A Survey of Attacks on Ethereum Smart Contracts (SoK)

被引:817
作者
Atzei, Nicola [1 ]
Bartoletti, Massimo [1 ]
Cimoli, Tiziana [1 ]
机构
[1] Univ Cagliari, Cagliari, Italy
来源
PRINCIPLES OF SECURITY AND TRUST (POST 2017) | 2017年 / 10204卷
关键词
D O I
10.1007/978-3-662-54455-6_8
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Smart contracts are computer programs that can be correctly executed by a network of mutually distrusting nodes, without the need of an external trusted authority. Since smart contracts handle and transfer assets of considerable value, besides their correct execution it is also crucial that their implementation is secure against attacks which aim at stealing or tampering the assets. We study this problem in Ethereum, the most well-known and used framework for smart contracts so far. We analyse the security vulnerabilities of Ethereum smart contracts, providing a taxonomy of common programming pitfalls which may lead to vulnerabilities. We show a series of attacks which exploit these vulnerabilities, allowing an adversary to steal money or cause other damage.
引用
收藏
页码:164 / 186
页数:23
相关论文
共 34 条
[1]   Secure Multiparty Computations on Bitcoin [J].
Andrychowicz, Marcin ;
Dziembowski, Stefan ;
Malinowski, Daniel ;
Mazurek, Lukasz .
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, :443-458
[2]  
[Anonymous], DISTR SCANN LIV ETH
[3]  
[Anonymous], 2016, NEW KIDS BLOCK ANAL
[4]  
[Anonymous], 2016, PROC ACM SIGSAC C CO
[5]  
Bishop M., 1995, CSE9510 U CAL DAV
[6]  
Bishop M., 1999, P S RECENT ADV INTRU, P125
[7]  
Boneh D, 2000, LECT NOTES COMPUT SC, V1880, P236
[8]  
Bonneau J., 2015, IACR CRYPTOLOGY EPRI, V2015, P1015
[9]  
Brown R. G., 2016, GRIGG HEARN CORDA IN
[10]  
Buterin V., 2014, CISC VIS NETW IND GL, V3, P2, DOI DOI 10.5663/APS.V1I1.10138