| Classification of cybersecurity challenges in BCT | Themes identified | Literature references from sample research studies |
| Malleability attacks | Network hacks | [1–6, 11, 17–19, 25–55] | Server breaches | Cloud platform hacks | Illegal transactions | Tracking issues | Changing system parameters | Lacking computation efficiency | Censorship and criminal attacks | Proof of authority (POA attacks) | Wiretapping | Denial of service (DoS attacks) | Distributed denial of service (DDoS attacks) | Man in the middle (MitM) or Sybil attack | Double-spending attacks | Selfish mining | [4, 17–19, 26, 39, 42, 46, 47, 49, 56, 57] | Stolen cryptocurrency | Race attacks | 51% attacks | Controlling network’s mining hash rate | [4, 17–19, 26, 28, 35, 39, 46–49, 55, 56, 58–60] | Goldfinger | Wallet security attacks | Hacking user passwords and software bugs | [2, 4, 18, 19, 26, 27, 32, 34, 35, 40, 43, 46, 51, 52, 56, 61, 62] | Phishing | Private key security attacks | Information stealing, date breaches, and losses | Information manipulation and authentication issues | Smart contract loophole attacks | Poor access management on smart contract | [2, 4, 18, 19, 29–31, 39, 40, 42, 47, 48, 51, 54, 57, 63] | Smart contract code error/application vulnerability | Smart contract manipulation and flaws | Code-based attacks | System error attacks | Lack of integration and maintenance systems | [1, 5, 6, 26–28, 37, 43, 60, 63–65] | Interoperability issues | Delays in time-sensitive transactions |
|
|