A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and Defenses

08/13/2019
by   Huashan Chen, et al.
0

The blockchain technology is believed by many to be a game changer in many application domains, especially financial applications. While the first generation of blockchain technology (i.e., Blockchain 1.0) is almost exclusively used for cryptocurrency purposes, the second generation (i.e., Blockchain 2.0), as represented by Ethereum, is an open and decentralized platform enabling a new paradigm of computing --- Decentralized Applications (DApps) running on top of blockchains. The rich applications and semantics of DApps inevitably introduce many security vulnerabilities, which have no counterparts in pure cryptocurrency systems like Bitcoin. Since Ethereum is a new, yet complex, system, it is imperative to have a systematic and comprehensive understanding on its security from a holistic perspective, which is unavailable. To the best of our knowledge, the present survey, which can also be used as a tutorial, fills this void. In particular, we systematize three aspects of Ethereum systems security: vulnerabilities, attacks, and defenses. We draw insights into, among other things, vulnerability root causes, attack consequences, and defense capabilities, which shed light on future research directions.

READ FULL TEXT
research
07/19/2022

A Survey on EOSIO Systems Security: Vulnerability, Attack, and Mitigation

EOSIO, as one of the most representative blockchain 3.0 platforms, invol...
research
05/19/2022

Security Analysis of DeFi: Vulnerabilities, Attacks and Advances

Decentralized finance (DeFi) in Ethereum is a financial ecosystem built ...
research
06/23/2022

A Survey of DeFi Security: Challenges and Opportunities

Decentralized finance (DeFi), which is a promising domain since the era ...
research
02/13/2019

SoK: Transparent Dishonesty: front-running attacks on Blockchain

We consider front-running to be a course of action where an entity benef...
research
09/21/2023

Towards the Comprehensive Understanding of Mempool DoS Security in Ethereum (Work in Progress)

While awareness has been recently raised on Ethereum mempool security, t...
research
04/26/2022

The Security War in File Systems: An Empirical Study from A Vulnerability-Centric Perspective

This paper presents a systematic study on the security of modern file sy...
research
09/26/2020

Taxonomy of Centralization in Public Blockchain Systems: A Systematic Literature Review

Bitcoin introduced delegation of control over a monetary system from a s...

Please sign up or login with your details

Forgot password? Click here to reset