June 15, 2022, 1:20 a.m. | Xiufeng Xu, Liang Hong

cs.CR updates on arXiv.org arxiv.org

We investigate the instantaneous and limiting behavior of an n-node
blockchain which is under continuous monitoring of the IT department of a
company but faces non-stop cyber attacks from a single hacker. The blockchain
is functional as far as no data stored on it has been changed, deleted, or
locked. Once the IT department detects the attack from the hacker, it will
immediately re-set the blockchain, rendering all previous efforts of the hacker
in vain. The hacker will not stop …

attacks blockchain cyber cyber attacks hacker node single under

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cyber Security Cloud Solution Architect

@ Microsoft | London, London, United Kingdom

Compliance Program Analyst

@ SailPoint | United States

Software Engineer III, Infrastructure, Google Cloud Security and Privacy

@ Google | Sunnyvale, CA, USA

Cryptography Expert

@ Raiffeisen Bank Ukraine | Kyiv, Kyiv city, Ukraine

Senior Cyber Intelligence Planner (15.09)

@ OCT Consulting, LLC | Washington, District of Columbia, United States