DeepAI
Log In Sign Up

A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and Defenses

08/13/2019
by   Huashan Chen, et al.
0

The blockchain technology is believed by many to be a game changer in many application domains, especially financial applications. While the first generation of blockchain technology (i.e., Blockchain 1.0) is almost exclusively used for cryptocurrency purposes, the second generation (i.e., Blockchain 2.0), as represented by Ethereum, is an open and decentralized platform enabling a new paradigm of computing --- Decentralized Applications (DApps) running on top of blockchains. The rich applications and semantics of DApps inevitably introduce many security vulnerabilities, which have no counterparts in pure cryptocurrency systems like Bitcoin. Since Ethereum is a new, yet complex, system, it is imperative to have a systematic and comprehensive understanding on its security from a holistic perspective, which is unavailable. To the best of our knowledge, the present survey, which can also be used as a tutorial, fills this void. In particular, we systematize three aspects of Ethereum systems security: vulnerabilities, attacks, and defenses. We draw insights into, among other things, vulnerability root causes, attack consequences, and defense capabilities, which shed light on future research directions.

READ FULL TEXT
07/19/2022

A Survey on EOSIO Systems Security: Vulnerability, Attack, and Mitigation

EOSIO, as one of the most representative blockchain 3.0 platforms, invol...
05/19/2022

Security Analysis of DeFi: Vulnerabilities, Attacks and Advances

Decentralized finance (DeFi) in Ethereum is a financial ecosystem built ...
06/23/2022

A Survey of DeFi Security: Challenges and Opportunities

Decentralized finance (DeFi), which is a promising domain since the era ...
02/13/2019

SoK: Transparent Dishonesty: front-running attacks on Blockchain

We consider front-running to be a course of action where an entity benef...
04/26/2022

The Security War in File Systems: An Empirical Study from A Vulnerability-Centric Perspective

This paper presents a systematic study on the security of modern file sy...
09/26/2020

Taxonomy of Centralization in Public Blockchain Systems: A Systematic Literature Review

Bitcoin introduced delegation of control over a monetary system from a s...
07/05/2022

Understanding blockchain: definitions, architecture, design, and system comparison

The explosive advent of the blockchain technology has led to hundreds of...