dc.contributor.advisor | Hetland, Magnus Lie | nb_NO |
dc.contributor.author | Kateraas, Christian H | nb_NO |
dc.date.accessioned | 2014-12-19T13:42:07Z | |
dc.date.available | 2014-12-19T13:42:07Z | |
dc.date.created | 2014-11-13 | nb_NO |
dc.date.issued | 2014 | nb_NO |
dc.identifier | 762896 | nb_NO |
dc.identifier | ntnudaim:8670 | nb_NO |
dc.identifier.uri | http://hdl.handle.net/11250/253952 | |
dc.description.abstract | Collect and analyse threat models to the Bitcoin ecosystem and its software. The create misuse case, attack trees, and sequence diagrams of the threats. Create a malicious client from the gathered threat models. Once the development of the client is complete, test the client and evaluate its performance. From this, assess the security of the Bitcoin software. | nb_NO |
dc.language | eng | nb_NO |
dc.publisher | Institutt for datateknikk og informasjonsvitenskap | nb_NO |
dc.subject | ntnudaim:8670 | no_NO |
dc.subject | MIT informatikk | no_NO |
dc.subject | Komplekse datasystemer | no_NO |
dc.title | Threats to Bitcoin Software | nb_NO |
dc.type | Master thesis | nb_NO |
dc.source.pagenumber | 187 | nb_NO |
dc.contributor.department | Norges teknisk-naturvitenskapelige universitet, Fakultet for informasjonsteknologi, matematikk og elektroteknikk, Institutt for datateknikk og informasjonsvitenskap | nb_NO |