Distributed Trust in the Age of Malware Blockchain Applications
Abstract
1. Introduction
2. Theoretical Foundations
3. Algorithmic Model of Blockchain-Based Malware Detection
4. Blockchain in Cybersecurity: General Applications
5. Blockchain-Enabled Malware Detection
6. Performance and Security Evaluation
7. Challenges, Limitations, and Future Research Directions
7.1. Privacy Remains an Unresolved Frontier
7.2. Trust Management Introduces New Attack Surfaces
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
| AI | Artificial Intelligence |
| AMQ | Approximate Membership Query |
| BFT | Byzantine Fault Tolerance |
| BFLS | Blockchain and Federated Learning for Cyber Intelligence Sharing |
| CTI | Cyber Threat Intelligence |
| DPoS | Delegated Proof-of-Stake |
| DApp | Decentralized Application |
| GDPR | General Data Protection Regulation |
| IAM | Identity and Access Management |
| IoC | Indicator of Compromise |
| IoT | Internet of Things |
| PKI | Public Key Infrastructure |
| PoA | Proof-of-Authority |
| PoS | Proof-of-Stake |
| PoW | Proof-of-Work |
| TEE | Trusted Execution Environment |
References
- Song, Y.; Zhang, D.; Wang, J.; Wang, Y.; Wang, Y.; Ding, P. Application of Deep Learning in Malware Detection: A Review. J. Big Data 2025, 12, 99. [Google Scholar] [CrossRef]
- Santos, P.; Abreu, R.; Reis, M.J.C.S.; Serôdio, C.; Branco, F. A Systematic Review of Cyber Threat Intelligence: The Effectiveness of Technologies, Strategies, and Collaborations in Combating Modern Threats. Sensors 2025, 25, 4272. [Google Scholar] [CrossRef] [PubMed]
- Aboaoja, F.A.; Zainal, A.; Ghaleb, F.A.; Al-rimy, B.A.S.; Eisa, T.A.E.; Elnour, A.A.H. Malware Detection Issues, Challenges, and Future Directions: A Survey. Appl. Sci. 2022, 12, 8482. [Google Scholar] [CrossRef]
- Salman, T.; Zolanvari, M.; Erbad, A.; Jain, R.; Samaka, M. Security Services Using Blockchains: A State-of-the-Art Survey. IEEE Commun. Surv. Tutor. 2019, 21, 858–880. [Google Scholar] [CrossRef]
- Sinha, S.K.; Modak, S.K.S.; Tyagi, P.K.; Azad, C. Enhancing Cybersecurity with Blockchain: A Decentralized Approach to Securing Digital Infrastructure. In Proceedings of the 6th International Conference on Information Management & Machine Intelligence (ICIMMI 2024), Jaipur, India, 23–24 December 2024; Association for Computing Machinery: New York, NY, USA, 2025; pp. 1–6. [Google Scholar]
- Cha, J.; Singh, S.K.; Pan, Y.; Park, J.H. Blockchain-Based Cyber Threat Intelligence System Architecture for Sustainable Computing. Sustainability 2020, 12, 6401. [Google Scholar] [CrossRef]
- Bordeianu, A.A.; Popescu, D.E. Blockchain Variables and Possible Attacks: A Technical Survey. Computers 2025, 14, 567. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Bitcoin.org, 2008. Available online: https://assets.pubpub.org/d8wct41f/31611263538139.pdf (accessed on 1 December 2025).
- Zheng, Z.; Xie, S.; Dai, H.; Chen, X.; Wang, H. Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv. 2018, 14, 352–375. [Google Scholar] [CrossRef]
- Castro, M.; Liskov, B. Practical Byzantine Fault Tolerance. In Proceedings of the 3rd Symposium on Operating Systems Design and Implementation (OSDI ’99), New Orleans, LA, USA, 22–25 February 1999; pp. 173–186. [Google Scholar]
- Liu, J.; Liu, C.; Lin, M.; Xu, G. Comprehensive Survey of Blockchain Consensus Mechanisms: Analysis, Applications, and Future Trends. Comput. Netw. 2025, 272, 111661. [Google Scholar] [CrossRef]
- Memon, M.; Hussain, S.S.; Bajwa, U.A.; Ikhlas, A. Blockchain Beyond Bitcoin: Blockchain Technology Challenges and Real-World Applications. In Proceedings of the 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE), Southend, UK, 16–17 August 2018; IEEE: Southend, UK, 2018; pp. 29–34. [Google Scholar]
- Kiayias, A.; Russell, A.; David, B.; Oliynykov, R. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. In Proceedings of the Advances in Cryptology—CRYPTO 2017, Lecture Notes in Computer Science, Santa Barbara, CA, USA, 20–24 August 2017; Springer: Cham, Switzerland, 2017; Volume 10401, pp. 357–388. [Google Scholar]
- Merkle, R.C. A Digital Signature Based on a Conventional Encryption Function. In Proceedings of the Advances in Cryptology—CRYPTO ’87, Lecture Notes in Computer Science, Santa Barbara, CA, USA, 16–20 August 1987; Springer: Berlin/Heidelberg, Germany, 1988; Volume 293, pp. 369–378. [Google Scholar]
- Atlam, H.F.; Wills, M.A.; Walters, R.J. Blockchain forensics: A systematic literature review. Electronics 2024, 13, 3568. [Google Scholar] [CrossRef]
- Essaid, M.; Ju, H. Blockchain Solutions for Enhancing Security and Privacy in Industrial IoT. Appl. Sci. 2025, 15, 6835. [Google Scholar] [CrossRef]
- Ferguson, N.; Schneier, B.; Kohno, T. Cryptography Engineering: Design Principles and Practical Applications; Wiley: Hoboken, NJ, USA, 2010. [Google Scholar]
- Berrios, S.; Leiva, D.; Olivares, B.; Allende-Cid, H.; Hermosilla, P. Systematic Review: Malware Detection and Classification in Cybersecurity. Appl. Sci. 2025, 15, 7747. [Google Scholar] [CrossRef]
- Gopinath, M.; Sethuraman, S.C. A Comprehensive Survey on Deep Learning-Based Malware Detection Techniques. Comput. Sci. Rev. 2023, 47, 100529. [Google Scholar]
- Maniriho, P.; Mahmood, A.N.; Chowdhury, M.J.M. A Systematic Literature Review on Windows Malware Detection: Techniques, Research Issues, and Future Directions. J. Syst. Softw. 2024, 209, 111921. [Google Scholar] [CrossRef]
- Han, Y.; Wang, Z.; Ruan, Q.; Fang, B. Sapiens Chain: A Blockchain-based Cybersecurity Framework. arXiv 2018, arXiv:1811.10868. [Google Scholar] [CrossRef]
- Conti, M.; Sandeep Kumar, E.; Lal, C.; Ruj, S. A Survey on Security and Privacy Issues of Bitcoin. IEEE Commun. Surv. Tutor. 2018, 20, 3416–3452. [Google Scholar] [CrossRef]
- Putz, B.; Menges, F.; Pernul, G. A Secure and Auditable Logging Infrastructure Based on a Permissioned Blockchain. Comput. Secur. 2019, 87, 101602. [Google Scholar] [CrossRef]
- Casino, F.; Dasaklis, T.K.; Patsakis, C. A Systematic Literature Review of Blockchain-Based Applications: Current Status, Classification and Open Issues. Telemat. Inform. 2019, 36, 55–81. [Google Scholar] [CrossRef]
- Regueiro, C.; Seco, I.; Gutiérrez-Agüero, I.; Urquizu, B.; Mansell, J. A Blockchain-Based Audit Trail Mechanism: Design and Implementation. Algorithms 2021, 14, 341. [Google Scholar] [CrossRef]
- Ragu, G.; Ramamoorthy, S. A Blockchain-Based Cloud Forensics Architecture for Privacy Leakage Prediction with Cloud. Healthc. Anal. 2023, 4, 100220. [Google Scholar]
- Al-Bassam, M. SCPKI: A Smart Contract-Based PKI and Identity System. In Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts (BCC’17), Abu Dhabi, United Arab Emirates, 2 April 2017; pp. 35–40. [Google Scholar]
- Wang, S.; Ouyang, L.; Yuan, Y.; Ni, X.; Han, X.; Wang, F.-Y. Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 2266–2277. [Google Scholar] [CrossRef]
- Fromknecht, C.; Velicanu, D.; Yakoubov, S. Certcoin: A Namecoin Based Decentralized Authentication System. In MIT CSAIL Technical Report; Massachusetts Institute of Technology: Cambridge, MA, USA, 2014. [Google Scholar]
- Sukhodolskiy, I.; Zapechnikov, S. A Blockchain-Based Access Control System for Cloud Storage. In Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), Moscow and St. Petersburg, Russia, 29 January–1 February 2018; pp. 1575–1578. [Google Scholar]
- Jiang, F.; Zhang, F.; Hong, H. Research of Threat Intelligence Architecture Based on Internal Threat Intelligence. In Proceedings of the 2025 4th International Conference on Intelligent Systems, Communications and Computer Networks (ISCCN ’25), Nanjing, China, 21–23 February 2025; ACM: New York, NY, USA, 2025; pp. 8–15. [Google Scholar]
- Chatziamanetoglou, D.; Rantos, K. Cyber Threat Intelligence on Blockchain: A Systematic Literature Review. Computers 2024, 13, 60. [Google Scholar] [CrossRef]
- He, K.; Kim, D.-S. Malware Detection with Malware Images Using Deep Learning Techniques. In Proceedings of the 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), Rotorua, New Zealand, 5–8 August 2019; pp. 95–102. [Google Scholar]
- Allouche, Y.; Tapas, N.; Longo, F.; Shabtai, A.; Wolfsthal, Y. TRADE: TRusted Anonymous Data Exchange Using Blockchain Technology. arXiv 2021, arXiv:2103.13158. [Google Scholar]
- Moosavi, N.; Taherdoost, H. Blockchain Technology Application in Security: A Systematic Review. Blockchains 2023, 1, 58–72. [Google Scholar] [CrossRef]
- Dunnett, K.; Pal, S.; Putra, G.D.; Jadidi, Z.; Jurdak, R. A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain. arXiv 2022, arXiv:2208.12031. [Google Scholar] [CrossRef]
- Choudhary, S.; Sharma, A. Malware Detection & Classification Using Machine Learning. In Proceedings of the 2020 International Conference on Emerging Trends in Communication, Control and Computing (ICONC3), Lakshmangarh, India, 21–22 February 2020; pp. 1–4. [Google Scholar]
- Mat Razali, N.A.; Wan Muhamad, W.N.; Ishak, K.K.; Saad, N.J.A.; Wook, M.; Ramli, S. Secure Blockchain-Based Data-Sharing Model and Adoption among Intelligence Communities. IAENG Int. J. Comput. Sci. 2020, 48, 1–14. [Google Scholar]
- Ozdayi, M.S.; Kantarcioglu, M.; Malin, B. Leveraging Blockchain for Immutable Logging and Querying across Multiple Sites. BMC Med. Genom. 2020, 13, 82. [Google Scholar] [CrossRef] [PubMed]
- Pawar, P.P.; Kumar, D.; Meesala, M.K.; Pareek, P.K.; Addula, S.R.; S.K., S. Securing Digital Governance: A Deep Learning and Blockchain Framework for Malware Detection in IoT Networks. In Proceedings of the 2024 International Conference on Integrated Intelligence and Communication Systems (ICIICS), Kalaburagi, India, 22–23 November 2024; pp. 1–8. [Google Scholar]
- Gong, S.; Lee, C. BLOCIS: Blockchain-Based Cyber Threat Intelligence Sharing Framework for Sybil-Resistance. Electronics 2020, 9, 521. [Google Scholar] [CrossRef]
- Oksiiuk, O.; Dmyrieva, I. Security and Privacy Issues of Blockchain Technology. In Proceedings of the 2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET), Lviv-Slavske, Ukraine, 25–29 February 2020; pp. 1–5. [Google Scholar]
- Taylor, P.J.; Dargahi, T.; Dehghantanha, A.; Parizi, R.M.; Choo, K.-K.R. A Systematic Literature Review of Blockchain Cyber Security. Digit. Commun. Netw. 2020, 6, 147–156. [Google Scholar] [CrossRef]
- Zhang, S.; Gao, M.; Wang, L.; Xu, S.; Shao, W.; Kuang, R. A Malware-Detection Method Using Deep Learning to Fully Extract API Sequence Features. Electronics 2025, 14, 167. [Google Scholar] [CrossRef]
- Fartitchou, M.; Makkaoui, K.E.; Kannouf, N.; Allali, Z.E. Security on Blockchain Technology. In Proceedings of the 2020 3rd International Conference on Advanced Communication Technologies and Networking (CommNet), Marrakech, Morocco, 4–6 September 2020; pp. 1–7. [Google Scholar]
- Bhore, S.S.; Natraj, N.A.; Hallur, G.G. Bayesian-driven autonomous defense adaptive consensus optimisation for blockchain networks. Sci. Rep. 2025, 15, 31929. [Google Scholar] [CrossRef]
- Shokouhinejad, H.; Razavi-Far, R.; Mohammadian, H.; Rabbani, M.; Ansong, S.; Higgins, G.; Ghorbani, A.A. Recent Advances in Malware Detection: Graph Learning and Explainability. arXiv 2025, arXiv:2502.10556. [Google Scholar] [CrossRef]
- Zhao, Y.; Zhao, J.; Jiang, L.; Tan, R.; Niyato, D.; Li, Z.; Lyu, L.; Liu, Y. Privacy-Preserving Blockchain-Based Federated Learning for IoT Devices. IEEE Internet Things J. 2021, 8, 1817–1829. [Google Scholar] [CrossRef]
- Canino, A.L.; Lax, G. A Cost-Effective Solution Leveraging Public Blockchain for Massively Sharing Malware Signatures. J. Inf. Secur. Appl. 2025, 90, 104017. [Google Scholar] [CrossRef]
- Ning, W.; Zhu, Y.; Song, C.; Li, H.; Zhu, L.; Xie, J.; Chen, T.; Xu, T.; Xu, X.; Gao, J. Blockchain-Based Federated Learning: A Survey and New Perspectives. Appl. Sci. 2024, 14, 9459. [Google Scholar] [CrossRef]
- Jiang, T.; Shen, G.; Guo, C.; Cui, Y.; Xie, B. BFLS: Blockchain and Federated Learning for Sharing Threat Detection Models as Cyber Threat Intelligence. Comput. Netw. 2023, 224, 109604. [Google Scholar] [CrossRef]
- Liu, K.; Yan, Z.; Liang, X.; Kantola, R.; Hu, C. A Survey on Blockchain-Enabled Federated Learning and Its Prospects with Digital Twin. Digit. Commun. Netw. 2024, 10, 248–264. [Google Scholar] [CrossRef]
- Karame, G.; Capkun, S. Blockchain Security and Privacy. IEEE Secur. Priv. 2018, 16, 11–12. [Google Scholar] [CrossRef]
- Witt, J.; Schoop, M.; Knaus, K. Opportunities and Challenges of Blockchain Technology for Negotiation Support Systems. Group Decis. Negot. 2025, 34, 373–403. [Google Scholar] [CrossRef]
- Vaigandla, K.K.; Siluveru, M.; Kesoj, M.; Karne, R. Review on Blockchain Technology: Architecture, Characteristics, Benefits, Challenges and Applications. Mesopotamian J. Cybersecur. 2023, 2023, 73–84. [Google Scholar] [CrossRef]
- Bansal, P.; Panchal, R.; Bassi, S.; Kumar, A. Blockchain for Cybersecurity: A Comprehensive Survey. In Proceedings of the 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT), Gwalior, India, 10–12 April 2020; pp. 260–265. [Google Scholar]
- Pichikala, S.M.; Rachana, G.; Sanjanapatel, H.; Shanu, S.; Vineeth, N. Malware Detection Using Blockchain Technology. In Proceedings of the 2021 2nd International Conference for Emerging Technology (INCET), Belagavi, India, 21–23 May 2021; pp. 1–4. [Google Scholar]
- Cybenko, G.; Hallman, R. Resilient Distributed Adaptive Cyber-Defense Using Blockchain. In Game Theory and Machine Learning for Cyber Security; IEEE: Piscataway, NJ, USA, 2021; pp. 485–498. [Google Scholar]
- Gagniuc, P.A.; Păvăloiu, I.B.; Dascălu, M.I. Bloom Filters at Fifty: From Probabilistic Foundations to Modern Engineering and Applications. Algorithms 2025, 18, 767. [Google Scholar] [CrossRef]
- Wylde, V.; Rawindaran, N.; Lawrence, J.; Balasubramanian, R.; Prakash, E.; Jayal, A.; Khan, I.; Hewage, C.; Platts, J. Cybersecurity, Data Privacy and Blockchain: A Review. SN Comput. Sci. 2022, 3, 127. [Google Scholar] [CrossRef]
- Wu, Y.; Zhuang, H.; Jia, Y.; Zhang, Y. A Survey of Machine Learning Approaches for Malware Detection. In Proceedings of the 2025 5th International Conference on Computer Network Security and Software Engineering (CNSSE ’25), Qingdao China, 21–23 February 2025; Association for Computing Machinery: New York, NY, USA, 2025; pp. 269–273. [Google Scholar]
- Wang, L.; Sheng, V.S.; Düdder, B.; Wu, H.; Zhu, H. Security and Privacy Issues in Blockchain and Its Applications. IET Blockchain 2023, 3, 169–171. [Google Scholar] [CrossRef]
- Nguyen, K.; Pal, S.; Jadidi, Z.; Dorri, A.; Jurdak, R. A Blockchain-Enabled Incentivised Framework for Cyber Threat Intelligence Sharing in ICS. arXiv 2021, arXiv:2112.00262. [Google Scholar] [CrossRef]
- Atzei, N.; Bartoletti, M.; Cimoli, T. A Survey of Attacks on Ethereum Smart Contracts (SoK). In Principles of Security and Trust; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2017; Volume 10204, pp. 164–186. [Google Scholar]
- Kalra, S.; Goel, S.; Dhawan, M.; Sharma, S. ZEUS: Analyzing Safety of Smart Contracts. In Proceedings of the 2018 Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 18–21 February 2018; Internet Society: San Diego, CA, USA, 2018; pp. 1–15. [Google Scholar]
- Sameera, K.M.; Nicolazzo, S.; Arazzi, M.; Nocera, A.; Rehiman, K.A.R.; Vinod, P.; Conti, M. Privacy-Preserving in Blockchain-Based Federated Learning Systems. Comput. Commun. 2024, 222, 38–67. [Google Scholar]
- Gentry, C. Fully Homomorphic Encryption Using Ideal Lattices. In Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC ’09), Bethesda, MD, USA, 31 May–2 June 2009; ACM: New York, NY, USA, 2009; pp. 169–178. [Google Scholar]
- Yin, R.; Yan, Z.; Liang, X.; Xie, H.; Wan, Z. A Survey on Privacy Preservation Techniques for Blockchain Interoperability. J. Syst. Archit. 2023, 140, 102892. [Google Scholar] [CrossRef]
- Rawat, P.; Kumar, P. Blockchain-Based Federated Deep Learning Framework for Malware Attacks Detection in IoT Devices. In Proceedings of the 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT), Delhi, India, 6–8 July 2023; pp. 1–10. [Google Scholar]
- Zhang, X.; Miao, X.; Xue, M. A Reputation-Based Approach Using Consortium Blockchain for Cyber Threat Intelligence Sharing. Secur. Commun. Netw. 2022, 2022, 7760509. [Google Scholar] [CrossRef]
- Buterin, V.; Illum, J.; Nadler, M.; Schär, F.; Soleimani, A. Blockchain Privacy and Regulatory Compliance: Towards a Practical Equilibrium. Blockchain Res. Appl. 2024, 5, 100176. [Google Scholar] [CrossRef]
- Fu, X.; Wang, H.; Shi, P. A Survey of Blockchain Consensus Algorithms: Mechanism, Design and Applications. Sci. China Inf. Sci. 2021, 64, 121101. [Google Scholar] [CrossRef]
- Pongnumkul, S.; Siripanpornchana, C.; Thajchayapong, S. Performance Analysis of Private Blockchain Platforms in Varying Workloads. In Proceedings of the 2017 26th International Conference on Computer Communication and Networks (ICCCN), Vancouver, BC, Canada, 31 July–3 August 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 1–6. [Google Scholar]
- Gervais, A.; Karame, G.O.; Capkun, V.; Capkun, S. Is Bitcoin a Decentralized Currency? IEEE Secur. Priv. 2014, 12, 54–60. [Google Scholar] [CrossRef]
- Abdelhamid, M.; Sliman, L.; Ben Djemaa, R.; Perboli, G. A Review on Blockchain Technology, Current Challenges, and AI-Driven Solutions. ACM Comput. Surv. 2025, 57, 73. [Google Scholar] [CrossRef]
- Zafar, A. Reconciling Blockchain Technology and Data Protection Laws: Regulatory Challenges, Technical Solutions, and Practical Pathways. J. Cybersecur. 2025, 11, tyaf002. [Google Scholar] [CrossRef]
- Moore, C.; O’Neill, M.; O’Sullivan, E.; Doröz, Y.; Sunar, B. Practical Homomorphic Encryption: A Survey. In Proceedings of the 2014 IEEE International Symposium on Circuits and Systems (ISCAS), Melbourne, VIC, Australia, 1–5 June 2014; pp. 2792–2795. [Google Scholar]
- Silaghi, D.L.; Popescu, D.E. A Systematic Review of Blockchain-Based Initiatives in Comparison to Best Practices Used in Higher Education Institutions. Computers 2025, 14, 141. [Google Scholar] [CrossRef]
- Li, W.; Liu, Z.; Chen, J.; Liu, Z.; He, Q. Towards Blockchain Interoperability: A Comprehensive Survey on Cross-Chain Solutions. Blockchain Res. Appl. 2025, 6, 100286. [Google Scholar] [CrossRef]
- Deldar, F.; Abadi, M. Deep Learning for Zero-day Malware Detection and Classification: A Survey. ACM Comput. Surv. 2024, 56, 36. [Google Scholar] [CrossRef]
- Zhang, R.; Xue, R.; Liu, L. Security and Privacy on Blockchain. ACM Comput. Surv. 2019, 52, 51. [Google Scholar] [CrossRef]
- Guo, Z.; Pan, H.; He, A.; Dai, Y.; Huang, X.; Si, X.; Yuen, C.; Zhang, Y. Trusted Execution Environments for Blockchain: Toward Robust, Private, and Scalable Distributed Ledgers. IEEE Internet Things J. 2025, 12, 38736–38754. [Google Scholar] [CrossRef]
- Venkatesan, K.; Rahayu, S.B. Blockchain Security Enhancement: An Approach Towards Hybrid Consensus Algorithms and Machine Learning Techniques. Sci. Rep. 2024, 14, 1149. [Google Scholar] [CrossRef]
- Kim, E.J.; Lee, Y.K.; Lee, S.M.; Kim, J.N.; Kang, A.R.; Kim, M.S.; Jeong, Y.S. Malware Detection Using Pre-Trained Transformer Encoder with Byte Sequences. PLoS ONE 2025, 20, e0332307. [Google Scholar] [CrossRef]
- Chhetri, B.; Gopali, S.; Olapojoye, R.; Dehbash, S.; Siami Namin, A. A Survey on Blockchain-Based Federated Learning and Data Privacy. arXiv 2023, arXiv:2306.17338. [Google Scholar] [CrossRef]
- Alharthi, H.; Alshehri, S.; Kalkatawi, M. Revolutionizing IoT Security: A Blockchain and Federated Learning-Based Anomaly Detection System. In Proceedings of the 2024 7th Artificial Intelligence and Cloud Computing Conference (AICCC ’24), Tokyo Japan, 14–16 December 2024; Association for Computing Machinery: New York, NY, USA, 2025; pp. 565–572. [Google Scholar]
- Leng, J.; Zhou, M.; Zhao, J.L.; Huang, Y.; Bian, Y. Blockchain Security: A Survey of Techniques and Research Directions. IEEE Trans. Serv. Comput. 2020, 15, 2490–2510. [Google Scholar] [CrossRef]
- Akinbi, A.; MacDermott, Á.; Ismael, A.M. A Systematic Literature Review of Blockchain-Based Internet of Things (IoT) Forensic Investigation Process Models. Forensic Sci. Int. Digit. Investig. 2022, 42–43, 301470. [Google Scholar] [CrossRef]
- Șerban, R.; Vochescu, A.; Dosaru, D. Secure Computation on Sensitive Data Using Homomorphic Encryption on Ethereum Blockchain. U.P.B. Sci. Bull. Ser. C 2024, 86, 273–281. [Google Scholar]
- Zhai, P.; Zhang, L.; Zhang, Y. Internet of Things Access Control Identity Authentication Method Based on Blockchain. U.P.B. Sci. Bull. Ser. C 2025, 87, 101–115. [Google Scholar]

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Gagniuc, P.A.; Dascălu, M.-I.; Păvăloiu, I.-B. Distributed Trust in the Age of Malware Blockchain Applications. Algorithms 2026, 19, 185. https://doi.org/10.3390/a19030185
Gagniuc PA, Dascălu M-I, Păvăloiu I-B. Distributed Trust in the Age of Malware Blockchain Applications. Algorithms. 2026; 19(3):185. https://doi.org/10.3390/a19030185
Chicago/Turabian StyleGagniuc, Paul A., Maria-Iuliana Dascălu, and Ionel-Bujorel Păvăloiu. 2026. "Distributed Trust in the Age of Malware Blockchain Applications" Algorithms 19, no. 3: 185. https://doi.org/10.3390/a19030185
APA StyleGagniuc, P. A., Dascălu, M.-I., & Păvăloiu, I.-B. (2026). Distributed Trust in the Age of Malware Blockchain Applications. Algorithms, 19(3), 185. https://doi.org/10.3390/a19030185

