Breaking Cryptocurrencies

The subtle art of detection, identification, and patching of vulnerabilities in decentralized and digital currency

Please note that this is a draft for outline. It may contain errors, mispelling, mistakes.

Chapter 1: “Introduction to blockchain and information security worlds”

Chapter 2: “How a cryptocurrency technically works”

Part I : Reconnaissance

Chapter 3: “Getting Information”

Chapter 3: “Data mining and analyzing”

Part II – Attacking

Chapter 4: “Network attacks”

Chapter 5: “Cryptographic attacks”

Chapter 6: “Software flaws”

Chtapter 7: “Abusing human mind”

Chapter 8: “Economic attacks”

Part III – Defending and protecting your assets

Chapter 9: Praestat cautela quam medela

Chapter 10: Reaction to cryptocurrency