• Vandal [75]
  • MadMax [101]
  • Osiris [102] Symbolic execution Integer Bugs: truncation bugs, arithmetic bugs, and signing-related bugs 1.2 million 42,108 E
  • A survey on Blockchain Technology and its




    Download 0,66 Mb.
    Pdf ko'rish
    bet15/28
    Sana18.12.2023
    Hajmi0,66 Mb.
    #122650
    1   ...   11   12   13   14   15   16   17   18   ...   28
    Bog'liq
    Huaqun Xingjie - A Survey on blockchain Technology and its Security - 2022 March

    Securify 
    [94] 
    Data-flow 
    analysis 
    Ether Liquidity, Unrestricted Write, No 
    Writes After Calls, Restricted Transfer, 
    Mishandled Exception, Transaction 
    Ordering Dependency, Unexpected 
    Arguments 
    Ethereum 
    Virtual 
    Machine 
    (EVM):
    24, 594; 
    Solidity 
    dataset: 100 
    6.50% 
    Explore all contract 
    behaviours 
    Vandal [75] 
    Abstract 
    interpretation 
    Reentrancy, Unsecured Balance, Use of 
    ORIGIN, Destroyable Contract, Unchecked 
    Send 
    141,000 
    Have, but no 
    given 
    number 
    Convert bytecode to 
    semantic logic 
    relation 
    MadMax 
    [101] 
    Abstract 
    interpretation 
    Unbounded Mass Operations, Integer 
    Overflows, Non-Isolated External Calls in 
    Wallet Griefing, Incentive attacks 
    6.33 million 
    5.42% 
    A tool to find gas-
    based vulnerabilities 
    Osiris 
    [102]
    Symbolic 
    execution 
    Integer Bugs: truncation bugs, 
    arithmetic bugs, and signing-related 
    bugs
    1.2 million
    42,108
    E
    TH
    BMC 
    [98] 
    Symbolic 
    execution 
    Extract Ether, Redirect Control Flow, Self-
    destruct Contract, Parity Vulnerability, 
    more exploits
    roughly 2.2 
    million 
    5,905 
    More precisely 
    reasoning of EVM 
    internals 
    F. Privacy Preserving 
    In 2016 Hawk was developed to protect the privacy of 
    transactions without storing the clear text on the Blockchain 
    via a private smart contract [124]. In 2018 Obscuro was 
    presented to provide a secure and efficient Bitcoin mixer so 
    that payers and payees could not be linked together to achieve 
    anonymous payments [125]. In 2019 Ouroboros Crypsinous 
    was described to analyze the privacy-preserving PoS protocol 
    [126], and BITE was developed to enable the privacy 
    preserving requests from light clients [127]. In 2020 Zexe was 
    demonstrated to achieve privacy-preserving analogues of 
    some popular applications [128]. In 2020 remote side-channel 
    attacks were presented on receiver privacy [129]. 
    G. Monitor and Regulations agaist Hackers’ Wallets 
    Cryptocurrency exchange platforms may lock any funds 
    that were from the hacked wallet. New regulations of anti-
    money laundering (AML) are enforced to make difficulties to 
    hackers to move the funds [130]. 
    Journal Pre-proof


    H. Hard Fork 
    To respond the hacking of the DAO, Ethereum was 
    divided into Ethereum Classic and the new Ethereum. As a 
    hard fork from the original software, the new Ethereum can 
    protect against further malware attacks. Ethereum Classic has 
    tokens called ETC while the new Ethereum has tokens called 
    ETH. Both the new Ethereum and Ethereum Classic have a 
    common ancestry prior to Block 1,920,000.
    VII. 
    C
    HALLENGES AND 
    R
    ESEARCH 
    T
    RENDS
    There are some existing surveys which have presented the 
    future trends or scopes for Blockchain technology. Blockchain 
    testing, big data analytics, Blockchain applications, smart 
    contract, stop the tendency to centralization, and artificial 
    intelligence are listed by the same research group in [3] [27]. 
    Hybrid consensus mechanism, more efficient consensus, code 
    obfuscation, execution trusted computing against privacy 
    leakage risks, application hardening, and an efficient data 
    cleanup & detection mechanism are presented in [29]. A 
    standard testing mechanism, big data analytics, smart contract 
    development and evaluation are proposed in [49]. Resolving 
    bug of Blockchain technology, more use cases and 
    applications, and promoting the awareness of Blockchain 
    technology are described in [48]. Besides those valid trends 
    and scopes, this paper would highlight the below challenges 
    and research trends. 
    A. Scalability 

    Download 0,66 Mb.
    1   ...   11   12   13   14   15   16   17   18   ...   28




    Download 0,66 Mb.
    Pdf ko'rish