TY - JOUR
T1 - Responsible vulnerability disclosure in cryptocurrencies
AU - Böhme, Rainer
AU - Eckey, Lisa
AU - Moore, Tyler
AU - Narula, Neha
AU - Ruffing, Tim
AU - Zohar, Aviv
N1 - Funding Information: This work is partially funded by: Ar chimedes Privatstiftung, Innsbruck, U.S. National Science Foundation Award No.~ 1714291, ISF grant 1504/17, HUJI Cyber Security Research Center Grant, DFG grants FA 1320/1-1 (Emmy Noether Program) and SFB 1119— 236615297 (Crossing), and BMBF grant 16KIS0902 (iBlockchain).
PY - 2020/9/23
Y1 - 2020/9/23
N2 - Despite the focus on operating in adversarial environments, cryptocurrencies have suffered several security and privacy problems. In this article, researchers focus on the disclosure process itself, which presents unique challenges compared to other software projects. They examine some recent disclosures and discuss difficulties that have arisen. Cryptocurrency software is complex and vulnerabilities can be readily, and anonymously, monetized. Responsible vulnerability disclosure in cryptocurrencies is challenging as decentralized systems, by design, give no single party authority to push code updates. This review of case studies informs recommendations for preventing catastrophic cryptocurrency failures. Design decisions such as which protocol to implement or how to fix a vulnerability, must get support from most stakeholders to take effect.
AB - Despite the focus on operating in adversarial environments, cryptocurrencies have suffered several security and privacy problems. In this article, researchers focus on the disclosure process itself, which presents unique challenges compared to other software projects. They examine some recent disclosures and discuss difficulties that have arisen. Cryptocurrency software is complex and vulnerabilities can be readily, and anonymously, monetized. Responsible vulnerability disclosure in cryptocurrencies is challenging as decentralized systems, by design, give no single party authority to push code updates. This review of case studies informs recommendations for preventing catastrophic cryptocurrency failures. Design decisions such as which protocol to implement or how to fix a vulnerability, must get support from most stakeholders to take effect.
UR - http://www.scopus.com/inward/record.url?scp=85091988732&partnerID=8YFLogxK
U2 - https://doi.org/10.1145/3372115
DO - https://doi.org/10.1145/3372115
M3 - مقالة مرجعية
SN - 0001-0782
VL - 63
SP - 62
EP - 71
JO - Communications of the ACM
JF - Communications of the ACM
IS - 10
ER -