A Survey of Attacks on Ethereum Smart Contracts SoK
Citations
112 citations
Cites background or methods from "A Survey of Attacks on Ethereum Sma..."
...12) Secrecy failure (12): This vulnerability was first observed from a multi-player game in [56] and was also called keeping secrets in [12]....
[...]
...It has two variants, called gasless send and unchecked send [12], [64]....
[...]
...4) Upgradable contract (4): This vulnerability was first discussed in [12]....
[...]
...18) Type casts (18): This vulnerability was first reported in [12]....
[...]
...The contract has four vulnerabilities [12], which allowed the following four attack tactics and explains why 5, 6, 7, and 8 belong to the same type of attacks....
[...]
111 citations
Cites background from "A Survey of Attacks on Ethereum Sma..."
...While in [83], several vulnerabilities in Ethereum SC design are also analyzed....
[...]
108 citations
108 citations
Cites background from "A Survey of Attacks on Ethereum Sma..."
...[61] also explored various attacks limited to Ethereum smart contracts....
[...]
...(4) Building on top of the prior work [45], [57], [61], for each attack class, we also explore the possible defense strategies that have been proposed to harden the security of Blockchains....
[...]
107 citations
Cites background or methods from "A Survey of Attacks on Ethereum Sma..."
...For motivating the definition of single-entrancy, we introduce a class of bugs in Ethereum smart contracts called reentrancy bugs [16,14]....
[...]
...Furthermore, many smart contracts in the wild are intentionally fraudulent, as highlighted in a recent survey [14]....
[...]
References
2,964 citations
2,755 citations
1,495 citations
1,258 citations
1,232 citations