Unveiling Vulnerabilities in DAO: A Comprehensive Security Analysis and Protective Framework

被引:0
|
作者
Tsai, Chia-Cheng [1 ]
Lin, Cheng-Chieh [2 ]
Liao, Shih-Wei [1 ]
机构
[1] Natl Taiwan Univ, Dept Comp Sci & Informat Engn, Taipei, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan
来源
2023 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN, BLOCKCHAIN | 2023年
关键词
decentralized autonomous organization; flash; loan; governance attack;
D O I
10.1109/Blockchain60715.2023.00034
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Decentralized Autonomous Organizations (DAOs) have emerged as blockchain technology evolves beyond cryptocurrencies. Despite being the first project in this ecosystem, The l)AO encountered a significant exploit due to inadequate implementation; nevertheless, it still paved the way for future projects. While decentralized autonomous organizations continue to thrive, there is a shortage of academic papers analyzing the associated risks. Therefore, this paper aims to comprehensively examine the current vulnerabilities in these organizations by systematically analyzing past attack incidents. 54 real -world events spanning from 2016 to July 2023 have been collected for identifying and summarizing major attack vectors. The results showcase that flash loan attacks, oracle manipulation, governance takeovers, and reentrancy issues are the critical vulnerabilities within this field. For further protection, this research also provides both general and specific countermeasures against each vulnerability, serving as an evaluation framework for both existing and future projects.
引用
收藏
页码:151 / 158
页数:8
相关论文
共 50 条
  • [41] A Comprehensive Security Framework Proposal to Contribute to Sustainability
    Espinosa Garcia, Javier
    Hernandez Encinas, Luis
    Peinado Dominguez, Alberto
    SUSTAINABILITY, 2021, 13 (12)
  • [42] IoT Security A Comprehensive Life Cycle Framework
    Bertino, Elisa
    2019 IEEE 5TH INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2019), 2019, : 196 - 203
  • [43] Security vulnerabilities: From analysis to detection and masking techniques
    Chen, S
    Xu, J
    Kalbarczyk, Z
    Iyer, RK
    PROCEEDINGS OF THE IEEE, 2006, 94 (02) : 407 - 418
  • [44] An analysis of the Security Threats and Vulnerabilities of Cloud Computing in Oman
    AlZadjali, Amira M.
    Al-Badi, Ali H.
    Ali, Saqib
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 423 - 428
  • [45] Uncovering security vulnerabilities through multiplatform malware analysis
    Mohammadi, R.
    Hosseini, M. M.
    Bahrami, R.
    SECURITY AND PRIVACY, 2025, 8 (01):
  • [46] Analysis of Common Vulnerabilities and Exposures to Produce Security Trends
    Santiago, Norman
    Mendez, Janelli
    PROCEEDINGS OF THE 2022 INTERNATIONAL CONFERENCE ON CYBER SECURITY, CSW 2022, 2022, : 16 - 19
  • [47] Security analysis of vulnerabilities and threats for medical information systems
    Ju, Tea Kyung
    Hong, Chong Min
    Shin, Weon
    ICIC Express Letters, 2015, 9 (03): : 849 - 854
  • [48] A software security assessment system based on analysis of vulnerabilities
    Sui, Chenmeng
    Liu, Yanzhao
    Liu, Yun
    Journal of Convergence Information Technology, 2012, 7 (06) : 211 - 219
  • [49] Security vulnerabilities in healthcare: an analysis of medical devices and software
    Carlos M. Mejía-Granda
    José L. Fernández-Alemán
    Juan M. Carrillo-de-Gea
    José A. García-Berná
    Medical & Biological Engineering & Computing, 2024, 62 : 257 - 273
  • [50] Analysis of Security Features in DLMS/COSEM: Vulnerabilities and Countermeasures
    Luering, Norman
    Szameitat, Daniel
    Hoffmann, Stefan
    Bumiller, Gerd
    2018 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2018,