Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures

被引:15
|
作者
Duan, Li [1 ,2 ]
Sun, Yangyang [1 ]
Zhang, Kejia [3 ,4 ]
Ding, Yong [2 ]
机构
[1] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Trans, Beijing 100044, Peoples R China
[2] Guangxi Key Lab Cryptog & Informat Secur, Guilin, Guangxi, Peoples R China
[3] Heilongjiang Univ, Sch Math Sci, Harbin 150080, Peoples R China
[4] Heilongjiang Univ, Cryptol & Cyberspace Secur Lab, Harbin 150080, Peoples R China
基金
北京市自然科学基金; 国家重点研发计划; 中国国家自然科学基金;
关键词
Ethereum - Losses - Denial-of-service attack - Network security - Security systems;
D O I
10.1155/2022/5307697
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain technology has been widely used in digital currency, Internet of Things, and other important fields because of its decentralization, nontampering, and anonymity. The vigorous development of blockchain cannot be separated from the security guarantee. However, there are various security threats within the blockchain that have shown in the past to cause huge financial losses. This paper aims at studying the multi-level security threats existing in the Ethereum blockchain, and exploring the security protection schemes under multiple attack scenarios. There are ten attack scenarios studied in this paper, which are replay attack, short url attack, false top-up attack, transaction order dependence attack, integer overflow attack, re-entrancy attack, honeypot attack, airdrop hunting attack, writing of arbitrary storage address attack, and gas exhaustion denial of service attack. This paper also proposes protection schemes. Finally, these schemes are evaluated by experiments. Experimental results show that our approach is efficient and does not bring too much extra cost and that the time cost has doubled at most.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Visual analytics for security threats detection in Ethereum consensus layer
    Chen, Xuan
    Zhang, Xincan
    Wang, Zhaohan
    Yu, Kerun
    Kam-Kwai, Wong
    Guo, Haoyun
    Chen, Siming
    JOURNAL OF VISUALIZATION, 2024, 27 (03) : 469 - 483
  • [2] Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures
    Waheed, Nazar
    He, Xiangjian
    Ikram, Muhammad
    Usman, Muhammad
    Hashmi, Saad Sajid
    ACM COMPUTING SURVEYS, 2021, 53 (06)
  • [3] Blockchain Network Threats: The Case of PoW and Ethereum
    Shurov, Artem
    Malevanniy, Daniil
    Iakushkin, Oleg
    Korkhov, Vladimir
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2019, PT II: 19TH INTERNATIONAL CONFERENCE, SAINT PETERSBURG, RUSSIA, JULY 1-4, 2019, PROCEEDINGS, PART II, 2019, 11620 : 606 - 617
  • [4] Security threats and countermeasures of MAC layer in cognitive radio networks
    Manesh, Mohsen Riahi
    Kaabouch, Naima
    AD HOC NETWORKS, 2018, 70 : 85 - 102
  • [5] Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures
    Islam, Shama Naz
    Baig, Zubair
    Zeadally, Sherali
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (12) : 6522 - 6530
  • [6] Security threats and countermeasures in WLAN
    Nagamalai, D
    Dhinakaran, BC
    Sasikala, P
    Lee, SH
    Lee, JK
    TECHNOLOGIES FOR ADVANCED HETEROGENEOUS NETWORKS, PROCEEDINGS, 2005, 3837 : 168 - 182
  • [7] Survey on 5G Physical Layer Security Threats and Countermeasures
    Harvanek, Michal
    Bolcek, Jan
    Kufa, Jan
    Polak, Ladislav
    Simka, Marek
    Marsalek, Roman
    SENSORS, 2024, 24 (17)
  • [8] Multiple-layer MALDI
    不详
    ANALYTICAL CHEMISTRY, 2003, 75 (09) : 199A - 199A
  • [9] Detecting Blockchain Security Threats
    Putz, Benedikt
    Pernul, Guenther
    2020 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020), 2020, : 313 - 320
  • [10] Security Properties of Light Clients on the Ethereum Blockchain
    Paavolainen, Santeri
    Carr, Christopher
    IEEE ACCESS, 2020, 8 : 124339 - 124358