Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures

被引:0
|
作者
Ahlem Hamdi
Lamia Fourati
Samiha Ayed
机构
[1] Laboratory of Signals,Digital Research Center of Sfax (CRNS)
[2] systeMs,Computer Science Department, Computer Science and Multimedia Higher Institute
[3] aRtificial Intelligence,Institute Charles Delaunay
[4] neTworkS (SM@RTS),ERA
[5] Sfax University,undefined
[6] University of Technology of Troyes,undefined
关键词
Blockchain; Attacks; Solidity; Smart contracts; Hyperledger fabric; Security; Security analysis tools; Vulnerability detection; Testing;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, blockchain has become increasingly popular due to its promise of supporting critical business services in various areas. Blockchain systems, like Ethereum and Hyperledger Fabric, rely on sophisticated middleware, which enables the execution of smart contracts. Smart contracts define the business logic within cooperative applications. Detecting attacks and vulnerabilities within blockchain is a crucial issue for ensuring the security of different generations of blockchains. Testing a blockchain application serves multiple purposes: it ensures its quality, maximizes test coverage, and minimizes the risks associated with insufficient knowledge that could potentially impact the software development process. That is why several static analysis tools targeting Ethereum smart contracts and Hyperledger Fabric chaincode have recently been proposed by the blockchain research community. However, the efficiency of these analysis tools remains an open issue that requires further investigation. In this context, this paper presents a new taxonomy related to attacks targeting different generations of blockchain and evaluates the available analysis tools that can be utilized to assess the resilience of blockchain 2.0 and blockchain 3.0 against a range of vulnerabilities and attacks. Additionally, this study presents two quantitative analyses: one assessing the performance of tools in evaluating smart contract vulnerabilities within blockchain 2.0, and another analyzing the performance of tools in assessing blockchain 3.0 vulnerabilities within chaincode. Furthermore, this comprehensive study holds value for the research community as it considers various generations of blockchain.
引用
收藏
页码:713 / 757
页数:44
相关论文
共 6 条
  • [1] Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures
    Hamdi, Ahlem
    Fourati, Lamia
    Ayed, Samiha
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (02) : 713 - 757
  • [2] BLOCKCHAIN APPROACH TO CYBER SECURITY VULNERABILITIES ATTACKS AND POTENTIAL COUNTERMEASURES
    Sambana, Bosubabu
    Ramesh, Yegireddi
    Rao, Molli Srinivasa
    Rao, T. Chalapathi
    Patnaik, N. P. M.
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2020, 14 (01): : 1 - 14
  • [3] An Analysis of DHCP Vulnerabilities, Attacks, and Countermeasures
    AbdulGhaffar, AbdulAziz
    Paul, Sumit Kumar
    Matrawy, Ashraf
    [J]. 2023 BIENNIAL SYMPOSIUM ON COMMUNICATIONS, BSC, 2023, : 119 - 124
  • [4] Investigation on vulnerabilities, threats and attacks prohibiting UAVs charging and depleting UAVs batteries: Assessments & countermeasures
    Tlili, Fadhila
    Fourati, Lamia Chaari
    Ayed, Samiha
    Ouni, Bassem
    [J]. AD HOC NETWORKS, 2022, 129
  • [5] Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system
    Manesh, Mohsen Riahi
    Kaabouch, Naima
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2017, 19 : 16 - 31
  • [6] A comparative analysis of common threats, vulnerabilities, attacks and countermeasures within smart card and wireless sensor network node technologies
    Eagles, Kevin
    Markantonakis, Konstantinos
    Mayes, Keith
    [J]. INFORMATION SECURITY THEORY AND PRACTICES: SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4462 : 161 - +