当前位置: X-MOL 学术IEEE Commun. Surv. Tutor. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Exploring the Attack Surface of Blockchain: A Comprehensive Survey
IEEE Communications Surveys & Tutorials ( IF 35.6 ) Pub Date : 2020-01-01 , DOI: 10.1109/comst.2020.2975999
Muhammad Saad , Jeffrey Spaulding , Laurent Njilla , Charles Kamhoua , Sachin Shetty , DaeHun Nyang , David Mohaisen

In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the attack surface to 1) the Blockchain cryptographic constructs, 2) the distributed architecture of the systems using Blockchain, and 3) the Blockchain application context. To each of those contributing factors, we outline several attacks, including selfish mining, the 51% attack, DNS attacks, distributed denial-of-service (DDoS) attacks, consensus delay (due to selfish behavior or distributed denial-of-service attacks), Blockchain forks, orphaned and stale blocks, block ingestion, wallet thefts, smart contract attacks, and privacy attacks. We also explore the causal relationships between these attacks to demonstrate how various attack vectors are connected to one another. A secondary contribution of this work is outlining effective defense measures taken by the Blockchain technology or proposed by researchers to mitigate the effects of these attacks and patch associated vulnerabilities.

中文翻译:

探索区块链的攻击面:综合调查

在本文中,我们系统地探索了区块链技术的攻击面,重点是公共区块链。为实现这一目标,我们将攻击面的攻击可行性归因于 1) 区块链密码结构,2) 使用区块链的系统的分布式架构,以及 3) 区块链应用程序上下文。对于这些影响因素中的每一个,我们概述了几种攻击,包括自私挖矿、51% 攻击、DNS 攻击、分布式拒绝服务 (DDoS) 攻击、共识延迟(由于自私行为或分布式拒绝服务攻击) )、区块链分叉、孤立块和陈旧块、块摄取、钱包盗窃、智能合约攻击和隐私攻击。我们还探索了这些攻击之间的因果关系,以展示各种攻击向量如何相互关联。这项工作的第二个贡献是概述了区块链技术采取的或研究人员提出的有效防御措施,以减轻这些攻击的影响并修补相关漏洞。
更新日期:2020-01-01
down
wechat
bug