In blockchain technology, cybercriminals exploit new attack surfaces for
non-legitimate persons who wish a dissemination of fake information, encourage cyber
attacks, unethical behavior, etc. Attacks are believed to be attributed to the blockchain
cryptographic architecture, the bottom-line architecture, and the substance in which
they are applied. The main threat is focused on the progressive defense research
activity. It is currently believed that other attacks on the blockchain can be launched
without being able to withstand traditional defenses, a few of which may be used to
deliver any other attack. By delineating these attacks and examining their
countermeasures, it highlights the direction of new research that should be persisted for
safer and more competent use of blockchain. In spite of vulnerabilities and attacks, this
technology offers key features like hashing, immutability and digital signature, which
enrich the blockchain. Researchers also contributed to developing a security shield for
blockchain by using an intelligent combination of these features. Basically, these
features are required to achieve CIA (Confidentiality, Integrity and Authentication).
The contribution of this chapter would be systematically investigating the attack
surface of Blockchain technology. The attack surface is the sum of all conceivable
security risk exposures. It is also the total of all known and undiscovered threats,
possible vulnerabilities, and controls, including all resources. To do this, we set attack
vitality on the attack surface to a variety of attacks.
Keywords: Attack surface, Block chain, CIA, Defense research activity, Vulnerabilities.