DeepAI AI Chat
Log In Sign Up

A Survey on EOSIO Systems Security: Vulnerability, Attack, and Mitigation

by   Ningyu He, et al.
Huazhong University of Science u0026 Technology
Zhejiang University
Peking University
The Hong Kong Polytechnic University

EOSIO, as one of the most representative blockchain 3.0 platforms, involves lots of new features, e.g., delegated proof of stake consensus algorithm and updatable smart contracts, enabling a much higher transaction per second and the prosperous decentralized applications (DApps) ecosystem. According to the statistics, it has reached nearly 18 billion USD, taking the third place of the whole cryptocurrency market, following Bitcoin and Ethereum. Loopholes, however, are hiding in the shadows. EOSBet, a famous gambling DApp, was attacked twice within a month and lost more than 1 million USD. No existing work has surveyed the EOSIO from a security researcher perspective. To fill this gap, in this paper, we collected all occurred attack events against EOSIO, and systematically studied their root causes, i.e., vulnerabilities lurked in all relying components for EOSIO, as well as the corresponding attacks and mitigations. We also summarized some best practices for DApp developers, EOSIO official team, and security researchers for future directions.


page 1

page 2

page 3

page 4


A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and Defenses

The blockchain technology is believed by many to be a game changer in ma...

Bug Searching in Smart Contract

With the frantic development of smart contracts on the Ethereum platform...

Eclipsing Ethereum Peers with False Friends

Ethereum is a decentralized Blockchain system that supports the executio...

Security checklists for Ethereum smart contract development: patterns and best practices

In recent years Smart Contracts and DApps are becoming increasingly impo...

DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts

Cryptocurrency has seen an explosive growth in recent years, thanks to t...

Security Threat Mitigation For Smart Contracts: A Survey

The blockchain technology has been used for recording state transitions ...

Secure and Transparent Audit Logs with BlockAudit

Audit logs serve as a critical component in enterprise business systems ...