systems. Table V lists six risk
categories which may be
exploit by attackers to launch attacks.
Combining Table III, Table IV and Table V, we come to
have the comprehensive view of security risks on Blockchain
shown in Table VI. Some other low level security risks such
as wallet security, Sybil attacks,
personal key security to
highlight its importance, and liveness attack, balance attack,
timejacking attacks, finney attack, race attack and SelfHolding
attack which we put under intentional misuse category are also
listed in Table VI. In the table, it is clear that the code
vulnerabilities have the most risk surfaces on Blockchain.
Under
the code vulnerabilities, we divide codes into core
software code which Blockchain 1.0 and 2.0 are built upon,
and smart contract which only exists in Blockchain 2.0. Under
the core software code, we highlight the wallet security since
quite a number of attacks hack the wallets.
T
ABLE
V.
B
LOCKCHAIN
S
ECURITY
R
ISK
C
ATEGORIES AT
H
IGH LEVEL