Unveiling Vulnerabilities in DAO: A Comprehensive Security Analysis and Protective Framework

被引:0
|
作者
Tsai, Chia-Cheng [1 ]
Lin, Cheng-Chieh [2 ]
Liao, Shih-Wei [1 ]
机构
[1] Natl Taiwan Univ, Dept Comp Sci & Informat Engn, Taipei, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan
来源
2023 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN, BLOCKCHAIN | 2023年
关键词
decentralized autonomous organization; flash; loan; governance attack;
D O I
10.1109/Blockchain60715.2023.00034
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Decentralized Autonomous Organizations (DAOs) have emerged as blockchain technology evolves beyond cryptocurrencies. Despite being the first project in this ecosystem, The l)AO encountered a significant exploit due to inadequate implementation; nevertheless, it still paved the way for future projects. While decentralized autonomous organizations continue to thrive, there is a shortage of academic papers analyzing the associated risks. Therefore, this paper aims to comprehensively examine the current vulnerabilities in these organizations by systematically analyzing past attack incidents. 54 real -world events spanning from 2016 to July 2023 have been collected for identifying and summarizing major attack vectors. The results showcase that flash loan attacks, oracle manipulation, governance takeovers, and reentrancy issues are the critical vulnerabilities within this field. For further protection, this research also provides both general and specific countermeasures against each vulnerability, serving as an evaluation framework for both existing and future projects.
引用
收藏
页码:151 / 158
页数:8
相关论文
共 50 条
  • [31] Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions
    Han, Tao
    Zhang, Ning
    Liu, Kaiming
    Tang, Bihua
    Liu, Yuan'an
    2008 FIFTH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2008, : 828 - 833
  • [32] Competition and patching of security vulnerabilities: An empirical analysis
    Arora, Ashish
    Forman, Chris
    Nandkumar, Anand
    Telang, Rahul
    INFORMATION ECONOMICS AND POLICY, 2010, 22 (02) : 164 - 177
  • [33] Analysis of Field Data on Web Security Vulnerabilities
    Fonseca, Jose
    Seixas, Nuno
    Vieira, Marco
    Madeira, Henrique
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (02) : 89 - 100
  • [34] Impact Metrics of Security Vulnerabilities: Analysis and Weighing
    Spanos, Georgios
    Angelis, Lefteris
    INFORMATION SECURITY JOURNAL, 2015, 24 (1-3): : 57 - 71
  • [35] A security feature framework for programming languages to minimize application layer vulnerabilities
    Khwaja, Amir A.
    Murtaza, Muniba
    Ahmed, Hafiz F.
    SECURITY AND PRIVACY, 2020, 3 (01):
  • [36] A framework for checking and mitigating the security vulnerabilities of cloud service RESTful APIs
    Khan, Md Shohel
    Siam, Rubaiyat Sha Fardin
    Adnan, Muhammad Abdullah
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2024,
  • [37] A comprehensive framework for inter-app ICC security analysis of Android apps
    Nirumand, Atefeh
    Zamani, Bahman
    Ladani, Behrouz Tork
    AUTOMATED SOFTWARE ENGINEERING, 2024, 31 (02)
  • [38] An analysis of security vulnerabilities in container images for scientific data analysis
    Kaur, Bhupinder
    Dugre, Mathieu
    Hanna, Aiman
    Glatard, Tristan
    GIGASCIENCE, 2021, 10 (06):
  • [39] A comprehensive framework for enhancing security in InfiniBand Architecture
    Lee, Manhee
    Kim, Eun Jung
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2007, 18 (10) : 1393 - 1406
  • [40] A Comprehensive Framework for Understanding Security Culture in Organizations
    Tolah, Alaa
    Furnell, Steven M.
    Papadaki, Maria
    INFORMATION SECURITY EDUCATION: EDUCATION IN PROACTIVE INFORMATION SECURITY, WISE 12, 2019, 557 : 143 - 156