Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
124 tokens/sec
GPT-4o
8 tokens/sec
Gemini 2.5 Pro Pro
47 tokens/sec
o3 Pro
5 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

A Survey on the Security of Blockchain Systems (1802.06993v3)

Published 20 Feb 2018 in cs.CR

Abstract: Since its inception, the blockchain technology has shown promising application prospects. From the initial cryptocurrency to the current smart contract, blockchain has been applied to many fields. Although there are some studies on the security and privacy issues of blockchain, there lacks a systematic examination on the security of blockchain systems. In this paper, we conduct a systematic study on the security threats to blockchain and survey the corresponding real attacks by examining popular blockchain systems. We also review the security enhancement solutions for blockchain, which could be used in the development of various blockchain systems, and suggest some future directions to stir research efforts into this area.

Citations (1,370)

Summary

  • The paper systematically categorizes critical security threats, including the 51% attack, private key compromises, and smart contract vulnerabilities across blockchain 1.0 and 2.0.
  • It analyzes real-world exploits such as the DAO and Bitcoin BGP hijacking attacks, providing clear insights into the methodologies and impacts of these breaches.
  • It proposes actionable security enhancements using innovative tools like SmartPool, Oyente, Hawk, and Town Crier to strengthen the defense mechanisms of blockchain systems.

A Survey on the Security of Blockchain Systems

Blockchain technology has garnered significant interest from both academia and industry since the inception of Bitcoin in 2009. Despite its proliferation across various sectors such as finance, healthcare, and IoT, there has been a dearth of comprehensive studies addressing the multifaceted security threats inherent in blockchain systems. The paper, "A Survey on the Security of Blockchain Systems," by Xiaoqi Li et al., aims to fill this gap by systematically examining security vulnerabilities in prevalent blockchain ecosystems, illustrating real-world attacks, and summarizing applicable countermeasures.

Overview

The paper begins with a foundational overview of blockchain technologies. It delineates the consensus mechanisms that underpin blockchain's decentralized trust model, including Proof of Work (PoW), Proof of Stake (PoS), Practical Byzantine Fault Tolerance (PBFT), and Delegated Proof of Stake (DPoS). It also elucidates the block propagation and synchronization processes essential for maintaining the coherence and integrity of the blockchain.

Blockchain's evolution is split into two stages: blockchain 1.0 focused on cryptocurrencies, and blockchain 2.0 which introduces smart contracts. Smart contracts extend the utility of blockchain beyond financial transactions, enabling decentralized applications (dAPPs) with the promise of autonomy, stability, traceability, and security.

Security Risks

The authors categorize blockchain security risks into those common to both blockchain 1.0 and 2.0, and those specific to blockchain 2.0.

Common Risks

  1. 51% Vulnerability: A fundamental risk where an entity controlling over half of the network's hashing power can manipulate the blockchain by reversing transactions, excluding transactions, and disrupting other miners.
  2. Private Key Security: The security of blockchain accounts is intrinsically tied to the private key, which if compromised, results in irreversible loss.
  3. Criminal Activities: Bitcoin's pseudo-anonymity lends itself to illicit uses including ransomware, underground markets, and money laundering.
  4. Double Spending: The potential for a single cryptocurrency unit to be spent in multiple transactions, exploiting the time lag between transaction initiation and confirmation.
  5. Transaction Privacy Leakage: Despite measures such as one-time accounts and mixins, blockchain systems like Monero have demonstrated significant shortcomings in ensuring transaction privacy.

Blockchain 2.0 Specific Risks

  1. Criminal Smart Contracts: The potential for smart contracts to facilitate malicious activities such as cryptographic key theft and other cybercrimes.
  2. Vulnerabilities in Smart Contracts: Programmatic flaws within smart contracts can lead to various exploits, such as reentrancy attacks, which were notably illustrated in the DAO attack.
  3. Under-Optimized Smart Contracts: Inefficient code within smart contracts results in unnecessary gas consumption, impacting the economic viability of smart contracts.
  4. Under-Priced Operations: Mispriced gas values for certain operations can be exploited for Denial of Service (DoS) attacks, as evidenced by targeted attacks on Ethereum.

Real-World Attacks

The paper discusses several notable real-world attacks on blockchain systems. It explores the DAO attack, which leveraged a reentrancy vulnerability to siphon $60 million in Ether, and the Bitcoin BGP hijacking attack, which rerouted traffic to steal cryptocurrency. Other attacks such as selfish mining, eclipse attacks, liveness attacks, and balance attacks are also analyzed for their methodologies and impacts.

Security Enhancements

The authors propose several enhancements to bolster blockchain security:

  1. SmartPool: A decentralized mining pool system implemented as a smart contract on Ethereum, enhancing decentralization and security while improving efficiency.
  2. Quantitative Framework: A framework using MDP and simulation to analyze and optimize the security and performance trade-offs in PoW-based blockchains.
  3. Oyente: A symbolic execution tool for identifying bugs in Ethereum smart contracts, providing developers with a means to preemptively address vulnerabilities.
  4. Hawk: A framework for developing privacy-preserving smart contracts, protecting user privacy through cryptographic primitives and trusted execution environments.
  5. Town Crier: A system for secure data feeds from off-chain sources to smart contracts, leveraging Intel SGX for data integrity.

Implications and Future Directions

The insights provided by this paper have significant implications for both the theoretical understanding and practical security of blockchain systems. Future research could explore more efficient consensus mechanisms beyond PoW and PoS to mitigate resource wastage. Privacy-preserving techniques, such as code obfuscation and application hardening, could be further investigated for securing both dAPPs and their interactions with off-chain data. Additionally, efficient mechanisms for data cleanup in blockchain systems could address the issue of unwanted data accumulation, thereby enhancing overall performance and scalability.

Conclusion

The paper offers a thorough analysis of blockchain security, highlighting various vulnerabilities and real-world exploits, while providing a compendium of applicable security measures. This systematic paper serves as a valuable resource for researchers and practitioners aiming to fortify the security framework of blockchain technologies.