A blockchain is a distributed network that is leveraged for various purpose. It is an immutable ledger technology where the recorded information is open and can be viewed by everyone. It does not involve any central authority to monitor the regular flow of the network, making it less prone to attacks. Miners’ consent is required to verify the authenticity of any acts performed in the blockchain platform.
Block generation method differs in different platforms, such as Ethereum, Bitcoin, Hyperledger, etc.Ethereum is a blockchain platform with its own cryptocurrency, called Ether (ETH) or Ethereum, and its own programming language, called Solidity. Moreover, the block validation process involves network miners to determine whether a particular block is valid. A miner with a valid hash is awarded Ether, and the generated block is then added to that particular blockchain.
Furthermore, Ethereum is one of the major platforms which is used for the development of a smart contract. Smart contracts are programs that reside within decentralized blockchains and are executed pursuant to triggered instructions. A smart contract acts in a similar way to a traditional agreement but negates the necessity for the involvement of a third party. Smart contracts are capable of initiating their commands automatically, thus eliminating the involvement of a regulatory body. As a consequence of blockchain’s immutable feature, smart contracts are developed in a manner that is distinct from traditional software. Once deployed to the blockchain, a smart contract cannot be modified or updated for security patches, thus encouraging developers to implement strong security strategies before deployment in order to avoid potential exploitation at a later time.
However, the most recent dreadful attacks and the multifarious existing vulnerabilities which result as a consequence of the absence of security patches have challenged the sustainability of this technology. In our research, we identified various threats, attacks and mitigations, including assets and different attackers.
While we were investigating, we got some further information about following, which was discussed and described in this video:
- threats: Centralization, Integer overflow/underflow, Destroyable/Suicidal contract, Malicious Acts and finally Weak Protocol.
- attacks: 51% Attack, Integer Overflow/Underflow Attack, Parity Multisig Wallet Attack, Cryptojacking and Sibyl attacks.
- mitigations: Decentralization, Consensus Algorithms, ZEUS, Oyente, KYC ,Antivirus/anti-malware software.
- assets: confidential information and digital assets.
- attackers: individual attackers, organizations and states.
We conclude the video with a discussion about recommendations and future research to progress this research.
In addition, if you want to find out more details about them, you can examine these works:
- http://ijns.jalaxy.com.tw/contents/ij...
- https://www.researchgate.net/figure/A...
- http://learncloud-content.s3.amazonaw...
- https://ieeexplore.ieee.org/stamp/sta...
- https://ieeexplore.ieee.org/stamp/sta...