On Blockchain Security and Relevant Attacks

被引:0
作者
Moubarak, Joanna [1 ]
Filiol, Eric [2 ]
Chamoun, Maroun [1 ]
机构
[1] USJ, CIMTI, ESIB, Beirut, Lebanon
[2] ESIEA, Lab C V, Laval, France
来源
2018 IEEE MIDDLE EAST AND NORTH AFRICA COMMUNICATIONS CONFERENCE (MENACOMM) | 2018年
关键词
Blockchain; Security; Bitcoin; Ethereum; Hyperledger; DLT; Attack;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The blockchain technology witnessed a wide adoption and a swift growth in recent years. This ingenious distributed peer-to-peer design attracted several businesses and solicited several communities beyond the financial market. There are also multiple use cases built around its ecosystem. However, this backbone introduced a lot of speculation and has been criticized by several researchers. Moreover, the lack of legislations perceived a lot of attention. In this paper, we are concerned in analyzing blockchain networks and their development, focusing on their security challenges. We took a holistic approach to cover the involved mechanisms and the limitations of Bitcoin, Ethereum and Hyperledger networks. We expose also numerous possible attacks and assess some countermeasures to dissuade vulnerabilities on the network. For occasion, we simulated the majority and the re-entrancy attacks. The purpose of this paper is to evaluate Blockchain security summarizing its current state. Thoroughly showing threatening flaws, we are not concerned with favoring any particular blockchain network.
引用
收藏
页码:7 / 12
页数:6
相关论文
共 32 条
[1]  
[Anonymous], 2016, GitHub
[2]  
[Anonymous], 2017, BITCOIN SPAM ATTACK
[3]  
[Anonymous], 2008, HIST OF BITCOIN
[4]  
[Anonymous], 2017, DISTRIBUTED LEDGER T
[5]   A Survey of Attacks on Ethereum Smart Contracts (SoK) [J].
Atzei, Nicola ;
Bartoletti, Massimo ;
Cimoli, Tiziana .
PRINCIPLES OF SECURITY AND TRUST (POST 2017), 2017, 10204 :164-186
[6]  
Bahga Arshdeep., 2017, Blockchain applications: a hands-on approach
[7]  
Barber S., 2012, Financial Cryptography and Data Security, 16th international conference, P399, DOI DOI 10.1007/978-3-642-32946-3_29
[8]  
Brewer Eric A., 2000, Towards Robust Distributed Systems (Invited Talk), V7
[9]  
Buterin V., 2014, CISC VIS NETW IND GL, V3, P2, DOI [10.5663/aps.v1i1.10138, DOI 10.5663/APS.V1I1.10138]
[10]  
Butterin V., ZK SNARKS HOOD