Abstract
An identity is a representation, in a given context, of a user, device, process or service which makes it unique or distinctive. It consists of attributes, traits, or preferences unique to an individual and may contain their date of birth, bank account number(s), social security number, passport information, family members’ information, (cryptographic) credentials, biometrics, or other personally identifying information (PII) necessary to uniquely identifying the individual. An attacker in possession of such information can damage the individual in various ways such as financially by accessing their bank accounts, or infiltrate their organizations, or putting blame on the individual for some wrongdoing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Chancel, J.: Mozilla foundation security advisory 2015–35: cursor clickjacking with flash and images, March 2015. https://www.mozilla.org/en-US/security/advisories/mfsa2015-35/
FireEye: Overruled: containing a potentially destructive adversary, July 2019. https://www.fireeye.com/blog/threat-research/2018/12/overruled-containing-a-potentially-destructive-adversary.html
Gavrichenkov, A.: Breaking HTTPS with BGP hijacking. In: Black Hat USA Briefings (2015)
Grossman, J.: XSS Attacks: Cross-site Scripting Exploits and Defense. Syngress Media (2007)
Hern, A.: Bitcoin currency could have been destroyed by ‘51%’ attack, June 2014. https://www.theguardian.com/technology/2014/jun/16/bitcoin-currency-destroyed-51-attack-ghash-io
McAfee: Cryptojacking. In: Blockchain Threat Report, August 2018. https://www.mcafee.com/enterprise/en-us/assets/reports/rp-blockchain-security-risks.pdf
Pandya, G.: Nokia’s MITM on HTTPS traffic from their phone, January 2013. https://gaurangkp.wordpress.com/2013/01/09/nokia-https-mitm/
Rusinek, D.: Blockchain: new types of insider threat, January 2020. https://www.securing.pl/en/blockchain-new-types-of-insider-threat/
UK National Cyber Security Centre: Advisory: Use of credential stuffing tools, November 2018. https://www.ncsc.gov.uk/news/use-credential-stuffing-tools
Verizon: Data breach investigations report, April 2015. https://doi.org/10.13140/RG.2.1.4205.5768
Wuille, P.: Hierarchical deterministic wallets seed phrase security (2012). https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki#Security
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Pillai, A., Saraswat, V., Vasanthakumary Ramachandran, A. (2022). Attacks on Blockchain Based Digital Identity. In: Prieto, J., Partida, A., Leitão, P., Pinto, A. (eds) Blockchain and Applications. BLOCKCHAIN 2021. Lecture Notes in Networks and Systems, vol 320. Springer, Cham. https://doi.org/10.1007/978-3-030-86162-9_33
Download citation
DOI: https://doi.org/10.1007/978-3-030-86162-9_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-86161-2
Online ISBN: 978-3-030-86162-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)