2022
DOI: 10.1177/15501477211059945
|View full text |Cite
|
Sign up to set email alerts
|

Attack and protection schemes on fabric isomorphic crosschain systems

Abstract: Crosschain solves the problem of value transfer and asset interaction between different blockchains with different consensus mechanisms, or different infrastructures. It not only realizes the mutual communication of multiple independent blockchains, but also ensures the data consistency. However, existing crosschain technologies like notary mechanism, hash locking, distributed private key control, and sidechain/relaychain have potential vulnerabilities, resulting in different kinds of attacks. For example, som… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Attackers can repeatedly submit the same inclusion proof over and over again to try to prove a statement more than once. Numerous unbacked assets can be created, or multiple tokens can be unlocked, triggered by a single burn event [58], [76], [92], [130], [176].…”
Section: Submission Of Repeated Inclusion Proofs (mentioning
confidence: 99%
See 2 more Smart Citations
“…Attackers can repeatedly submit the same inclusion proof over and over again to try to prove a statement more than once. Numerous unbacked assets can be created, or multiple tokens can be unlocked, triggered by a single burn event [58], [76], [92], [130], [176].…”
Section: Submission Of Repeated Inclusion Proofs (mentioning
confidence: 99%
“…). Attackers might try to repeatedly submit the same inclusion proof over and over again to try to prove a statement more than once [58], [76], [92], [130], [176] -i.e., a Replay Attack. For instance, after locking an asset 𝑋 on the source chain, the attacker might present the corresponding Merkle proof multiple times to mint multiple representations of 𝑋 on the destination chain.…”
Section: Submission Of Repeated Inclusion Proofs (mentioning
confidence: 99%
See 1 more Smart Citation
“…). Attackers might try to repeatedly submit the same inclusion proof over and over again to try to prove a statement more than once [75], [89], [92], [130], [176] -i.e., a Replay Attack. For instance, after locking an asset 𝑋 on the source chain, the attacker might present the corresponding Merkle proof multiple times to mint multiple representations of 𝑋 on the destination chain.…”
Section: Submission Of Repeated Inclusion Proofs (mentioning
confidence: 99%
“…These solutions should be enforced by the overall protocol architecture -i.e., guarantee atomicity by design. It can be either enforced by decentralized watchers ( 21 ) [50], [135], centralized systems ( 8 ) [37], [72], [176], third-party networks with custom rules built-in to the consensus mechanism( 22 ) [179], or cryptographic primitives set up jointly between users and operators ( 23 ) [73], [98], [103], [105]. This vulnerability can also be inserted through a buggy smart contract implementation.…”
Section: Submission Of Repeated Inclusion Proofs (mentioning
confidence: 99%