Home |  ENGLISH |  Kontakt |  Impressum |  Datenschutz |  Anmelden |  KIT

Thema3948: Unterschied zwischen den Versionen

Aus Aifbportal

Wechseln zu: Navigation, Suche
(Die Seite wurde neu angelegt: „{{Abschlussarbeit |Titel=A Survey on Vulnerabilities of Distributed Ledgers |Vorname=Enea |Nachname=Efthimios-Enias Gojka |Abschlussarbeitstyp=Bachelor |Betreu…“)
 
 
Zeile 6: Zeile 6:
 
|Betreuer=Niclas Kannengießer
 
|Betreuer=Niclas Kannengießer
 
|Forschungsgruppe=Critical Information Infrastructures
 
|Forschungsgruppe=Critical Information Infrastructures
|Abschlussarbeitsstatus=In Bearbeitung
+
|Abschlussarbeitsstatus=Abgeschlossen
 
|Beginn=2020/01/18
 
|Beginn=2020/01/18
 +
|Abgabe=2020/03/16
 +
|Beschreibung DE=In this thesis, we present an overview of the vulnerabilities of Distributed Ledger Technology (DLT). Furthermore, we describe attack vectors that exploit the identified vulnerabilities derived from a comprehensive literature search and analysis. We identify dependencies between DLT characteristics and the vulnerability to certain attack vectors. Last but not least, we present countermeasures proposed by academia or practitioners to counter a part of the attack vectors which we describe. The results of this thesis can be of use to newcomers in the field of DLT security as well as to security experts who would want to transfer their existing knowledge of security concepts to DLT.
 
}}
 
}}

Aktuelle Version vom 25. März 2020, 14:31 Uhr



A Survey on Vulnerabilities of Distributed Ledgers


Enea Efthimios-Enias Gojka



Informationen zur Arbeit

Abschlussarbeitstyp: Bachelor
Betreuer: Niclas Kannengießer
Forschungsgruppe: Critical Information Infrastructures

Archivierungsnummer: 3948
Abschlussarbeitsstatus: Abgeschlossen
Beginn: 18. Januar 2020
Abgabe: 16. März 2020

Weitere Informationen

In this thesis, we present an overview of the vulnerabilities of Distributed Ledger Technology (DLT). Furthermore, we describe attack vectors that exploit the identified vulnerabilities derived from a comprehensive literature search and analysis. We identify dependencies between DLT characteristics and the vulnerability to certain attack vectors. Last but not least, we present countermeasures proposed by academia or practitioners to counter a part of the attack vectors which we describe. The results of this thesis can be of use to newcomers in the field of DLT security as well as to security experts who would want to transfer their existing knowledge of security concepts to DLT.