Buy Blockchain Security from the Bottom Up by Howard E. Poston
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer security > Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts
32%
Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts

Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

The gold standard in up-to-date blockchain cybersecurity handbooks

In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, accomplished blockchain and cybersecurity consultant and educator Howard E. Poston delivers an authoritative exploration of blockchain and crypto cybersecurity. In the book, the author shows you exactly how cybersecurity should be baked into the blockchain at every layer of the technology’s ecosystem. You’ll discover how each layer can be attacked and learn how to prevent and respond to those attacks in an environment of constant technological change and evolution.

You’ll also find:

  • Illuminating case studies of real-world attacks and defenses at various layers in the blockchain ecosystem
  • Thorough introductions to blockchain technology, including its implementations in areas like crypto, NFTs, and smart contracts
  • Comprehensive explorations of critical blockchain topics, including protocols, consensus, and proof of work

A can’t-miss resource for blockchain and cybersecurity professionals seeking to stay on the cutting-edge of a rapidly evolving area, Blockchain Security from the Bottom Up will also earn a place on the bookshelves of software developers working with cryptocurrencies and other blockchain implementations.



Table of Contents:

Chapter 1 Introduction to Blockchain Security 1

The Goals of Blockchain Technology 2

Anonymity 2

Decentralization 2

Fault Tolerance 2

Immutability 3

Transparency 3

Trustless 3

Structure of the Blockchain 3

The Blockchain Network 5

The Blockchain Node 5

A Blockchain Block 6

A Blockchain Transaction 7

Inside the Blockchain Ecosystem 8

Fundamentals 8

Primitives 9

Data Structures 9

Protocols 9

Consensus 9

Block Creation 10

Infrastructure 10

Nodes 10

Network 11

Advanced 11

Smart Contracts 11

Extensions 11

Threat Modeling for the Blockchain 12

Threat Modeling with STRIDE 12

Spoofing 12

Tampering 12

Repudiation 13

Information Disclosure 13

Denial of Service 13

Elevation of Privilege 13

Applying STRIDE to Blockchain 14

Conclusion 14

Chapter 2 Fundamentals 15

Cryptographic Primitives 15

Public Key Cryptography 16

Introducing “Hard” Mathematical Problems 16

Building Cryptography with “Hard” Problems 18

How the Blockchain Uses Public Key Cryptography 19

Security Assumptions of Public Key Cryptography 20

Attacking Public Key Cryptography 20

Hash Functions 25

Security Assumptions of Hash Functions 25

Additional Security Requirements 27

How the Blockchain Uses Hash Functions 28

Attacking Hash Functions 31

Threat Modeling for Cryptographic Algorithms 32

Data Structures 33

Transactions 33

What’s In a Transaction? 33

Inside the Life Cycle of a Transaction 34

Attacking Transactions 34

Blocks 37

Inside a Block 37

Attacking Blockchain Blocks 38

Threat Modeling for Data Structures 39

Conclusion 39

Chapter 3 Protocols 43

Consensus 43

Key Concepts in Blockchain Consensus 44

Byzantine Generals Problem 44

Security via Scarcity 45

The Longest Chain Rule 46

Proof of Work 46

Introduction to Proof of Work 47

Security of Proof of Work 48

Proof of Stake 53

Introduction to Proof of Stake 53

Variants of Proof of Stake 54

Security of Proof of Stake 54

Threat Modeling for Consensus 59

Block Creation 59

Stages of Block Creation 60

Transaction Transmission 60

Block Creator Selection (Consensus) 60

Block Building 61

Block Transmission 61

Block Validation 61

Attacking Block Creation 62

Denial of Service 62

Frontrunning 63

SPV Mining 65

Threat Modeling for Block Creation 65

Conclusion 65

Chapter 4 Infrastructure 67

Nodes 67

Inside a Blockchain Node 68

Attacking Blockchain Nodes 68

Blockchain- Specific Malware 69

Denial-of-Service Attacks 70

Failure to Update 71

Malicious Inputs 72

Software Misconfigurations 73

Threat Modeling for Blockchain Nodes 74

Networks 74

Attacking the Blockchain Network 75

Denial-of-service Attacks 75

Eclipse/Routing Attacks 76

Sybil Attacks 78

Threat Modeling for Blockchain Networks 80

Conclusion 80

Chapter 5 Advanced 83

Smart Contracts 83

Smart Contract Vulnerabilities 84

General Programming Vulnerabilities 85

Blockchain- Specific Vulnerabilities 94

Platform-Specific Vulnerabilities 103

Application- Specific Vulnerabilities 119

Threat Modeling for Smart Contracts 128

Blockchain Extensions 128

State Channels 129

State Channel Security Considerations 129

Sidechains 130

Sidechain Security Considerations 131

Threat Modeling for Blockchain Extensions 132

Conclusion 133

Chapter 6 Considerations for Secure Blockchain Design 137

Blockchain Type 137

Public vs. Private 138

Benefits of Public vs. Private Blockchains 138

Open vs. Permissioned 139

Benefits of Open vs. Permissioned Blockchains 139

Choosing a Blockchain Architecture 140

Privacy and Security Enhancements 140

Zero-Knowledge Proofs 140

Stealth Addresses 141

Ring Signatures 141

Legal and Regulatory Compliance 142

Designing Secure Blockchains for the Future 143

Index 145



About the Author :

HOWARD E. POSTON III is an independent blockchain consultant, educator, and content creator who has developed and taught over a dozen courses covering cybersecurity topics. He holds a master’s degree in Cybersecurity from the Air Force Institute of Technology and is a Certified Ethical Hacker. He has developed and facilitated blockchain security courses for major companies.


Best Sellers


Product Details
  • ISBN-13: 9781119896302
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Standards Information Network
  • Language: English
  • Sub Title: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts
  • ISBN-10: 1119896304
  • Publisher Date: 21 Jul 2022
  • Binding: Digital (delivered electronically)
  • No of Pages: 176


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts
John Wiley & Sons Inc -
Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!