SoK: Cryptocurrency Wallets – A Security Review and Classification based on Authentication Factors A Comprehensive Study of Exploitable Patterns in Smart Contracts: From Vulnerability to Defense