1.
Y. Abuidris, A. Hassan, A. Hadabi, and I. Elfadul, “Risks and opportunities of blockchain based on e-voting systems,” in 2019 16th International Computer Conference on Wavelet Active Media Technology and Information Processing, 2019, pp. 365–368. doi: 10.1109/ICCWAMTIP47768.2019.9067529.
2.
J. H. Lee, “Systematic approach to analyzing security and vulnerabilities of blockchain systems,” Massachusetts Institute of Technology, 2019. doi: https://web.mit.edu/smadnick/www/wp/2019-05.pdf.
3.
Z. Wenhua, F. Qamar, T.-A. N. Abdali, R. Hassan, S. T. A. Jafri, and Q. N. Nguyen, “Blockchain technology: security issues, healthcare applications, challenges and future trends,” Electronics (Basel), vol. 12, no. 3, p. 546, 2023, doi: 10.3390/electronics12030546.
4.
Y. Erinle, Y. Kethepalli, Y. Feng, and J. Xu, “SoK: Design, Vulnerabilities and Defense of Cryptocurrency Wallets,” arXiv preprint arXiv:2307.12874, 2023, doi: 10.48550/arXiv.2307.12874.
5.
B. Eliasi and A. Javdan, “Comparison of blockchain e-wallet implementations,” 2019, School of Electrical Engineering and Computer Science. Accessed: Oct. 25, 2023. [Online]. Available: https://www.diva-portal.org/smash/get/diva2:1350402/FULLTEXT01.pdf
6.
S. Gomzin and K. Westin, Crypto Basics: A Nontechnical Introduction to Creating Your Own Money for Investors and Inventors, 1st ed. Apress Berkeley, CA, 2022. doi: 10.1007/978-1-4842-8321-9.
7.
P. McCorry, M. Möser, and S. T. Ali, “Why preventing a cryptocurrency exchange heist isn’t good enough,” in Cambridge International Workshop on Security Protocols, Springer International Publishing, 2018, pp. 225–233. doi: 10.1007/978-3-030-03251-7_27.
8.
S. Eskandari, D. Barrera, E. Stobert, and J. Clark, “A First Look at the Usability of Bitcoin Key Management,” in Proceedings 2015 Workshop on Usable Security, Internet Society, Feb. 2015. doi: 10.14722/usec.2015.23015.
9.
L. Coppolino, S. D’Antonio, G. Mazzeo, L. Romano, and P. Campegiani, “Facing the blockchain endpoint vulnerability, an SGX-based solution for secure eHealth auditing,” 5th Italian Conference on Cybersecurity - CEUR Workshop Proceedings, vol. 2940, pp. 298–308, 2021, Accessed: Dec. 09, 2024. [Online]. Available: https://ceur-ws.org/Vol-2940/paper25.pdf.
10.
H. Harrison, “Browser isolation as an enterprise security control,” Cyber Security: A Peer-Reviewed Journal, vol. 6, no. 2, pp. 141–147, 2022, doi: 10.69554/RNYH1344.
11.
Cloudflare, “What is browser isolation?” Cloudflare. Accessed: Jul. 16, 2024. [Online]. Available: https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/
12.
M. Sabt, M. Achemlal, and A. Bouabdallah, “Trusted execution environment: What it is, and what it is not,” in 2015 IEEE Trustcom/BigDataSE/Ispa, Helsinki, Finland: IEEE, 2015, pp. 57–64. doi: 10.1109/Trustcom.2015.357.
13.
Joel Timothy, “What is a Trusted Execution Environment (TEE)?,” Duality. Accessed: Jul. 16, 2024. [Online]. Available: https://dualitytech.com/blog/what-is-a-trusted-execution-environment-tee/
14.
M. A. Majeed, R. Sulaiman, Z. Shukur, and M. K. Hasan, “A review on text steganography techniques,” Mathematics, vol. 9, no. 21, p. 2829, 2021, doi: 10.3390/math9212829.
15.
M. Gimenez-Aguilar, J. M. De Fuentes, L. González-Manzano, and C. Camara, “Zephyrus: an information hiding mechanism leveraging Ethereum data fields,” IEEE Access, vol. 9, pp. 118553–118570, 2021, doi: 10.1109/ACCESS.2021.3106713.
16.
M. Noor and K. Mustafa, “A systematic literature review on endpoint vulnerabilities of blockchain applications,” International Journal of Advanced Technology and Engineering Exploration, vol. 10, no. 109, pp. 1665–1695, Dec. 2023, doi: 0.19101/IJATEE.2023.10101498.
17.
S. Nakamoto, “A peer-to-peer electronic cash system,” Bitcoin. –URL: https://bitcoin. org/bitcoin. pdf, vol. 4, 2008.
18.
V. Buterin, “Ethereum white paper,” GitHub repository, vol. 1, pp. 22–23, 2013, Accessed: Dec. 09, 2024. [Online]. Available: https://static.peng37.com/ethereum_whitepaper_laptop_3.pdf
19.
M. A. F. Noor, S. Khanum, T. Anwar, and M. Ansari, “A Holistic View on Blockchain and Its Issues,” in Blockchain Applications in IoT Security, IGI Global, 2021, pp. 21–44, doi: 10.4018/978-1-7998-2414-5.ch002.
20.
G. Yang, C. Li, and K. E. Marstein, “A blockchain-based architecture for securing electronic health record systems,” Concurr Comput, vol. 33, no. 14, p. e5479, 2021, doi: 10.1002/cpe.5479.
21.
S. Mollajafari and K. Bechkoum, “Blockchain technology and related security risks: towards a seven-layer perspective and taxonomy,” Sustainability MDPI, vol. 15, no. 18, p. 13401, 2023, doi: 10.3390/su151813401.
22.
S. Sharma and R. Dwivedi, “A survey on blockchain deployment for biometric systems,” IET blockchain, vol. 4, no. 2, pp. 124–151, 2024, doi: 10.1049/blc2.12063.
23.
M. Choobineh, A. Arabnya, B. Sohrabi, A. Khodaei, and A. Paaso, “Blockchain technology in energy systems: A state-of-the-art review,” IET Blockchain, vol. 3, no. 1, pp. 35–59, 2023, doi: 10.1049/blc2.12020.
24.
H. Wu et al., “Blockchain for finance: A survey,” IET Blockchain Wiley, vol. 4, pp. 101–123, 2024, doi: 10.1049/blc2.12067.
25.
A. Dixit, A. Trivedi, and W. W. Godfrey, “A survey of cyber attacks on blockchain based IoT systems for industry 4.0,” IET Blockchain, vol. 4, no. 4, pp. 287–301, 2022, doi: 10.1049/blc2.12017.
26.
M. Conti, K. E. Sandeep, C. Lal, and S. Ruj, “A survey on security and privacy issues of bitcoin,” IEEE Communications Surveys and Tutorials, vol. 20, no. 4, pp. 3416–3452, 2018, doi: 10.1109/COMST.2018.2842460.
27.
H. Hasanova, U. jun Baek, M. gon Shin, K. Cho, and M. S. Kim, “A survey on blockchain cybersecurity vulnerabilities and possible countermeasures,” International Journal of Network Management, vol. 29, no. 2, pp. 1–36, 2019, doi: 10.1002/nem.2060.
28.
J. Velissarios, J. Herzig, and U. Didem, “Blockchain’s potential starts with security,” in Accenture, 2019. Accessed: Dec. 09, 2024. [Online]. Available: https://www.accenture.com/us-en/insights/blockchain/potential-starts-security.
29.
M. A. Rasool and H. Muhammad Shafiq, “Blockchain Technology: a new domain for Cyber Forensics,” 2018, Diva, Halmstad University. Accessed: Dec. 09, 2024. [Online]. Available: https://www.diva-portal.org/smash/get/diva2:1259867/FULLTEXT01.pdf.
30.
R. Matulevi?ius, M. Iqbal, E. Ammar Elhadjamor, S. A. Ghannouchi, M. Bakhtina, and S. Ghannouchi, “Ontological Representation of Healthcare Application Security Using Blockchain Technology,” Informatica (Netherlands), vol. 33, no. 2, pp. 365–397, 2022, doi: 10.15388/22-INFOR486.
31.
M. A. F. Noor and K. Mustafa, “A taxonomy of endpoint vulnerabilities and affected blockchain architecture layers,” Concurr Comput, vol. 36, no. 19, p. e8158, 2024, doi: 10.1002/cpe.8158.
32.
H. Guo and X. Yu, “A survey on blockchain technology and its security,” Blockchain: Research and Applications, vol. 3, no. 2, p. 100067, Jun. 2022, doi: 10.1016/j.bcra.2022.100067.
33.
M. Iqbal and R. Matulevicius, “Exploring Sybil and Double-Spending Risks in Blockchain Systems,” IEEE Access, vol. 9, pp. 76153–76177, 2021, doi: 10.1109/ACCESS.2021.3081998.
34.
J. Hu, H. Wang, and Y. Liu, “Strengthening Digital Marketing Security Website Threat Isolation and Protection Using Remote Browser Isolation Technology,” Computer-Aided Design, vol. 21, no. S4, pp. 56–74, 2024, doi: https://doi.org/10.14733/cadaps.2024.S4.56-74.
35.
Karlos G. Ray, “A Quick Walkthrough on Remote Browser Isolation (RBI),” Medium. Accessed: Jul. 17, 2024. [Online]. Available: https://karliris62.medium.com/a-quick-walkthrough-on-remote-browser-isolation-rbi-a563094756f6.
36.
Z. Bao, Q. Wang, W. Shi, L. Wang, H. Lei, and B. Chen, “When blockchain meets SGX: An overview, challenges, and open issues,” IEEE Access, vol. 8, pp. 170404–170420, Sep. 2020, doi: 10.1109/ACCESS.2020.3024254.
37.
L. Farrelly, “What is a Trusted Execution Environment (TEE)?,” Evervault. Accessed: Jul. 16, 2024. [Online]. Available: https://evervault.com/blog/what-is-a-trusted-execution-environment-tee.
38.
X. Li, P. Jiang, T. Chen, X. Luo, and Q. Wen, “A survey on the security of blockchain systems,” Future Generation Computer Systems, vol. 107, pp. 841–853, 2020, doi: 10.1016/j.future.2017.08.020.
39.
A. M. Alqahtani and A. Algarni, “A Survey on Blockchain Technology Concepts, Applications and Security,” International Journal of Advanced Computer Science and Applications, vol. 14, no. 2, pp. 841–847, 2023, doi: 10.14569/IJACSA.2023.0140296.
40.
A. N’dri, “The Applications of Blockchain To Cybersecurity,” Culminating Projects in Information Assurance, p. 141, Aug. 2023, Accessed: Dec. 09, 2024. [Online]. Available: https://repository.stcloudstate.edu/msia_etds/141/.
41.
J. Holbrook, “Blockchain Security and Threat Landscape,” in Architecting Enterprise Blockchain Solutions, John Wiley & Sons, Ltd, 2020, ch. 11, pp. 323–347. Doi: 10.1002/9781119557722.ch11.
42.
M. K. Shrivas, T. Y. Dean, and S. S. Brunda, “The Disruptive Blockchain Security Threats and Threat Categorization,” in 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T), Raipur: IEEE, Apr. 2020, pp. 327–338. Doi: 10.1109/ICPC2T48082.2020.9071475.
43.
P. A. D. S. N. Wijesekara and S. Gunawardena, “A Review of blockchain technology in knowledge-defined networking, its application, benefits, and challenges,” Network, vol. 3, no. 3, pp. 343–421, 2023, doi: 10.3390/network3030017.
44.
J. Yli-Huumo, D. Ko, S. Choi, S. Park, and K. Smolander, “Where is current research on blockchain technology?—a systematic review,” PloS One, vol. 11, no. 10, p. e0163477, 2016, doi: 10.1371/journal.pone.0163477.
45.
O. Pal, B. Alam, V. Thakur, and S. Singh, “Key management for blockchain technology,” ICT Express, vol. 7, no. 1, pp. 76–80, 2021, doi: 10.1016/j.icte.2019.08.002.
46.
E. O. Kiktenko, M. A. Kudinov, and A. K. Fedorov, “Detecting Brute-Force Attacks on Cryptocurrency Wallets,” in Lecture Notes in Business Information Processing, Springer, 2019, pp. 232–242. Doi: 10.1007/978-3-030-36691-9_20.
47.
Z. Wang, H. Yu, Z. Zhang, J. Piao, and J. Liu, “ECDSA weak randomness in Bitcoin,” Future Generation Computer Systems, vol. 102, pp. 507–513, 2020, doi: 10.1016/j.future.2019.08.034.
48.
N. Wang, Y. Chen, Y. Yang, Z. Fang, and Y. Sun, “Blockchain private key storage algorithm based on image information hiding,” in International Conference on Artificial Intelligence and Security, Springer, Jul. 2019, pp. 542–552. Doi: https://doi.org/10.1007/978-3-030-24268-8_50.
49.
M. Brengel and C. Rossow, “Identifying key leakage of bitcoin users,” in International Symposium on Research in Attacks, Intrusions, and Defenses, Springer International Publishing, 2018, pp. 623–643. Doi: 10.1007/978-3-030-00470-5.
50.
J. Lind, O. Naor, I. Eyal, F. Kelbert, E. G. Sirer, and P. Pietzuch, “Teechain: a secure payment network with asynchronous blockchain access,” in Proceedings of the 27th ACM Symposium on Operating Systems Principles, in SOSP ’19. New York, NY, USA: Association for Computing Machinery, 2019, pp. 63–79. Doi: 10.1145/3341301.3359627.
51.
F. Zhang, I. Eyal, R. Escriva, A. Juels, and R. Van Renesse, “{REM}:{Resource-Efficient} mining for blockchains,” in 26th USENIX Security Symposium (USENIX Security 17), Vancouver: USENIX Association, Aug. 2017, pp. 1427–1444. Accessed: Dec. 09, 2024. [Online]. Available: https://eprint.iacr.org/2017/179.pdf.
52.
M. Milutinovic, W. He, H. Wu, and M. Kanwal, “Proof of Luck: an Efficient Blockchain Consensus Protocol,” in Proceedings of the 1st Workshop on System Software for Trusted Execution, in SysTEX ’16. Trento: Association for Computing Machinery, 2016, pp. 1–6. Doi: 10.1145/3007788.3007790.
53.
R. Yuan, Y.-B. Xia, H.-B. Chen, B.-Y. Zang, and J. Xie, “Shadoweth: Private smart contract on public blockchain,” J Comput Sci Technol, vol. 33, pp. 542–556, 2018, doi: 10.1007/s11390-018-1839-y.
54.
M. Al-Bassam, A. Sonnino, M. Król, and I. Psaras, “Airtnt: Fair exchange payment for outsourced secure enclave computations,” arXiv preprint arXiv:1805.06411, 2018, doi: 10.48550/arXiv.1805.06411.
55.
M. A. F. Noor and K. Mustafa, “Protocols and Guidelines to Enhance the Endpoint Security of Blockchain at User’s End,” in ICIDSSD 2022: Proceedings of the 3rd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2022, 24-25 March 2022, New Delhi, India, New Delhi: EAI Publishing, 2023, p. 231. Doi: 10.4108/eai.24-3-2022.2318925.
56.
Y. Jabareen, “Building a conceptual framework: philosophy, definitions, and procedure,” Int J Qual Methods, vol. 8, no. 4, pp. 49–62, 2009, doi: 10.1177/160940690900800406.
57.
Kaspersky, “What is browser isolation and how does it work?,” Kaspersky. Accessed: Jul. 16, 2024. [Online]. Available: https://www.kaspersky.com/resource-center/definitions/what-is-browser-isolation.
58.
Netskope, “https://www.netskope.com/security-defined/what-is-remote-browser-isolation-rbi,” Netskope. Accessed: Jul. 17, 2024. [Online]. Available: https://www.netskope.com/security-defined/what-is-remote-browser-isolation-rbi.
59.
A. Kamruzzaman, S. Ismat, J. C. Brickley, A. Liu, and K. Thakur, “A comprehensive review of endpoint security: Threats and defenses,” in 2022 International Conference on Cyber Warfare and Security (ICCWS), Islamabad: IEEE, 2022, pp. 1–7. Doi: 10.1109/ICCWS56285.2022.9998470.
60.
R. Verma, N. Dhanda, and V. Nagar, “Application of truffle suite in a blockchain environment,” in Proceedings of Third International Conference on Computing, Communications, and Cyber-Security: IC4S 2021, Springer, 2022, pp. 693–702. Doi: 10.1007/978-981-19-1142-2_54.
61.
G. McCubbin, “How To Build A Blockchain App with Ethereum, Web3.js & Solidity Smart Contracts,” Dapp University. Accessed: Jul. 18, 2024. [Online]. Available: https://www.dappuniversity.com/articles/how-to-build-a-blockchain-app.
62.
W.-M. Lee, “Using the MetaMask Crypto-Wallet,” in Beginning Ethereum Smart Contracts Programming: With Examples in Python, Solidity, and JavaScript, Berkeley, CA: Apress, 2023, pp. 111–144. Doi: 10.1007/978-1-4842-9271-6_5.