Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Engineering

Spartandark: Anonymity Model Integration With A Blockchain Network Using Spartangold, Nishanth Uchil Jan 2023

Spartandark: Anonymity Model Integration With A Blockchain Network Using Spartangold, Nishanth Uchil

Master's Projects

Demand for blockchain ecosystems has seen exponential growth in recent times due to its decentralized nature and trustless verification process for the transactions involved. However, transaction data needs to be leveraged for verification, which coupled with the transparent nature of the blockchain ledger, provides sufficient data for malicious entities to reveal identities and even financial history of users. Data masking techniques have been employed over the years to make blockchain transactions anonymous, making them resistant to identity analysis, a key set of methods being zero-knowledge proof (zk-proof) protocols that guarantee zero data leak. In this research, we develop SpartanDark, a …


Incentive Analysis Of Blockchain Technology, Rahul Reddy Annareddy Jan 2022

Incentive Analysis Of Blockchain Technology, Rahul Reddy Annareddy

Graduate Theses, Dissertations, and Problem Reports

Blockchain technology was invented in the Bitcoin whitepaper released in 2008. Since then, several decentralized cryptocurrencies and applications have become mainstream. There has been an immense amount of engineering effort put into developing blockchain networks. Relatively few projects backed by blockchain technology have succeeded and maintained a large community of developers, users, and customers, while many popular projects with billions of dollars in funding and market capitalizations have turned out to be complete scams.

This thesis discusses the technological innovations introduced in the Bitcoin whitepaper and the following work of the last fifteen years that has enabled blockchain technology. A …


A Deep-Dive Into Cryptojacking Malware: From An Empirical Analysis To A Detection Method For Computationally Weak Devices, Ege Tekiner Nov 2021

A Deep-Dive Into Cryptojacking Malware: From An Empirical Analysis To A Detection Method For Computationally Weak Devices, Ege Tekiner

FIU Electronic Theses and Dissertations

Cryptojacking is an act of using a victim's computation power without his/her consent. Unauthorized mining costs extra electricity consumption and decreases the victim host's computational efficiency dramatically. In this thesis, we perform an extensive research on cryptojacking malware from every aspects. First, we present a systematic overview of cryptojacking malware based on the information obtained from the combination of academic research papers, two large cryptojacking datasets of samples, and numerous major attack instances. Second, we created a dataset of 6269 websites containing cryptomining scripts in their source codes to characterize the in-browser cryptomining ecosystem by differentiating permissioned and permissionless cryptomining …