Proceedings 2021 Network and Distributed System Security Symposium 2021
DOI: 10.14722/ndss.2021.23108
|View full text |Cite
|
Sign up to set email alerts
|

As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service

Abstract: operates on a blockchain full node maintained directly by the DApp owner (i.e., an in-house RPC node) or a set of nodes hosted by a third party (i.e., a third-party RPC service) intended to ease DApp deployment. Given the ever-growing blockchain states (e.g., 130 GB and 1.8 TB for a fully synced and an archived Ethereum node, respectively, as of 2018), the RPC service plays an increasingly important role in the DApp ecosystem, scaling DApp clients to low-end mobile devices and web browsers. Major blockchains t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 23 publications
(13 citation statements)
references
References 15 publications
0
13
0
Order By: Relevance
“…Marketplace selection. In line with the previous work [70], we use DAPPRADAR [11], a popular tracker of dApps, to choose marketplaces for analysis. We initially selected 7 out of a total of 35 marketplaces (Table 1) listed in DAPPRADAR.…”
Section: Data Collectionmentioning
confidence: 99%
“…Marketplace selection. In line with the previous work [70], we use DAPPRADAR [11], a popular tracker of dApps, to choose marketplaces for analysis. We initially selected 7 out of a total of 35 marketplaces (Table 1) listed in DAPPRADAR.…”
Section: Data Collectionmentioning
confidence: 99%
“…Specifically, there may be supernodes that connect to all other nodes, "bridge" nodes that control the connection to the backend of critical services, and topology-critical nodes removing which may lead to partitioned networks. Directing denial-of-service attacks onto these critical nodes, using attack vectors recently discovered [34,35], can lead to consequences such as crippled blockchain services and the censorship of individual transactions.…”
Section: Implication To Blockchain Securitymentioning
confidence: 99%
“…A blockchain system relies on an underlying peer-to-peer (P2P) network to propagate information including recent transactions and blocks. The topology of the P2P network is foundational to the blockchain's availability under network partitions, its security against a variety of attacks (e.g., eclipsing targeted nodes [29], denial of specific node service [34,35], and deanonymization of transaction senders [20,33]), and its performance (e.g., mining power utilization [27] and the quality of RPC services [4,7,14]). Details are in § 3.…”
Section: Introductionmentioning
confidence: 99%
“…Our proof-of-concept patch is based on MetaMask in version 10.0.3 and consists of approximately 100 lines of JavaScript code. 13 Limitations: Note that we do not prevent DeFi sites from making an active effort to learn the user's real Ethereum address. The user's real address can easily be determined by taking the wallet balance and searching the blockchain for an address that has that exact balance.…”
Section: Design and Implementation Detailsmentioning
confidence: 99%
“…12 The derived address is essentially a fresh Ethereum address and therefore contains no Ether. 13 The code is available at https://github.com/brave-experiments/defi-privacy-measurements. Fig.…”
Section: Design and Implementation Detailsmentioning
confidence: 99%