Unveiling Vulnerabilities in DAO: A Comprehensive Security Analysis and Protective Framework

被引:0
|
作者
Tsai, Chia-Cheng [1 ]
Lin, Cheng-Chieh [2 ]
Liao, Shih-Wei [1 ]
机构
[1] Natl Taiwan Univ, Dept Comp Sci & Informat Engn, Taipei, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan
关键词
decentralized autonomous organization; flash; loan; governance attack;
D O I
10.1109/Blockchain60715.2023.00034
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Decentralized Autonomous Organizations (DAOs) have emerged as blockchain technology evolves beyond cryptocurrencies. Despite being the first project in this ecosystem, The l)AO encountered a significant exploit due to inadequate implementation; nevertheless, it still paved the way for future projects. While decentralized autonomous organizations continue to thrive, there is a shortage of academic papers analyzing the associated risks. Therefore, this paper aims to comprehensively examine the current vulnerabilities in these organizations by systematically analyzing past attack incidents. 54 real -world events spanning from 2016 to July 2023 have been collected for identifying and summarizing major attack vectors. The results showcase that flash loan attacks, oracle manipulation, governance takeovers, and reentrancy issues are the critical vulnerabilities within this field. For further protection, this research also provides both general and specific countermeasures against each vulnerability, serving as an evaluation framework for both existing and future projects.
引用
收藏
页码:151 / 158
页数:8
相关论文
共 50 条
  • [1] Unveiling the Security Vulnerabilities in Android Operating System
    Renjith, G.
    Aji, S.
    PROCEEDINGS OF SECOND INTERNATIONAL CONFERENCE ON SUSTAINABLE EXPERT SYSTEMS (ICSES 2021), 2022, 351 : 89 - 100
  • [2] Performance Analysis of Security Requirements Engineering Framework by Measuring the Vulnerabilities
    Prabhakaran, Salini
    Selvadurai, Kanmani
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (03) : 435 - 444
  • [3] A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
    Saadi, Zena Mohammad
    Sadiq, Ahmed T.
    Akif, Omar Z.
    Farhan, Alaa K.
    ELECTRONICS, 2024, 13 (15)
  • [4] Analysis of Security Vulnerabilities and Countermeasures
    Son, Hyun-Min
    Joo, Nak-Keun
    Choi, Hyun-Taek
    Lee, Hyun-Cheol
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (02): : 200 - 206
  • [5] An analysis of Bluetooth security vulnerabilities
    Hager, CT
    Midkiff, SF
    WCNC 2003: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1-3, 2003, : 1825 - 1831
  • [6] LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks
    Ullah, Saad
    Han, Mingji
    Pujar, Saurabh
    Pearce, Hammond
    Coskun, Ayse
    Stringhini, Gianluca
    45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 862 - 880
  • [7] Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities
    Bhardwaj, Akashdeep
    Bharany, Salil
    Abulfaraj, Anas W.
    Ibrahim, Ashraf Osman
    Nagmeldin, Wamda
    EGYPTIAN INFORMATICS JOURNAL, 2024, 25
  • [8] Unveiling dimensions of social security research: a comprehensive bibliometric analysis and collaborative landscape
    Rahimi, Mohammad
    Moshiri, Hossein
    Otarkhani, Ali
    GLOBAL KNOWLEDGE MEMORY AND COMMUNICATION, 2024,
  • [9] Energy security through a framework of country risks and vulnerabilities
    Krishnan, R.
    ENERGY SOURCES PART B-ECONOMICS PLANNING AND POLICY, 2016, 11 (01) : 32 - 37
  • [10] A practical framework for dynamically immunizing software security vulnerabilities
    Lin, Zhiqiang
    Mao, Bing
    Xie, Li
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 348 - +