Skip to main content

Attacks on Blockchain Based Digital Identity

  • Conference paper
  • First Online:
Blockchain and Applications (BLOCKCHAIN 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 320))

Included in the following conference series:

Abstract

An identity is a representation, in a given context, of a user, device, process or service which makes it unique or distinctive. It consists of attributes, traits, or preferences unique to an individual and may contain their date of birth, bank account number(s), social security number, passport information, family members’ information, (cryptographic) credentials, biometrics, or other personally identifying information (PII) necessary to uniquely identifying the individual. An attacker in possession of such information can damage the individual in various ways such as financially by accessing their bank accounts, or infiltrate their organizations, or putting blame on the individual for some wrongdoing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Chancel, J.: Mozilla foundation security advisory 2015–35: cursor clickjacking with flash and images, March 2015. https://www.mozilla.org/en-US/security/advisories/mfsa2015-35/

  2. FireEye: Overruled: containing a potentially destructive adversary, July 2019. https://www.fireeye.com/blog/threat-research/2018/12/overruled-containing-a-potentially-destructive-adversary.html

  3. Gavrichenkov, A.: Breaking HTTPS with BGP hijacking. In: Black Hat USA Briefings (2015)

    Google Scholar 

  4. Grossman, J.: XSS Attacks: Cross-site Scripting Exploits and Defense. Syngress Media (2007)

    Google Scholar 

  5. Hern, A.: Bitcoin currency could have been destroyed by ‘51%’ attack, June 2014. https://www.theguardian.com/technology/2014/jun/16/bitcoin-currency-destroyed-51-attack-ghash-io

  6. McAfee: Cryptojacking. In: Blockchain Threat Report, August 2018. https://www.mcafee.com/enterprise/en-us/assets/reports/rp-blockchain-security-risks.pdf

  7. Pandya, G.: Nokia’s MITM on HTTPS traffic from their phone, January 2013. https://gaurangkp.wordpress.com/2013/01/09/nokia-https-mitm/

  8. Rusinek, D.: Blockchain: new types of insider threat, January 2020. https://www.securing.pl/en/blockchain-new-types-of-insider-threat/

  9. UK National Cyber Security Centre: Advisory: Use of credential stuffing tools, November 2018. https://www.ncsc.gov.uk/news/use-credential-stuffing-tools

  10. Verizon: Data breach investigations report, April 2015. https://doi.org/10.13140/RG.2.1.4205.5768

  11. Wuille, P.: Hierarchical deterministic wallets seed phrase security (2012). https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki#Security

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vishal Saraswat .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pillai, A., Saraswat, V., Vasanthakumary Ramachandran, A. (2022). Attacks on Blockchain Based Digital Identity. In: Prieto, J., Partida, A., Leitão, P., Pinto, A. (eds) Blockchain and Applications. BLOCKCHAIN 2021. Lecture Notes in Networks and Systems, vol 320. Springer, Cham. https://doi.org/10.1007/978-3-030-86162-9_33

Download citation

Publish with us

Policies and ethics