Smart Contract: Attacks and Protections

被引:151
作者
Sayeed, Sarwar [1 ]
Marco-Gisbert, Hector [1 ]
Caira, Tom [1 ]
机构
[1] Univ West Scotland, Sch Comp Engn & Phys Sci, Paisley PA1 2BE, Renfrew, Scotland
关键词
Smart contracts; attack techniques; DApp; Ethereum; vulnerability;
D O I
10.1109/ACCESS.2020.2970495
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart contracts are programs that reside within decentralized blockchains and are executed pursuant to triggered instructions. A smart contract acts in a similar way to a traditional agreement but negates the necessity for the involvement of a third party. Smart contracts are capable of initiating their commands automatically, thus eliminating the involvement of a regulatory body. As a consequence of blockchain's immutable feature, smart contracts are developed in a manner that is distinct from traditional software. Once deployed to the blockchain, a smart contract cannot be modified or updated for security patches, thus encouraging developers to implement strong security strategies before deployment in order to avoid potential exploitation at a later time. However, the most recent dreadful attacks and the multifarious existing vulnerabilities which result as a consequence of the absence of security patches have challenged the sustainability of this technology. Attacks such as the Decentralized Autonomous Organization (DAO) attack and the Parity Wallet hack have cost millions of dollars simply as a consequence of naive bugs in the smart contract code. In this paper, we classify blockchain exploitation techniques into 4 categories based on the attack rationale; attacking consensus protocols, bugs in the smart contract, malware running in the operating system, and fraudulent users. We then focus on smart contract vulnerabilities, analyzing the 7 most important attack techniques to determine the real impact on smart contract technology. We reveal that even adopting the 10 most widely used tools to detect smart contract vulnerabilities, these still contain known vulnerabilities, providing a dangerously false sense of security. We conclude the paper with a discussion about recommendations and future research lines to progress towards a secure smart contract solution.
引用
收藏
页码:24416 / 24427
页数:12
相关论文
共 73 条
  • [1] [Anonymous], TAINT ANAL PATTERN M
  • [2] [Anonymous], 2018, ECHIDNA SMART FUZZER
  • [3] [Anonymous], 10 BLOCKCHAIN NEW AG
  • [4] [Anonymous], CONNECTING ETHEREUM
  • [5] [Anonymous], INTR MANT SYMB AN TO
  • [6] [Anonymous], WHAT IS ETHEREUM
  • [7] [Anonymous], WHATS DIFF FRONT END
  • [8] [Anonymous], WATCH YOUR LANGUAGE
  • [9] [Anonymous], PARITY WALLET HACK 2
  • [10] [Anonymous], ICO SMART CONTRACT V