Evaluating blockchain security and privacy via graph-based attacks
Public blockchains intend to give security and protection for user transactions. Nonetheless, episodes of thefts and data leaks could happen at any time [1]. In this paper, we analyze some graph-based attacks that could help us to evaluate such vulnerabilities and how the components of the graphs can be identified in a blockchain network. Finally, we discuss these attack scenarios by providing examples that are based on topological attacks [2] and threat modeling.