

What threats will we face?

Cryptocurrency auto-trading bots cheating:

  • Shrimpy
  • Coinrule
  • Cryptphopper
  • 3commas

To learn more about how such bots work - read 3commas review

Cryptocurrency theft from cryptocurrency exchanges, especially the most popular ones:

  • Coinbase
  • Binance
  • Kraken
  • Gemini
  • LocalBitcoins
  • Bitpanda
  • Gate.io

Fraudulent operations with cryptocurrencies

  • Ledger
  • Trezor
  • Metamask
  • Phantom Wallet

Stay tuned for more research this year

nspw-small scholar3  usenix

owasp      icps

Sidebar