2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and I 2018
DOI: 10.1109/cybermatics_2018.2018.00222
|View full text |Cite
|
Sign up to set email alerts
|

Rethinking Blockchain Security: Position Paper

Abstract: Blockchain technology has become almost as famous for incidents involving security breaches as for its innovative potential. We shed light on the prevalence and nature of these incidents through a database structured using the STIX format. Apart from OPSEC-related incidents, we find that the nature of many incidents is specific to blockchain technology. Two categories stand out: smart contracts, and techno-economic protocol incentives. For smart contracts, we propose to use recent advances in software testing … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(23 citation statements)
references
References 29 publications
0
23
0
Order By: Relevance
“…Ethernaut [41] is a wargame focused on Ethereum smart contract vulnerabilities in Solidity. There are several good articles discussing blockchain security [2,17,46] as well.…”
Section: Education and Further Readingmentioning
confidence: 99%
“…Ethernaut [41] is a wargame focused on Ethereum smart contract vulnerabilities in Solidity. There are several good articles discussing blockchain security [2,17,46] as well.…”
Section: Education and Further Readingmentioning
confidence: 99%
“…There are ways to identify and prevent vulnerabilities. The most common among those are making sure issues and solutions are documented, fuzzing the inputs to make sure vulnerability does not exist, mutating the contracts to make sure prevention is sufficient for the test cases and replicating the tests from similar contracts in the same blockchain [187]..…”
Section: State Of the Body Of Knowledgementioning
confidence: 99%
“…Smart contracts related attacks are mainly in the second category. A smart contact related incident is a result of deployment and execution of a smart contact that contains vulnerabilities [187].…”
Section: Attacks: Motivation and Significancementioning
confidence: 99%
“…15,18 Although pessimistic, the scenario in which adversaries sustain an attack despite suffering losses on their own stake gains credence in the presence of potential out-of-protocol profits. Further, consensus mechanisms that rely on PoS selection are vulnerable to flash or blindsiding attacks conducted by entering nodes 57,58 or to accidental faults such as network latency, bad connectivity, or simple negligence. Weighted voting provides lines of defense (in an obvious way) against these kinds of attacks or faults while retaining the benefits of the underlying PoS design.…”
Section: Defense Against Known Attacksmentioning
confidence: 99%