Book ChapterDOI
A Survey of Attacks on Ethereum Smart Contracts SoK
Nicola Atzei,Massimo Bartoletti,Tiziana Cimoli +2 more
- Vol. 10204, pp 164-186
Reads0
Chats0
TLDR
This work analyses the security vulnerabilities of Ethereum smart contracts, providing a taxonomy of common programming pitfalls which may lead to vulnerabilities, and shows a series of attacks which exploit these vulnerabilities, allowing an adversary to steal money or cause other damage.Abstract:
Smart contracts are computer programs that can be correctly executed by a network of mutually distrusting nodes, without the need of an external trusted authority. Since smart contracts handle and transfer assets of considerable value, besides their correct execution it is also crucial that their implementation is secure against attacks which aim at stealing or tampering the assets. We study this problem in Ethereum, the most well-known and used framework for smart contracts so far. We analyse the security vulnerabilities of Ethereum smart contracts, providing a taxonomy of common programming pitfalls which may lead to vulnerabilities. We show a series of attacks which exploit these vulnerabilities, allowing an adversary to steal money or cause other damage.read more
Citations
More filters
Book ChapterDOI
Self-Reproducing Coins as Universal Turing Machine
TL;DR: In this article, the authors show that Turing-completeness of a blockchain system can be achieved through unwinding the recursive calls between multiple transactions and blocks instead of using a single one, and prove it by constructing a simple universal Turing machine using a small set of language features in the unspent transaction output (UTXO) model.
Journal ArticleDOI
Financial Crimes in Web3-Empowered Metaverse: Taxonomy, Countermeasures, and Opportunities
TL;DR: In this paper , the authors provide a comprehensive overview and taxonomy of the security risks and financial crimes that have emerged since the development of the decentralized metaverse, focusing on three issues: existing definitions, relevant cases and analysis, and existing academic research on this type of crime.
Journal ArticleDOI
SolType: refinement types for arithmetic overflow in solidity
TL;DR: SolType as mentioned in this paper is a refinement type system for Solidity that can be used to prevent arithmetic over-and under-flow in smart contracts by adding refinement type annotations and using them to prove that arithmetic operations do not lead to over- and under-flows.
Journal ArticleDOI
Toward Quantifying Decentralization of Blockchain Networks With Relay Nodes
TL;DR: This paper uses two well-known graph models of Erdös-Rény and Barabási–Albert in order to study the blockchain network topology and quantifies the decentralization degree using the clustering coefficient of the network models.
Journal ArticleDOI
Attacker Traceability on Ethereum through Graph Analysis
TL;DR: A traceability method on Ethereum, using graph analysis to track attackers, found accounts that are strongly associated with these attacks and are still active and found that some accounts can find their IP addresses.
References
More filters
Book
Isabelle/HOL: A Proof Assistant for Higher-Order Logic
TL;DR: This presentation discusses Functional Programming in HOL, which aims to provide students with an understanding of the programming language through the lens of Haskell.
Ethereum: A Secure Decentralised Generalised Transaction Ledger
TL;DR: Ethereum as mentioned in this paper is a transactional singleton machine with shared state, which can be seen as a simple application on a decentralised, but singleton, compute resource, and it provides a plurality of resources, each with a distinct state and operating code but able to interact through a message-passing framework with others.
Journal ArticleDOI
Formalizing and Securing Relationships on Public Networks
TL;DR: Protocols with application in important contracting areas, including credit, content rights management, payment systems, and contracts with bearer are discussed.
Proceedings ArticleDOI
On the Security and Performance of Proof of Work Blockchains
TL;DR: This paper introduces a novel quantitative framework to analyse the security and performance implications of various consensus and network parameters of PoW blockchains and devise optimal adversarial strategies for double-spending and selfish mining while taking into account real world constraints.
Proceedings ArticleDOI
Making Smart Contracts Smarter
TL;DR: This paper investigates the security of running smart contracts based on Ethereum in an open distributed network like those of cryptocurrencies, and proposes ways to enhance the operational semantics of Ethereum to make contracts less vulnerable.