Dissimilar Redundancy in DeFi

01/29/2022
by   Daniel Perez, et al.
0

The meteoric rise of Decentralized Finance (DeFi) has been accompanied by a plethora of frequent and often financially devastating attacks on its protocols There have been over 70 exploits of DeFi protocols, with the total of lost funds amounting to approximately 1.5bn USD. In this paper, we introduce a new approach to minimizing the frequency and severity of such attacks: dissimilar redundancy for smart contracts. In a nutshell, the idea is to implement a program logic more than once, ideally using different programming languages. Then, for each implementation, the results should match before allowing the state of the blockchain to change. This is inspired by and has clear parallels to the field of avionics, where on account of the safety-critical environment, flight control systems typically feature multiple redundant implementations. We argue that the high financial stakes in DeFi protocols merit a conceptually similar approach, and we provide a novel algorithm for implementing dissimilar redundancy for smart contracts.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/23/2019

Modeling Smart Contracts Activities: A Tensor Based Approach

Smart contracts are autonomous software executing predefined conditions....
research
05/08/2023

Capturing Smart Contract Design with DCR Graphs

Smart contracts manage blockchain assets. While smart contracts embody b...
research
11/05/2021

Disentangling Decentralized Finance (DeFi) Compositions

We present the first study on compositions of Decentralized Finance (DeF...
research
01/10/2018

Quantitative Analysis of Smart Contracts

Smart contracts are computer programs that are executed by a network of ...
research
05/28/2023

Understanding Blockchain Governance: Analyzing Decentralized Voting to Amend DeFi Smart Contracts

Smart contracts are contractual agreements between participants of a blo...
research
02/05/2021

Committee selection in DAG distributed ledgers and applications

In this paper, we propose several solutions to the committee selection p...
research
12/29/2018

Severity Level of Permissions in Role-Based Access Control

The analysis of hidden channels of information leakage with respect to r...

Please sign up or login with your details

Forgot password? Click here to reset