A Survey of Attacks on Ethereum Smart Contracts SoK
Citations
5 citations
5 citations
5 citations
Cites background from "A Survey of Attacks on Ethereum Sma..."
...[2] have, for the first time, deeply analyzed vulnerabilities, providing a taxonomy....
[...]
...Since miners control the blocks of the blockchain, a malicious one could craft a block to bias specific values [2], [14], thus discovering the randomness and managing to manipulate events....
[...]
...2) Exceptions Disorder (ED): Exceptions can be raised in different situations, such as out-of-gas conditions, call stack limit reaching, throw clause execution [2]....
[...]
...To have a global view on the topic, before focusing on code-related vulnerabilities, we have examined several papers, among which [1], [2], [7], [8], that analyze platform-related vulnerabilities, well-known exploits (e....
[...]
...2) Blockhash Usage (BU) and Timestamp Dependency (TD) [2], [14]: these two vulnerabilities result from the usage, in critical operations, of blockhash and global timestamp variables, respectively....
[...]
5 citations
Cites background from "A Survey of Attacks on Ethereum Sma..."
...This flexibility has a drawback in that it may open the door to attacks that steal or tamper with the assets controlled by vulnerable contracts [4,21]....
[...]
5 citations
Cites background from "A Survey of Attacks on Ethereum Sma..."
...However, researchers have shown that this practice causes vulnerabilities [10, 39, 43] in smart contracts as malicious users can manipulate the source of randomness....
[...]
References
2,964 citations
2,755 citations
1,495 citations
1,258 citations
1,232 citations