SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks

被引:0
|
作者
Arora, Sanidhay [1 ]
Li, Yingjiu [1 ]
Feng, Yebo [2 ]
Xu, Jiahua [3 ,4 ]
机构
[1] Univ Oregon, Eugene, OR 97403 USA
[2] Nanyang Technol Univ, Singapore, Singapore
[3] UCL, London, England
[4] DLT Sci Fdn, London, England
关键词
blockchain; flash loan; oracle manipulation attack; Decentralized Finance (DeFi); Protocols for Loanable Funds (PLF); CIRCUIT-BREAKERS; BLOCKCHAIN;
D O I
10.1145/3634737.3637681
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The evolving landscape of Decentralized Finance (DeFi) has raised critical security concerns, especially pertaining to Protocols for Loanable Funds (PLFs) and their dependency on price oracles, which are susceptible to manipulation. The emergence of flash loans has further amplified these risks, enabling increasingly complex oracle manipulation attacks that can lead to significant financial losses. Responding to this threat, we first dissect the attack mechanism by formalizing the standard operational and adversary models for PLFs. Based on our analysis, we propose SecPLF, a robust and practical solution designed to counteract oracle manipulation attacks efficiently. SecPLF operates by tracking a price state for each cryptoasset, including the recent price and the timestamp of its last update. By imposing price constraints on the price oracle usage, SecPLF ensures a PLF only engages a price oracle if the last recorded price falls within a defined threshold, thereby negating the profitability of potential attacks. Our evaluation based on historical market data confirms SecPLF's efficacy in providing high-confidence prevention against arbitrage attacks that arise due to minor price differences. SecPLF delivers proactive protection against oracle manipulation attacks, offering ease of implementation, oracle-agnostic property, and resource and cost efficiency.
引用
收藏
页码:1394 / 1405
页数:12
相关论文
共 50 条
  • [1] Identification protocols secure against reset attacks
    Bellare, M
    Fischlin, M
    Goldwasser, S
    Micali, S
    [J]. ADVANCES IN CRYPTOLOGY-EUROCRYPT 2001, PROCEEDINGS, 2001, 2045 : 495 - 511
  • [2] Construction of a hybrid HIBE protocol secure against adaptive attacks - (Without random oracle)
    Sarkar, Palash
    Chatterjee, Sanjit
    [J]. PROVABLE SECURITY, PROCEEDINGS, 2007, 4784 : 51 - +
  • [3] Secure key agreement protocols for three-party against guessing attacks
    Sun, HM
    Chen, BC
    Hwang, T
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 75 (1-2) : 63 - 68
  • [4] Efficient and secure password-based authentication protocols against guessing attacks
    Kwon, T
    Song, J
    [J]. COMPUTER COMMUNICATIONS, 1998, 21 (09) : 853 - 861
  • [5] A New Trust Model to secure Routing Protocols against DoS attacks in MANETs
    Echchaachoui, Adel
    Kobbane, Abdellatif
    Elkoutbi, Mohammed
    [J]. 2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA), 2015,
  • [6] Making classical honest verifier zero knowledge protocols secure against quantum attacks
    Hallgren, Sean
    Kolla, Alexandra
    Sen, Pranab
    Zhang, Shengyu
    [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, PROCEEDINGS, 2008, 5126 : 592 - +
  • [7] Secure authentication protocols resistant to guessing attacks
    Luo, Jia-Ning
    Shieh, Shiuhpyng
    Shen, Ji-Chiang
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2006, 22 (05) : 1125 - 1143
  • [8] Public key encryption with keyword search secure against keyword guessing attacks without random oracle
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    [J]. INFORMATION SCIENCES, 2013, 238 : 221 - 241
  • [9] Secure login Protocols: An Analysis on Modern Attacks and Solutions
    Waheed, Abdul
    Shah, Munam Ali
    Khan, Abid
    [J]. 2016 22ND INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), 2016, : 536 - 542
  • [10] Combating against attacks on encrypted protocols
    Fadlullah, Zubair Md.
    Taleb, Tarik
    Ansari, Nirwan
    Hashimoto, Kazuo
    Miyake, Yutake
    Nemoto, Yoshiaki
    Kato, Nei
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1211 - +