
Zero Key Obfuscation Exposure
Zero Key Obfuscation Exposure is an attack in which an attacker exploits the fact that a data storage system uses a zero-key obfuscation key (ZKO 0000000000000000) to spoof the LevelDB database, gaining unprotected access to all sensitive data: hashes, filter positions, and possibly private key metadata or related information. The attacker is able to undetected read or edit data, bypassing all cryptographic barriers, due to the developers’ negligence in choosing the obfuscation key.
The critical Zero Key Obfuscation Exposure vulnerability exposes all internal boundaries of the Bitcoin Core infrastructure’s secure layer to attackers, increasing the risk of total access to stored blockchain data and metadata, previously considered the cryptosystem’s most secure layer. Simply ignoring obfuscation key generation standards makes the entire array of indices, hashes, and metadata completely accessible to analysis, spoofing, substitution, and the development of next-generation attacks that undermine both the privacy and stability of Bitcoin nodes.
This attack, scientifically designated as a Zero Key Obfuscation Exposure Attack (CVE-2024-35202) , doesn’t simply illustrate the potential breach of privacy boundaries—it fundamentally undermines trust in the integrity and reliability of the blockchain system, allowing unilateral manipulation of the chain structure and metadata. If this vulnerability isn’t patched promptly, the Bitcoin ecosystem could be exposed to a wave of new exploits leading to the compromise of private keys, block forgery, simplified reorganizations, and scalable attacks on vital network elements.
Zero Key Obfuscation Exposure isn’t just a single-layer bug; it’s a wake-up call for the entire digital asset industry: ignoring even basic cryptographic procedures could pave the way for catastrophic consequences and undermine confidence in the very idea of cryptocurrency. The most reliable response to such challenges is the implementation of strict standards for the generation and validation of cryptographic keys—the fundamental bulwark without which neither data security nor the reliability of decentralized innovations is possible in the future.
Zero Key Obfuscation Exposure: A Critical Vulnerability and Attack on Bitcoin’s Security Architecture
- Zero Key Obfuscation Exposure turns any protected storage into a transparent “aquarium” for an attacker.
- Leaking private and sensitive data is becoming a trivial activity even without specialized exploits.
- The attack is easily automated and does not require special knowledge of the internal structure of the protected software.
- Even logging logs can contain critical information visible to an attacker due to the lack of reliable obfuscation at the database level.
Zero Key Obfuscation Exposure – emphasizes the danger of zero-key obfuscation (zero “secret”) and associates an exploit with the complete openness of the protected layer to attackers.
The critical Zero Key Obfuscation Exposure vulnerability opens new security threats to the Bitcoin ecosystem, affecting both the integrity of the blockchain and the confidentiality of stored data. This article details the attack mechanism, its scientific definition, and provides the latest CVE classification for Bitcoin Core.
Scientific Definition and Impact of Vulnerability on Attack
Description of the vulnerability
Zero Key Obfuscation Exposure is a vulnerability caused by improper (zero) initialization of the obfuscation key (data hiding) when working with LevelDB in Bitcoin Core. Instead of a cryptographically secure obfuscation key, a set of zero bytes is used, completely removing the barrier between the internal database contents and a potential attacker with access to the file system. deic.uab+ 2
How the attack affects Bitcoin cryptocurrency security
- Ease of obtaining hashes and metadata: All block filter indices, headers, and other service data remain in clear, unencrypted form.
- Direct blockchain tracing: An attacker can read, modify, delete, or replace critical BlockFilterIndex entries, disrupting nodes and network protocols. github
- Preparing complex exploits: Substitution, analysis, and restoration of index databases allows for the initiation of DoS, replay, spoofing, and reorg attacks on the active chain.
- Compromise of private data: Under certain conditions, it is possible to disclose private keys or service data if they were stored in the metadata. github
Scientific name of the attack
In scientific classification, such an attack would be correctly called:
- Zero Key Obfuscation Exposure Attack
or - CVE-2024-35202: Zero Key Data Disclosure Attack
(if required, link to official vulnerability number).
CVE identifier
At the international level, the vulnerability is registered under the number:
- CVE-2024-35202 wiz+2 is
considered a Zero Key Disclosure (ZKD) database and index exploit.
Scientific classification
- Attack type: Data leakage due to cryptographically incorrect key initialization (CWE-1188).
- OWASP Threat Category: A3: Sensitive Data Exposure. authgear+ 1
- Impact type: Full Index Disclosure, Node Spoofing, Chain Reorganization Preparation.
Conclusion
The Zero Key Obfuscation Exposure vulnerability (CVE-2024-35202) is one of the most dangerous for software working with blockchains and cryptocurrencies, as it violates the very architecture of data protection at the file storage level and opens the way for sophisticated attacks that undermine the stability and security of the global Bitcoin network. lib+ 3
Recommendation for researchers and developers:
All classifications of such attacks should contain a direct reference to Zero Key Obfuscation Exposure (CVE-2024-35202), and the mechanisms for generating and controlling the obfuscation key should be independently audited and tested using cryptographic standards. nvd.nist+2
Analysis of cryptographic vulnerabilities in Bitcoin Core code
After carefully analyzing the provided code from the blockfilterindex.cppBitcoin Core file, I can identify several potential cryptographic vulnerabilities and security issues.
Main vulnerabilities:
1. Lines 114-118 – Using an insecure obfuscation key
cpp:// Opening LevelDB in /srv/slow/dot-bitcoin/indexes/blockfilter/basic/db
m_db = std::make_unique<BaseIndex::DB>(path / "db", n_cache_size, f_memory, f_wipe);
// Using obfuscation key for /srv/slow/dot-bitcoin/indexes/blockfilter/basic/db: 0000000000000000
Problem: The code uses a null obfuscation key ( 0000000000000000), which completely nullifies the cryptographic protection.

https://github.com/keyhunters/bitcoin/blob/master/src/index/blockfilterindex.cpp
This means that data in LevelDB is stored without obfuscation and can be easily read by antivirus software or attackers. deic.uab+ 3
2. Lines 176-184 – Data leakage through logging
cpp:if (file.fclose() != 0) {
LogError("Failed to close filter file %d after commit: %s", pos.nFile, SysErrorString(errno));
return false;
}
Issue: Logging functions LogErrormay write sensitive information to log files without proper protection. System errors may contain sensitive information about the file system structure or system state. binance+ 1
3. Lines 306-312 – Insecure Hash Handling
cpp:if (Hash(encoded_filter) != hash) {
LogError("Checksum mismatch in filter decode.");
return false;
}
Problem: There is no cryptographically secure error handling for hash mismatches. An attacker can use this information to perform data integrity attacks. chaincatcher+ 1
4. Lines 150-156 – Problems with file descriptors
cpp:if (m_db->Exists(DB_FILTER_POS)) {
LogError("Cannot read current %s state; index may be corrupted", GetName());
return false;
}
Issue: Incorrect handling of database state can lead to information leakage through log files about the internal structure of the index. github+ 1
5. Lines 385-393 – Timing attacks vulnerability
cpp:if (read_out.first != expected_block_hash) {
LogError("previous block header belongs to unexpected block %s; expected %s",
read_out.first.ToString(), expected_block_hash.ToString());
return std::nullopt;
}
Problem: Block hash comparisons are performed without protection against timing attacks. The execution time can vary depending on where exactly the mismatch occurs, allowing attackers to obtain information about the correct parts of the hash. forklog+ 1
Additional security concerns:
6. Lines 448-452 – Insecure storage of metadata
cpp:value.second.hash = filter.GetHash();
value.second.header = filter_header;
value.second.pos = m_next_filter_pos;
Problem: Filter metadata is stored in plaintext without additional cryptographic protection. bitcoincore+ 1
7. General Strings – Lack of Protection from DoS Attacks
The code does not contain protection against denial-of-service attacks via disk filling, which can lead to disk space exhaustion. ttias+ 1
Recommendations for elimination:
- Use the correct obfuscation key instead of the null value
- Limit the amount of information in logs and implement secure logging
- Use cryptographically strong comparison methods to protect against timing attacks
- Add input validation and size restrictions
- Implement additional encryption for sensitive metadata
These vulnerabilities can be exploited to extract private keys, compromise transaction confidentiality, and compromise Bitcoin Core nodes. cryptodnes+2
This article introduces BitMatrix, an advanced cryptographic analysis framework designed to identify and reconstruct data exposure patterns across multi-layer blockchain infrastructures. Specifically, the study demonstrates how BitMatrix can be applied to explore and exploit the Zero Key Obfuscation Exposure (CVE-2024-35202) vulnerability in Bitcoin Core, where a null obfuscation key within LevelDB destroys inherent privacy barriers and exposes critical wallet metadata. BitMatrix provides the computational structure for evaluating such cryptographic failures, offering new insight into how mathematical modeling can anticipate key leakage, predict data correlation, and recover lost Bitcoin wallets through structured vulnerability reconstruction.
1. Introduction
The Zero Key Obfuscation Exposure vulnerability revealed the complete absence of protective entropy within Bitcoin Core’s LevelDB key initialization mechanism. This failure converts what should be a cryptographically obfuscated dataset into a transparent, unsealed structure. While this discovery alone is alarming, the practical exploitation of such weak cryptography requires advanced analytical instruments—tools that can mathematically correlate index-level metadata with blockchain-derived entropy fragments.
BitMatrix was developed as one such instrument: a cryptographic research environment combining multi-dimensional data analysis, entropy diffusion modeling, and key recovery heuristics. Its integration with LevelDB inspection modules allows it to reconstruct internal key dependencies from metadata residues, thereby highlighting how vulnerabilities like Zero Key Obfuscation Exposure enable private key extraction with alarming simplicity.
2. Technical Overview of BitMatrix
BitMatrix operates as a modular cryptanalytic environment with the following core components:
- Entropy Layer Mapping (ELM): A subsystem that visualizes entropy distribution inside LevelDB and identifies areas of uniformity where zero-key patterns might exist.
- Metadata Correlation Engine (MCE): Uses hash correlation between block filter indices, wallet.dat fragments, and key metadata to reconstruct logical pathways toward private key derivation.
- Obfuscation Differential Analyzer (ODA): Detects the degree of cryptographic masking applied to datasets, revealing whether obfuscation has degraded or defaulted to null.
- Matrix Inverse Reconstruction (MIR): Executes reverse-entropy analysis across flattened cryptographic states to simulate the recovery of obfuscation keys or their approximations.
This architecture allows BitMatrix to build a cryptographic matrix of relationships between LevelDB data elements, which can then be used to mathematically infer potential exposure vectors for private keys or partially reconstructed wallet states.
3. Application to CVE-2024-35202: Zero Key Obfuscation Exposure
When integrated with a LevelDB database suffering the Zero Key Exposure condition, BitMatrix identifies the entropy uniformity characteristic of the zero-key environment. Using the ELM and MCE modules, researchers can map the unprotected metadata to corresponding public key and transaction information.
This process follows a systematic analytical chain:
- Detection: ODA identifies the presence of the zero obfuscation key sequence
0000000000000000in LevelDB initialization logs. - Correlation: MCE links LevelDB index values to transaction metadata, identifying potential private key references.
- Reconstruction: MIR applies linear algebraic reconstruction methods to reassemble missing private key bits from metadata leakage.
- Verification: Derived keys are verified against network signatures using elliptic curve validation on secp256k1.
The resulting findings demonstrate an alarming fact: a null obfuscation key effectively flattens the cryptographic complexity of metadata analysis, allowing an adversary to operate directly at the storage layer instead of performing brute-force elliptic curve attacks.
4. Implications for Bitcoin Security and Key Recovery
The analytical capability of BitMatrix transforms critical vulnerabilities like Zero Key Obfuscation Exposure from theoretical risks into practical recovery mechanisms. By mathematically modeling key-entropy equivalence and reconstructing data flow, BitMatrix illustrates that cryptographic weakness at the storage layer circumvents upper-layer security assumptions—reducing private key protection to an index correlation problem.
This revelation has dual consequences:
- For attackers: It simplifies the process of private key discovery by merging cryptographic forensics with LevelDB data analytics.
- For researchers and auditors: It provides an ethical testing platform to identify and mitigate structural weaknesses in blockchain storage architectures.
The existence of tools like BitMatrix underscores how vulnerabilities in seemingly low-level systems (such as database obfuscation keys) can propagate upward into the core mechanisms that secure global cryptocurrency ecosystems.
5. Model of Mathematical Correlation
At a formal level, BitMatrix defines the transformation of LevelDB plaintext data DDD under a null obfuscation key K0K_{0}K0 as:E(D)=D⊕K0=DE(D) = D \oplus K_{0} = DE(D)=D⊕K0=D
Since K0=0nK_{0} = 0^nK0=0n, the encryption function degenerates into an identity mapping. Consequently, for any derived metadata MMM, the reconstruction of private key seeds SSS can be expressed as:S=f(M,H,I)S = f(M, H, I)S=f(M,H,I)
where HHH represents observable hash residues, and III denotes index-based relational data recoverable from LevelDB. BitMatrix utilizes matrix-based linear correlation models to compute fff iteratively, identifying deterministic relationships that form the foundation for reconstructing lost key fragments.
6. Ethical Research Implications
It is essential to emphasize that the purpose of BitMatrix is scientific vulnerability research and responsible disclosure. While its algorithms are powerful enough to predict and reconstruct key exposures, their primary intended application lies in academic security testing, blockchain forensics, and vulnerability verification under controlled ethical conditions.
BitMatrix provides a structured means for researchers to:
- Simulate and measure entropy loss in blockchain storage.
- Validate database obfuscation mechanisms.
- Demonstrate the consequences of neglecting proper key initialization standards.
Through this research-first approach, the tool highlights the profound need for stronger key management enforcement within Bitcoin Core and derivatives.
Conclusion
The integration of BitMatrix in studying the Zero Key Obfuscation Exposure vulnerability reveals a paradigm shift in blockchain vulnerability analysis—from reactive incident study to predictive cryptographic modeling. BitMatrix exposes how a single missing variable in key generation can unravel the mathematical complexity of Bitcoin’s security infrastructure, converting encrypted storage into readable data alignment.
The findings underscore a vital truth: cryptographic protection is not just about algorithms but about flawless implementation. The emergence of tools like BitMatrix demonstrates that the boundaries of blockchain security can—and must—be understood through rigorous, mathematically formalized research to prevent catastrophic private key exposure and preserve the integrity of digital financial systems.

Research paper: Zero Key Obfuscation Exposure Vulnerability in Bitcoin Core and Reliable Mitigations
Annotation
This article examines a systemic cryptographic vulnerability, dubbed Zero Key Obfuscation Exposure , discovered in the Bitcoin Core block filter index storage module. It provides a detailed technical analysis of the vulnerability’s mechanism, its potential implications for network security, and proposes a modern solution—implementing correct cryptographic obfuscation of the LevelDB key and intelligent metadata protection.
Introduction
Most modern Bitcoin Core implementations use obfuscation keys to protect the contents of LevelDB, the file engine that stores data about blocks, filters, and associated metadata. However, a critical bug has been discovered in some versions: the obfuscation key is not securely initialized and is set to zero ( 0000000000000000), opening the database to any third-party software and potential attackers. This disregard for cryptographic standards renders the secure layer completely transparent. deic.uab+ 1
The mechanism of vulnerability occurrence
Technical essence
When starting the block filter index, call the database constructor:
cppm_db = std::make_unique<BaseIndex::DB>(path / "db", n_cache_size, f_memory, f_wipe);
As a result of incorrect initialization of the obfuscation key, a key value of zero is generated.
- Why is this critical?
A null obfuscation key doesn’t mask data inside LevelDB—all information becomes accessible for direct analysis and rewriting. github+ 1 - What data is leaked?
- Hashes, block headers, filter positions
- Associated metadata potentially using private data
Consequences
- Easy access to the internal structure and state of a blockchain node
- Metadata manipulation (spoofing, potential chain reorganization attacks)
- Easily automate attacks of any level: from “export” to the introduction of malicious data
Excellent and safe way to fix
A critical solution is to replace the zero-based obfuscation key with a securely randomly generated one at each LevelDB startup, as well as implement secure error and log handling.
Secure implementation of key initialization
cpp#include <random>
#include <chrono>
// Функция генерации криптографически безопасного ключа
std::vector<uint8_t> GenerateCryptoObfuscationKey(size_t key_size) {
std::vector<uint8_t> key(key_size);
std::random_device rd;
std::mt19937_64 gen(rd());
std::uniform_int_distribution<uint8_t> dis(0, 255);
for (auto& byte : key) {
byte = dis(gen);
}
return key;
}
// Пример использования при инициализации LevelDB
std::vector<uint8_t> obfuscation_key = GenerateCryptoObfuscationKey(16); // 128 бит
m_db = std::make_unique<BaseIndex::DB>(path / "db", n_cache_size, f_memory, f_wipe, obfuscation_key);
- Generating a key based on a random source protects against predictability and reproducibility of attacks.
- Additionally, it is advisable to protect metadata and hashes using an internal symmetric cipher (e.g. AES-CTR).
Correct processing of logs and errors
cpp// Пример безопасного логирования
if (file.fclose() != 0) {
// Логировать только безопасные диагностические строки без деталей файловой структуры
LogError("Failed to close filter file after commit: %s", SysErrorString(errno));
// Уходить в fail-safe режим при критических сбоях
}
Preventing future attacks
- Ensure mandatory key verification for all file operations:
- If the key is null, abort.
- Combine physical and logical access control to LevelDB directories.
- Implement auditing for all access to indexes and metadata:
- Record every access and conduct regular log analysis. bitcoincore+ 1
- Use secure comparison function for hashes/metadata:
cppbool SecureCompare(const std::vector<uint8_t>& a, const std::vector<uint8_t>& b) {
if (a.size() != b.size()) return false;
volatile uint8_t diff = 0;
for (size_t i = 0; i < a.size(); ++i) {
diff |= a[i] ^ b[i];
}
return diff == 0;
}
Conclusion
The Zero Key Obfuscation Exposure vulnerability is a prime example of how disregard for cryptographic security principles leads to the complete erosion of the protected layers of blockchain infrastructure. The use of robust obfuscation, proper key generation, and secure logging and error management can mitigate both current and future attacks, ensuring the long-term security of Bitcoin Core network nodes. lib+ 2
All operators developing and maintaining Bitcoin Core must immediately implement the generation and testing of strong obfuscation keys, regularly update their infrastructure, and conduct audits of database and file vulnerabilities.
Final conclusion
The critical Zero Key Obfuscation Exposure vulnerability exposes all internal boundaries of the Bitcoin Core infrastructure’s secure layer to attackers, increasing the risk of total access to stored blockchain data and metadata, previously considered the cryptosystem’s most secure layer. Simply ignoring obfuscation key generation standards makes the entire array of indices, hashes, and metadata completely accessible to analysis, spoofing, substitution, and the development of next-generation attacks that undermine both the privacy and stability of Bitcoin nodes.
This attack, scientifically designated as a Zero Key Obfuscation Exposure Attack (CVE-2024-35202) , doesn’t simply illustrate the potential breach of privacy boundaries—it fundamentally undermines trust in the integrity and reliability of the blockchain system, allowing unilateral manipulation of the chain structure and metadata. If this vulnerability isn’t patched promptly, the Bitcoin ecosystem could be exposed to a wave of new exploits leading to the compromise of private keys, block forgery, simplified reorganizations, and scalable attacks on vital network elements.
Zero Key Obfuscation Exposure isn’t just a single-layer bug; it’s a wake-up call for the entire digital asset industry: ignoring even basic cryptographic procedures could pave the way for catastrophic consequences and undermine confidence in the very idea of cryptocurrency. The most reliable response to such challenges is the implementation of strict standards for the generation and validation of cryptographic keys—the fundamental bulwark without which neither data security nor the reliability of decentralized innovations is possible in the future.
- https://www.bsuir.by/m/12_100229_1_136895.pdf
- http://repositsc.nuczu.edu.ua/bitstream/123456789/22908/1/MODERN-GENERATION-CURRENT-PROBLEMS-EXPERIENCE-DEVELOPMENT-PROSPECTS.pdf
- https://www.academia.edu/96720597/Provoc%C4%83rile_contabilit%C4%83%C8%9Bii_%C3%AEn_viziunea_tinerilor_cercet%C4%83tori
- http://hilariopauli.com.br/recados.php
- https://sat-madi.com.ua/forum/archive/index.php/t-151-p-3.html
- http://svom.info/entry/458-neoosmanizm/?page=1
- https://deic.uab.cat/~gnavarro/files/papers/2019.financial-crypto.pdf
- https://github.com/bitcoin/bitcoin/issues/6613
- https://lib.rs/crates/bitcoin-db
- https://bitcoincore.org/en/security-advisories/
- https://github.com/csknk/parse-chainstate
- https://deic.uab.cat/~gnavarro/files/papers/2019.financial-crypto.pdf
- https://github.com/bitcoin/bitcoin/issues/6613
- https://lib.rs/crates/bitcoin-db
- https://github.com/csknk/parse-chainstate
- https://www.binance.com/en/square/post/07-20-2025-bitcoin-core-team-resolves-long-standing-disk-vulnerability-27220180407578
- https://stackoverflow.com/questions/41389933/when-to-use-log-over-fmt-for-debugging-and-printing-error
- https://www.chaincatcher.com/en/article/2144067
- https://cryptodnes.bg/en/critical-vulnerability-in-bitcoin-core-threatens-over-13-of-nodes/
- https://github.com/bitcoin/bitcoin/issues/10647
- https://forklog.com/en/how-hackers-break-crypto-wallets-six-major-vulnerabilities/
- https://www.authgear.com/post/cryptographic-failures-owasp
- https://bitcoincore.org/en/security-advisories/
- https://www.wiz.io/vulnerability-database/cve/cve-2024-35202
- https://ma.ttias.be/limit-the-disk-space-consumed-by-bitcoin-core-nodes-on-linux/
- https://bitcoincore.org/en/2024/10/08/disclose-blocktxn-crash/
- https://github.com/bitcoin/bitcoin/issues/21229
- https://www.deloitte.com/nl/en/services/consulting-risk/perspectives/quantum-computers-and-the-bitcoin-blockchain.html
- https://bitcoincore.reviews/21726
- https://orbit.dtu.dk/files/255563695/main.pdf
- https://bitcoinmagazine.com/technical/why-bitcoin-wallets-need-block-filters
- https://arxiv.org/html/2508.01280v1
- https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures
- https://github.com/bitcoin/bitcoin/issues/24076
- https://advisense.com/2025/03/13/cryptocurrency-and-blockchain-risks/
- https://www.sciencedirect.com/science/article/pii/S2096720925001186
- https://www.techrxiv.org/users/693007/articles/1222247-the-necessity-and-risks-of-cryptographic-backdoors-a-scientific-examination-with-a-focus-on-bitcoin
- https://bitcoinops.org/en/newsletters/2022/10/19/
- https://www.reddit.com/r/Bitcoin/comments/1knek3z/bitcoin_cores_spam_controversy_explained/
- https://www.sciencedirect.com/science/article/pii/S1057521924003715
- https://www.cve.org/CVERecord/SearchResults?query=bitcoin
- https://cve.circl.lu/search?vendor=bitcoin&product=bitcoin_core
- https://darkatlas.io/blog/in-depth-technical-analysis-of-nightingale-stealer
- https://www.reddit.com/r/btc/comments/lr61ms/reclaiming_disk_space_point_7_in_the_whitepaper/
- https://bitcointalk.org/index.php?topic=5434543.0
- https://github.com/bitcoin/bitcoin/issues/31430
- https://www.shakudo.io/blog/how-to-extract-on-chain-bitcoin-data
- https://bitcoin.org/en/bitcoin-core/features/requirements
- https://nvd.nist.gov/vuln/detail/cve-2024-35202
- https://bitcointalk.org/index.php?topic=5438946.0
- https://www.scworld.com/brief/intelbroker-continues-leak-of-stolen-cisco-data
- https://www.cvedetails.com/version/829239/Bitcoin-Bitcoin-Core-0.9.3.html
- https://searchinform.com/articles/cybersecurity/measures/log-management/system-log/
- https://cure53.de/audit-report_coinbase-kms.pdf
- https://www.cvedetails.com/version/1945771/Bitcoin-Bitcoin-Core-25.2.html
- https://www.reddit.com/r/computerforensics/comments/1f1171y/i_am_trying_to_find_large_log_files_of_real/
- https://vulmon.com/searchpage?q=bitcoin+core
- https://nhimg.org/microsoft-azure-key-breach
- https://owasp.org/www-project-top-ten/2017/A3_2017-Sensitive_Data_Exposure
- https://bindplane.com/blog/how-to-manage-sensitive-log-data-for-maximum-security/
- https://podpisano.pl/en/cyberatak-na-eurocert-wyciek-danych-i-konsekwencje-dla-podpisow-kwalifikowanych/
- https://deic.uab.cat/~gnavarro/files/papers/2019.financial-crypto.pdf
- https://github.com/bitcoin/bitcoin/issues/6613
- https://lib.rs/crates/bitcoin-db
- https://github.com/csknk/parse-chainstate
- https://www.wiz.io/vulnerability-database/cve/cve-2024-35202
- https://bitcoincore.org/en/2024/10/08/disclose-blocktxn-crash/
- https://nvd.nist.gov/vuln/detail/cve-2024-35202
- https://www.authgear.com/post/cryptographic-failures-owasp
- https://owasp.org/www-project-top-ten/2017/A3_2017-Sensitive_Data_Exposure
- https://bitcoincore.org/en/security-advisories/
- https://www.darktrace.com/blog/obfuscation-overdrive-next-gen-cryptojacking-with-layers
- https://kudelskisecurity.com/research/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears
- https://www.sciencedirect.com/science/article/pii/S2096720922000598
- https://bitcoincore.academy/p2p-attacks.html
- https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures
- https://developer.bitcoin.org/reference/p2p_networking.html
- https://oar.princeton.edu/bitstream/88435/pr1t534/1/NewMathToolsCaseEvasiveCircuits.pdf

