Analyzing the Threats to Blockchain-Based Self-Sovereign Identities by Conducting a Literature Survey
Abstract
:1. Introduction
2. Background on SSI
2.1. Components & Terminology
- Verifiable Credentials: A collection of metadata and claims about an entity that can be verified by a proofing mechanism.
- Claim: Statement about an attribute of an entity, such as age or email address.
- Proof: Data (digital signature) allowing a verifiable credential to be verified by a verifier.
- Wallet: Software to store private keys, verifiable credentials, and other documents of an entity.
- Verifier: Allows access to a service after receiving the requested information or attributes of a holder.
- Issuer: Trusted parties that verify attributes or claims of an entity.
- Subject: The entity the claims within the verifiable credential are made about.
- Holder: Owner of the claims within a verifiable credential, stored in a wallet, and usually the same entity as the subject.
- Agent and hub: Technical endpoints and trustees for identifiers, which enable communication between entities.
- Smart contract: A computer program or transaction protocol that is executed automatically according to the terms of a contract or an agreement.
2.2. SSI Architecture
2.3. Current Examples
2.4. Blockchain & DLT
3. Motivation for the SSI Wallet Survey
3.1. Methodology for Evaluating SSI Wallets
- We first install the apps, instantiate individual wallets, and summarize the first impression.
- Each of the organizations offers at least one demo workflow, which we used to play with the wallets. Here, we focus on usability and functionality.
- Based on Allen’s [11] principle of transparency, the algorithm should be open source. We assume that this is also true for the wallet software. Hence, we search for code repositories, which are likely located on GitHub, and take a look at the source code.
- Additionally, we analyze the Android packages (APKs) with (1) Android Studio [26], (2) APKHunt [27], and (3) manually with the criteria provided by Uddin et al. [28]. If the wallet is not working properly on the smartphone, we additionally evaluate it with a virtual device in Android Studio [29]. If the app requires secure elements, this step may fail.
3.2. Results of the Evaluation
3.2.1. Installation, Instantiation, and First Impression
3.2.2. Wallet Usage
3.3. Further Usage and Analysis
- Root detection: The app checks if it can execute the su command or if any root-enabled apps are on the smartphone.
- Integrity check: It verifies that the app has not been tampered with and was installed from a verified app store.
- Custom keyboard: Since keyboards store inputs independently whether they are sensitive or not, passwords and similar information from a wallet should not be included. One way of mitigating this is by using custom keyboards.
- Biometric authentication: The use of biometrics or two-factor authentication (2FA) as a type of multi-factor authentication (MFA).
- Screenshot disabled: Malicious apps and users can make screenshots of credentials, passwords, and similar. Hence, disabling this feature can help.
- Hardware secure module: The key-revealing information is stored in a secure enclave to provide a higher level of security.
- Random generator: A secure random generator used for cryptography.
3.4. Summary
4. Methodology of the Survey
4.1. Research Questions
- RQ1:
- Which current threats are known for SSI and their elements? This research question aims to provide a full picture of possible threats known in the literature.
- RQ2:
- Which are the known countermeasures for these threats? This research question tries to identify known countermeasures.
- RQ3:
- Which of these identified threats and countermeasures are actually applicable to SSI? Since we regard various forms of these elements, some might not be relevant for SSI. Therefore, this research question focuses on those threats and countermeasures that are applicable.
- RQ4:
- Which parts of SSI have not been regarded by literature and which are the next steps? This research question aims to identify gaps, leading to future work.
4.2. Exclusion Criteria
- EC1:
- Publications before 2020 (publication date), since the threats have to be able to apply for SSI and not for earlier stages of SSI or its elements.
- EC2:
- Posters and short papers, as they typically present preliminary work.
- EC3:
- Publications in other languages than English.
- EC4:
- Publications, which propose their own approach but do not contribute to the threat overview.
4.3. Search Terms and Process
4.4. Analysis
4.5. Limitations
5. Overview of the Literature Survey
6. Results of the Blockchain Survey
6.1. General Issues
6.2. Human Layer
6.2.1. Social Engineering
6.2.2. Human Errors and Accidental Threats
6.2.3. Wallet Threats
6.2.4. Countermeasures
6.3. Application Layer
6.3.1. Inter-Contractual Vulnerabilities
6.3.2. Contractual Vulnerabilities
6.3.3. Contract-Programming Vulnerabilities
6.3.4. Transaction Irregularities
6.3.5. Countermeasures
6.4. Consensus Layer
6.4.1. Mining Issues
6.4.2. Timing Issues
6.4.3. Other Issues
6.4.4. Countermeasures
6.5. Data Layer
6.6. Network Layer
6.6.1. Blockchain-Specific Issues
6.6.2. Network Issues
6.6.3. Countermeasures
7. Results of the SSI Survey
7.1. Human and Credential Exchange Layer
7.2. Communication Layer
7.3. Repository Technology Layer
8. Application and Discussion of the Results
8.1. Application on SSI
8.1.1. Human Layer
8.1.2. Application Layer
8.1.3. Consensus Layer
8.1.4. Data Layer
8.1.5. Network Layer
8.2. Summary
8.3. Future Work
8.3.1. Governance Layer
8.3.2. Human Layer
8.3.3. Credential Exchange Layer
8.3.4. Communication Layer
8.3.5. Repository Technology Layer
9. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
2FA | Two-factor authentication |
ADB | Android Debug Bridge |
API | Application programming interface |
APK | Android package |
BDoS | Blockchain denial-of-service |
BEC | BeautyChain |
BFT | Byzantine fault tolerance |
BGP | Border gateway protocol |
BLE | Bluetooth Low Energy |
BTX | Bitcoin |
CFT | Crash fault tolerant |
CWE | Common weakness enumeration |
DAO | Decentralized autonomous organization |
DDoS | Distributed denial-of-service |
DES | Data encryption standard |
DEX | Dalvic executable format |
DHT | Distributed hash table |
DID | Decentralized identifier |
DLT | Distributed ledger technology |
DoS | Denial-of-service |
DSL | Domain-specific programming language |
ECDSA | Elliptic curve digital signature algorithm |
eIDAS | electronic Identification, Authentication and Trust Services |
EIP | Ethereum improvement proposal |
EOA | Externally owned account |
ERC | Ethereum Request for Comment |
ETH | Ether |
EU | European Union |
EVM | Ethereum virtual machine |
FAW | Fork after withholding |
HTLC | hash time locked contract |
IP | Internet protocol |
JAR | Java archive |
JSON | Java Script Object Notation |
MD5 | Message-digest algorithm 5 |
mempool | Memory pool |
MFA | Multi-factor authentication |
MITM | Human-in-the-middle |
OIDC | OpenID Connect |
opcode | operation code |
OpenID4VP | OpenID for Verifiable Presentations |
OS | Operating system |
OSI | Open Systems Interconnection |
OWASP | Open web application security project |
P2P | Peer-to-peer |
PBFT | Practical Byzantine fault tolerance |
PCB | Printed circuit board |
PIN | Personal identification number |
PKI | Public key infrastructure |
PoA | Proof-of-authority |
PoS | Proof-of-stake |
PoW | Proof-of-work |
QR | Quick response |
RBFT | Redundant Byzantine fault tolerance |
RF | Radio frequency |
RPC | Remote procedure call |
SCSVS | Smart contract security verification standard |
SHA | Secure hash algorithm |
SIM | Subscriber identity module |
SIOP | Self Issued OpenID Provider |
SMS | Short message service |
SQL | Structured query language |
SSI | Self-sovereign identity |
SSL | Secure sockets layer |
STRIDE | Spoofing, tampering, repudiation, information disclosure, denial of service, and |
elevation of privilege | |
TCP | Transmission control protocol |
TLS | Transport layer security |
TOD | Transaction-ordering dependency |
tx | Transaction |
UI | User interface |
VDR | Verifiable data registries |
VC | Verifiable credential |
VPN | Virtual private network |
XML | extensible markup language |
References
- European Parliament and Council. Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on Electronic Identification and Trust Services for Electronic Transactions in the Internal Market and Repealing Directive 1999/93/EC. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32014R0910 (accessed on 6 November 2023).
- Lips, S.; Vinogradova, N.; Krimmer, R.; Draheim, D. Re-Shaping the EU Digital Identity Framework. In Proceedings of the 23rd Annual International Conference on Digital Government Research (DG.O), Virtual, 15–17 June 2022; ACM Digital Library: New York, NY, USA, 2022; pp. 13–21. [Google Scholar] [CrossRef]
- Lukkien, B.; Bharosa, N.; De Reuver, M. Barriers for Developing and Launching Digital Identity Wallets. In Proceedings of the 24th Annual International Conference on Digital Government Research (DG.O), Gdansk, Poland, 11–14 July 2023; pp. 289–299. [Google Scholar] [CrossRef]
- European Commission. European Digital Identity Architecture and Reference Framework—Outline. 2023. Available online: https://digital-strategy.ec.europa.eu/en/library/european-digital-identity-architecture-and-reference-framework-outline (accessed on 19 October 2023).
- Sakimura, N.; Bradley, J.; Jones, M.B.; de Medeiros, B.; Mortimore, C. OpenID Connect Core 1.0 Incorporating Errata Set 1; Standard; OpenID Foundation: San Ramon, CA, USA, 2014; Available online: https://openid.net/specs/openid-connect-core-1_0.html (accessed on 19 October 2023).
- Yasuda, K.; Jones, M.B.; Lodderstedt, T. Self-Issued OpenID Provider v2; Standard; OpenID Foundation: San Ramon, CA, USA, 2023; Available online: https://openid.net/specs/openid-connect-self-issued-v2-1_0.html (accessed on 19 October 2023).
- Terbu, O.; Lodderstedt, T.; Yasuda, K.; Looker, T. OpenID for Verifiable Presentations—Draft 18; OpenID Foundation: San Ramon, CA, USA, 2023; Available online: https://openid.net/specs/openid-4-verifiable-presentations-1_0.html (accessed on 19 October 2023).
- Hedberg, R.; Jones, M.B.; Solberg, A.A.; Bradley, J.; De Marco, G.; Dzhuvinov, V. OpenID Federation 1.0—Draft 31; OpenID Foundation: San Ramon, CA, USA, 2023. [Google Scholar]
- Schwalm, S. The possible impacts of the eIDAS 2.0 digital identity approach in Germany and Europe. In Proceedings of the 10th Open Identity Summit (OID), Heilbronn, Germany, 15–16 June 2023; Gesellschaft für Informatik e.V.: Bonn, Germany, 2023; pp. 109–120. [Google Scholar] [CrossRef]
- Kaushal, P.K.; Bagga, A.; Sobti, R. Evolution of bitcoin and security risk in bitcoin wallets. In Proceedings of the 1st International Conference on Computer, Communications and Electronics (Comptelix), Jaipur, India, 1–2 July 2017; pp. 172–177. [Google Scholar] [CrossRef]
- Allen, C. The Path to Self-Sovereign Identity. 2016. Available online: http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html, (accessed on 19 October 2023).
- Preukschat, A.; Reed, D. Self-Sovereign Identity; Manning Publications: Shelter Island, NY, USA, 2021. [Google Scholar]
- Mühle, A.; Grüner, A.; Gayvoronskaya, T.; Meinel, C. A Survey on Essential Components of a Self-Sovereign Identity. Comput. Sci. Rev. 2018, 30, 80–86. [Google Scholar] [CrossRef]
- Sovrin Glossary V3. 2019. Available online: https://docs.google.com/document/d/1gfIz5TT0cNp2kxGMLFXr19x1uoZsruUe_0glHst2fZ8 (accessed on 19 October 2023).
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Whitepaper, Bitcoin. 2008. Available online: http://www.cryptovest.co.uk/resources/Bitcoin%20paper%20Original.pdf (accessed on 19 October 2023).
- Jain, A.; Arora, S.; Shukla, Y.; Patil, T.; Sawant-Patil, S. Proof of Stake with Casper the Friendly Finality Gadget Protocol for Fair Validation Consensus in Ethereum. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. 2018, 3, 291–298. [Google Scholar]
- Wöhrer, M.; Zdun, U. Design Patterns for Smart Contracts in the Ethereum Ecosystem. In Proceedings of the 9th IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 1513–1520. [Google Scholar] [CrossRef]
- European Blockchain Associaton. SSI Wallets. 2021. Available online: https://europeanblockchainassociation.org/ssi-wallets/ (accessed on 19 October 2023).
- Main Incubator GmbH. Lissi—Identity Wallet an Identity Management Solutions. 2023. Available online: https://lissi.id/ (accessed on 19 October 2023).
- Verimi. Verimi ID Wallet—Your Digital Wallet. 2023. Available online: https://verimi.de/en/ (accessed on 19 October 2023).
- iGrant.io. iGrant.io—Your Data, Your Choice. 2023. Available online: https://igrant.io (accessed on 19 October 2023).
- Esatus AG. Esatus AG—Enforcing Information Security. 2023. Available online: https://esatus.com/ (accessed on 19 October 2023).
- Validated ID. VIDwallet—Regain Control of Your Digital Identity. 2023. Available online: https://www.validatedid.com/en/vidchain/vidwallet (accessed on 19 October 2023).
- Jolocom. We Create Solutions for the Future of Digital Identity. 2023. Available online: https://jolocom.io (accessed on 19 October 2023).
- Gataca. Trusted Digital Identities Made Easy. 2023. Available online: https://www.gataca.io (accessed on 19 October 2023).
- Google. Analyze Your Build with the APK Analyzer. 2023. Available online: https://developer.android.com/studio/debug/apk-analyzer (accessed on 19 October 2023).
- RedHunt Labs. APKHunt|OWASP MASVS Static Analyzer. 2023. Available online: https://github.com/Cyber-Buddy/APKHunt (accessed on 19 October 2023).
- Uddin, M.S.; Mannan, M.; Youssef, A. Horus: A Security Assessment Framework for Android Crypto Wallets. In Security and Privacy in Communication Networks: 17th EAI International Conference, SecureComm 2021, Virtual Event, 6–9 September 2021; Garcia-Alfaro, J., Li, S., Poovendran, R., Debar, H., Yung, M., Eds.; Springer: Cham, Switzerland, 2021; pp. 120–139. [Google Scholar]
- Google. Android Studio. 2023. Available online: https://developer.android.com/studio (accessed on 19 October 2023).
- Teuschel, M.; Pöhn, D.; Grabatin, M.; Dietz, F.; Hommel, W.; Alt, F. ‘Don’t Annoy Me With Privacy Decisions!’—Designing Privacy-Preserving User Interfaces for SSI Wallets on Smartphones. IEEE Access 2023, 11, 131814–131835. [Google Scholar] [CrossRef]
- Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. BMJ 2021, 88, 105906. [Google Scholar] [CrossRef]
- Naik, N.; Grace, P.; Jenkins, P. An Attack Tree Based Risk Analysis Method for Investigating Attacks and Facilitating Their Mitigations in Self-Sovereign Identity. In Proceedings of the 7th IEEE Symposium Series on Computational Intelligence (SSCI), Orlando, FL, USA, 5–7 December 2021; pp. 1–8. [Google Scholar] [CrossRef]
- Ahmed, M.R.; Islam, A.K.M.M.; Shatabda, S.; Islam, S. Blockchain-Based Identity Management System and Self-Sovereign Identity Ecosystem: A Comprehensive Survey. IEEE Access 2022, 10, 113436–113481. [Google Scholar] [CrossRef]
- Grüner, A.; Mühle, A.; Lockenvitz, N.; Meinel, C. Analyzing and comparing the security of self-sovereign identity management systems through threat modeling. Int. J. Inf. Secur. 2023, 22, 1231–1248. [Google Scholar] [CrossRef]
- Wilusz, D.; Wójtowicz, A. Security Analysis of Transaction Authorization Methods for Next Generation Electronic Payment Services. In Proceedings of the 3rd International HCI Conference for Cybersecurity, Privacy and Trust (HCI-CPT), Virtual, 24–29 July 2021; Moallem, A., Ed.; Springer: Cham, Switzerland, 2021; pp. 103–119. [Google Scholar]
- Do, T.L.; Tran, M.K.; Nguyen, H.H.; Tran, M.T. Potential Threat of Face Swapping to EKYC with Face Registration and Augmented Solution with Deepfake Detection. In Proceedings of the 8th International Conference on Future Data and Security Engineering (FDSE), Virtual, 24–26 November 2021; Springer: Berlin/Heidelberg, Germany, 2021; pp. 293–307. [Google Scholar] [CrossRef]
- Ohm, M.; Plate, H.; Sykosch, A.; Meier, M. Backstabber’s Knife Collection: A Review of Open Source Software Supply Chain Attacks. In Proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), Lisbon, Portugal, 24–26 June 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 23–43. [Google Scholar] [CrossRef]
- Hu, Y.; Wang, S.; Tu, G.H.; Xiao, L.; Xie, T.; Lei, X.; Li, C.Y. Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures. In Proceedings of the 11th ACM Conference on Data and Application Security and Privacy (CODASPY), Virtual, 26–28 April 2021; ACM Digital Library: New York, NY, USA, 2021; pp. 89–100. [Google Scholar] [CrossRef]
- Das, P.; Erwig, A.; Faust, S.; Loss, J.; Riahi, S. The Exact Security of BIP32 Wallets. In Proceedings of the 28th ACM SIGSAC Conference on Computer and Communications Security (CCS), Virtual, 15–19 November 2021; ACM Digital Library: New York, NY, USA, 2021; pp. 1020–1042. [Google Scholar] [CrossRef]
- Dabrowski, A.; Pfeffer, K.; Reichel, M.; Mai, A.; Weippl, E.R.; Franz, M. Better Keep Cash in Your Boots—Hardware Wallets Are the New Single Point of Failure. In Proceedings of the 1st ACM CCS Workshop on Decentralized Finance and Security (DeFi), Virtual, 15 November 2021; ACM Digital Library: New York, NY, USA, 2021; pp. 1–8. [Google Scholar] [CrossRef]
- He, D.; Li, S.; Li, C.; Zhu, S.; Chan, S.; Min, W.; Guizani, N. Security Analysis of Cryptocurrency Wallets in Android-Based Applications. IEEE Netw. 2020, 34, 114–119. [Google Scholar] [CrossRef]
- Li, C.; He, D.; Li, S.; Zhu, S.; Chan, S.; Cheng, Y. Android-based Cryptocurrency Wallets: Attacks and Countermeasures. In Proceedings of the 2nd IEEE International Conference on Blockchain (Blockchain), Rhodes, Greece, 2–6 November 2020; pp. 9–16. [Google Scholar] [CrossRef]
- Park, D.; Choi, M.; Kim, G.; Bae, D.; Kim, H.; Hong, S. Stealing Keys from Hardware Wallets: A Single Trace Side-Channel Attack on Elliptic Curve Scalar Multiplication without Profiling. IEEE Access 2023, 11, 44578–44589. [Google Scholar] [CrossRef]
- Sato, T.; Imamura, M.; Omote, K. Threat Analysis of Poisoning Attack Against Ethereum Blockchain. In Proceedings of the 13th IFIP WG 11.2 International Conference on Information Security Theory and Practice (WISTP), Paris, France, 11–12 December 2019; Laurent, M., Giannetsos, T., Eds.; Springer: Cham, Switzerland, 2020; pp. 139–154. [Google Scholar]
- Eisentraut, J.; Holzer, S.; Klioba, K.; Křetínský, J.; Pin, L.; Wagner, A. Assessing Security of Cryptocurrencies with Attack-Defense Trees: Proof of Concept and Future Directions. In Proceedings of the 18th International Colloquium on Theoretical Aspects of Computing (ICTAC), Nur-Sultan, Kazakhstan, 8–10 September 2021; Cerone, A., Ölveczky, P.C., Eds.; Springer: Cham, Switzerland, 2021; pp. 214–234. [Google Scholar]
- Raikwar, M.; Gligoroski, D. DoS Attacks on Blockchain Ecosystem. In Proceedings of the International Parallel Processing Workshops (Euro-Par), Lisbon, Portugal, 30–31 August 2021; Revised Selected Papers. Chaves, R., Heras, D.B., Ilic, A., Unat, D., Badia, R.M., Bracciali, A., Diehl, P., Dubey, A., Sangyoon, O., Scott, S.L., et al., Eds.; Springer: Cham, Switzerland, 2022; pp. 230–242. [Google Scholar]
- Yu, G.; Ni, C.; Liu, T. Research on Blockchain Security Risk Analysis and Coping Strategies. In Proceedings of the 3rd International Conference on Big Data and Security (ICBDS), Shenzen, China, 26–28 November 2021; Tian, Y., Ma, T., Khan, M.K., Sheng, V.S., Pan, Z., Eds.; Springer: Singapore, 2022; pp. 230–242. [Google Scholar]
- Van Landuyt, D.; Sion, L.; Vandeloo, E.; Joosen, W. On the Applicability of Security and Privacy Threat Modeling for Blockchain Applications. In Proceedings of the Computer Security—ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg, 26–27 September 2019; Revised Selected Papers. Katsikas, S., Cuppens, F., Cuppens, N., Lambrinoudakis, C., Kalloniatis, C., Mylopoulos, J., Antón, A., Gritzalis, S., Pallas, F., Pohle, J., et al., Eds.; Springer: Cham, Switzerland, 2020; pp. 195–203. [Google Scholar]
- Samanta, A.K.; Sarkar, B.B.; Chaki, N. Quantified Analysis of Security Issues and Its Mitigation in Blockchain Using Game Theory. In Proceedings of the 3rd International Conference on Computational Intelligence in Communications and Business Analytics (CICBA), Santiniketan, India, 7–8 January 2021; Revised Selected Papers. Dutta, P., Mandal, J.K., Mukhopadhyay, S., Eds.; Springer: Cham, Switzerland, 2021; pp. 3–19. [Google Scholar]
- Kedziora, M.; Kozlowski, P.; Jozwiak, P. Security of Blockchain Distributed Ledger Consensus Mechanism in Context of the Sybil Attack. In Proceedings of the 33rd International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems: Trends in Artificial Intelligence Theory and Applications, Artificial Intelligence Practices (IEA/AIE), Kitakyushu, Japan, 22–25 September 2020; Fujita, H., Fournier-Viger, P., Ali, M., Sasaki, J., Eds.; Springer: Cham, Switzerland, 2020; pp. 407–418. [Google Scholar]
- Dholey, M.K.; Ganguly, A. Major Challenges and Threats of Blockchain Technology. In Proceedings of the 1st International Symposium on Artificial Intelligence (ISAI), Haldia, India, 17–22 February 2022; Revised Selected Papers. Sk, A.A., Turki, T., Ghosh, T.K., Joardar, S., Barman, S., Eds.; Springer: Cham, Switzerland, 2022; pp. 96–108. [Google Scholar]
- Shah, P.; Chopade, M. Blockchain Security: A Systematic Review. In Proceedings of the 4th International Conference on Futuristic Trends in Networks and Computing Technologies (FTNCT), Ahmedabad, India, 10–11 December 2022; Singh, P.K., Wierzchoń, S.T., Chhabra, J.K., Tanwar, S., Eds.; Springer: Singapore, 2022; pp. 969–980. [Google Scholar]
- Sun, H.; Ruan, N.; Su, C. How to Model the Bribery Attack: A Practical Quantification Method in Blockchain. In Proceedings of the 25th European Symposium on Research in Computer Security (ESORICS), Guildford, UK, 14–18 September 2020; Chen, L., Li, N., Liang, K., Schneider, S., Eds.; Springer: Cham, Switzerland, 2020; pp. 569–589. [Google Scholar]
- Ahmadjee, S.; Mera-Gómez, C.; Bahsoon, R.; Kazman, R. A Study on Blockchain Architecture Design Decisions and Their Security Attacks and Threats. ACM Trans. Softw. Eng. Methodol. 2022, 31, 36e. [Google Scholar] [CrossRef]
- Yi, X.; Wu, D.; Jiang, L.; Fang, Y.; Zhang, K.; Zhang, W. An Empirical Study of Blockchain System Vulnerabilities: Modules, Types, and Patterns. In Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), Singapore, 14–18 November 2022; ACM Digital Library: New York, NY, USA, 2022; pp. 709–721. [Google Scholar] [CrossRef]
- Yan, K.; Zhang, J.; Liu, X.; Diao, W.; Guo, S. Bad Apples: Understanding the Centralized Security Risks in Decentralized Ecosystems. In Proceedings of the 32nd ACM Web Conference (WWW), Austin, TX, USA, 30 April–4 May 2023; ACM Digital Library: New York, NY, USA, 2023; pp. 2274–2283. [Google Scholar] [CrossRef]
- Saad, M.; Chen, S.; Mohaisen, D. SyncAttack: Double-Spending in Bitcoin without Mining Power. In Proceedings of the 27th ACM SIGSAC Conference on Computer and Communications Security (CCS), Virtual, 15–19 November 2021; ACM Digital Library: New York, NY, USA, 2021; pp. 1668–1685. [Google Scholar] [CrossRef]
- Serena, L.; D’Angelo, G.; Ferretti, S. Implications of Dissemination Strategies on the Security of Distributed Ledgers. In Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems (CryBlock), London, UK, 25 September 2020; ACM Digital Library: New York, NY, USA, 2020; pp. 65–70. [Google Scholar] [CrossRef]
- Haugum, T.; Hoff, B.; Alsadi, M.; Li, J. Security and Privacy Challenges in Blockchain Interoperability—A Multivocal Literature Review. In Proceedings of the 26th International Conference on Evaluation and Assessment in Software Engineering (EASE), Gothenburg, Sweden, 13–15 June 2022; ACM Digital Library: New York, NY, USA, 2022; pp. 347–356. [Google Scholar] [CrossRef]
- Azouvi, S.; Cappelletti, D. Private Attacks in Longest Chain Proof-of-Stake Protocols with Single Secret Leader Elections. In Proceedings of the 3rd ACM Conference on Advances in Financial Technologies (AFT), Arlington, VA, USA, 26–28 September 2021; ACM Digital Library: New York, NY, USA, 2021; pp. 170–182. [Google Scholar] [CrossRef]
- Li, X.; Luo, H.; Duan, J. Security Analysis of Sharding in Blockchain with PBFT Consensus. In Proceedings of the 4th International Conference on Blockchain Technology (ICBCT), Shanghai, China, 25–27 March 2022; ACM Digital Library: New York, NY, USA, 2022; pp. 9–14. [Google Scholar] [CrossRef]
- Mirkin, M.; Ji, Y.; Pang, J.; Klages-Mundt, A.; Eyal, I.; Juels, A. BDoS: Blockchain Denial-of-Service. In Proceedings of the 26th ACM SIGSAC Conference on Computer and Communications Security (CCS), Virtual, 9–13 November 2020; ACM Digital Library: New York, NY, USA, 2020; pp. 601–619. [Google Scholar] [CrossRef]
- Ameen, T.; Sankagiri, S.; Hajek, B. Blockchain Security When Messages Are Lost. In Proceedings of the 1st ACM Workshop on Developments in Consensus (ConsensusDay), Los Angeles, CA, USA, 7 November 2022; ACM Digital Library: New York, NY, USA, 2022; pp. 1–14. [Google Scholar] [CrossRef]
- Huang, H.; Kong, W.; Zhou, S.; Zheng, Z.; Guo, S. A Survey of State-of-the-Art on Blockchains: Theories, Modelings, and Tools. ACM Comput. Surv. 2021, 54, 1–42. [Google Scholar] [CrossRef]
- Tochner, S.; Zohar, A.; Schmid, S. Route Hijacking and DoS in Off-Chain Networks. In Proceedings of the 2nd ACM Conference on Advances in Financial Technologies (AFT), New York, NY, USA, 21–23 October 2020; ACM Digital Library: New York, NY, USA, 2020; pp. 228–240. [Google Scholar] [CrossRef]
- Zhang, X.; Li, R.; Wang, Q.; Wang, Q.; Duan, S. Time-Manipulation Attack: Breaking Fairness against Proof of Authority Aura. In Proceedings of the 32nd ACM Web Conference (WWW), Austin, TX, USA, 30 April–4 May 2023; ACM Digital Library: New York, NY, USA, 2023; pp. 2076–2086. [Google Scholar] [CrossRef]
- AlFaw, A.; Elmedany, W.; Sharif, M.S. Blockchain Vulnerabilities and Recent Security Challenges: A Review Paper. In Proceedings of the 3rd International Conference on Data Analytics for Business and Industry (ICDABI), Sakhir, Bahrain, 25–26 October 2022; ACM Digital Library: New York, NY, USA, 2022; pp. 780–786. [Google Scholar] [CrossRef]
- Iqbal, M.; Matulevičius, R. Exploring Sybil and Double-Spending Risks in Blockchain Systems. IEEE Access 2021, 9, 76153–76177. [Google Scholar] [CrossRef]
- Prashar, D. Analysis on Blockchain Vulnerabilities & Attacks on Wallet. In Proceedings of the 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), Greater Noida, India, 17–18 December 2021; pp. 1515–1521. [Google Scholar] [CrossRef]
- Chen, X.; Wei, Z.; Jia, X.; Zheng, P.; Han, M.; Yang, X. Current Status and Prospects of Blockchain Security Standardization. In Proceedings of the IEEE 9th International Conference on Cyber Security and Cloud Computing (CSCloud)/IEEE 8th International Conference on Edge Computing and Scalable Cloud (EdgeCom), Xi’an, China, 25–27 June 2022; pp. 24–29. [Google Scholar] [CrossRef]
- Leng, J.; Zhou, M.; Zhao, J.L.; Huang, Y.; Bian, Y. Blockchain Security: A Survey of Techniques and Research Directions. IEEE Trans. Serv. Comput. 2022, 15, 2490–2510. [Google Scholar] [CrossRef]
- Sharma, S.; Shah, K. Exploring Security Threats on Blockchain Technology along with possible Remedies. In Proceedings of the IEEE 7th International conference for Convergence in Technology (I2CT), Mumbai, India, 7–9 April 2022; pp. 1–4. [Google Scholar] [CrossRef]
- Islam, M.R.; Rahman, M.M.; Mahmud, M.; Rahman, M.A.; Mohamad, M.H.S.; Embong, A.H. A Review on Blockchain Security Issues and Challenges. In Proceedings of the IEEE 12th Control and System Graduate Research Colloquium (ICSGRC), Shah Alam, Malaysia, 7 August 2021; pp. 227–232. [Google Scholar] [CrossRef]
- Bhutta, M.N.M.; Khwaja, A.A.; Nadeem, A.; Ahmad, H.F.; Khan, M.K.; Hanif, M.A.; Song, H.; Alshamari, M.; Cao, Y. A Survey on Blockchain Technology: Evolution, Architecture and Security. IEEE Access 2021, 9, 61048–61073. [Google Scholar] [CrossRef]
- Hao, Y. Research of the 51% attack based on blockchain. In Proceedings of the 3rd International Conference on Computer Vision, Image and Deep Learning & International Conference on Computer Engineering and Applications (CVIDL & ICCEA), Changchun, China, 20–22 May 2022; pp. 278–283. [Google Scholar] [CrossRef]
- Wang, H.; Ge, C.; Liu, Z. On the Security of Permissionless Blockchain Systems: Challenges and Research Perspective. In Proceedings of the 4th IEEE Conference on Dependable and Secure Computing (DSC), Aizuwakamatsu, Japan, 30 January–2 February 2021; pp. 1–8. [Google Scholar] [CrossRef]
- Snegireva, D.A. Review of Modern Vulnerabilities in Blockchain Systems. In Proceedings of the 6th International Conference on Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS), Yaroslavl, Russian, 6–10 September 2021; pp. 117–121. [Google Scholar] [CrossRef]
- Ajayi, O.; Saadawi, T. Detecting Insider Attacks in Blockchain Networks. In Proceedings of the 8th International Symposium on Networks, Computers and Communications (ISNCC), Dubai, United Arab Emirates, 31 October–2 November 2021; pp. 1–7. [Google Scholar] [CrossRef]
- Wang, S.; Yang, M.; Pearson, B.; Ge, T.; Fu, X.; Zhao, W. On Security of Proof-of-Policy (PoP) in the Execute-Order-Validate Blockchain Paradigm. In Proceedings of the 10th IEEE Conference on Communications and Network Security (CNS), Austin, TX, USA, 3–5 October 2022; pp. 317–325. [Google Scholar] [CrossRef]
- Muralidhara, S.; Usha, B.A. Review of Blockchain Security and Privacy. In Proceedings of the 5th International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 8–10 April 2021; pp. 526–533. [Google Scholar] [CrossRef]
- Wang, S.; Yin, B.; Zhang, S.; Cheng, Y.; Cai, L.X.; Cao, X. A Selfish Attack on Chainweb Blockchain. In Proceedings of the 39th IEEE Global Communications Conference (GLOBECOM), Taipei, Taiwan, 7–11 December 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Zhang, P.; Zhou, M. Security and Trust in Blockchains: Architecture, Key Technologies, and Open Issues. IEEE Trans. Comput. Soc. Syst. 2020, 7, 790–801. [Google Scholar] [CrossRef]
- Swambo, J.; Poinsot, A. Risk Framework for Bitcoin Custody Operation with the Revault Protocol. In Proceedings of the 25th International Workshops on Financial Cryptography and Data Security (FC), Virtual, 5 March 2021; Bernhard, M., Bracciali, A., Gudgeon, L., Haines, T., Klages-Mundt, A., Matsuo, S., Perez, D., Sala, M., Werner, S., Eds.; Springer: Berlin/Heidelberg, Germany, 2021; pp. 3–20. [Google Scholar]
- Kong, X.; Shen, M.; Che, Z.; Yu, C.; Zhu, L. Traffic Correlation for Deanonymizing Cryptocurrency Wallet Through Tor. In Proceedings of the 4th International Conference on Blockchain and Trustworthy Systems (BlockSys), Chengdu, China, 4–5 August 2022; Revised Selected Papers. Svetinovic, D., Zhang, Y., Luo, X., Huang, X., Chen, X., Eds.; Springer: Singapore, 2022; pp. 292–305. [Google Scholar]
- Romiti, M.; Victor, F.; Moreno-Sanchez, P.; Nordholt, P.S.; Haslhofer, B.; Maffei, M. Cross-Layer Deanonymization Methods in the Lightning Protocol. In Proceedings of the 25th International Workshops on Financial Cryptography and Data Security (FC), Virtual, 5 March 2021; Borisov, N., Diaz, C., Eds.; Springer: Berlin/Heidelberg, Germany, 2021; pp. 187–204. [Google Scholar]
- Apostolaki, M.; Maire, C.; Vanbever, L. Perimeter: A Network-Layer Attack on the Anonymity of Cryptocurrencies. In Proceedings of the 25th International Workshops on Financial Cryptography and Data Security (FC), Virtual, 5 March 2021; Borisov, N., Diaz, C., Eds.; Springer: Berlin/Heidelberg, Germany, 2021; pp. 147–166. [Google Scholar]
- Ghesmati, S.; Fdhila, W.; Weippl, E. Studying Bitcoin Privacy Attacks and Their Impact on Bitcoin-Based Identity Methods. In Proceedings of the 18th Business Process Management (BPM): Blockchain and Robotic Process Automation (RPA) Forum, Rome, Italy, 6–10 September 2021; González Enríquez, J., Debois, S., Fettke, P., Plebani, P., van de Weerd, I., Weber, I., Eds.; Springer: Cham, Switzerland, 2021; pp. 85–101. [Google Scholar]
- Wang, Q.; Yu, J.; Peng, Z.; Bui, V.C.; Chen, S.; Ding, Y.; Xiang, Y. Security Analysis on dBFT Protocol of NEO. In Proceedings of the 24th International Workshops on Financial Cryptography and Data Security (FC), Kota Kinabalu, Malaysia, 14 February 2020; Bonneau, J., Heninger, N., Eds.; Springer: Cham, Switzerland, 2020; pp. 20–31. [Google Scholar]
- Wijaya, D.A.; Liu, J.K.; Steinfeld, R.; Liu, D. Transparency or Anonymity Leak: Monero Mining Pools Data Publication. In Proceedings of the 26th Australasian Conference on Information Security and Privacy (ACISP), Virtual, 1–3 December 2021; Springer: Berlin/Heidelberg, Germany, 2021; pp. 433–450. [Google Scholar] [CrossRef]
- Chen, H.; Pendleton, M.; Njilla, L.; Xu, S. A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses. ACM Comput. Surv. 2020, 53, 67. [Google Scholar] [CrossRef]
- Yang, R.; Chang, X.; Mišić, J.; Mišić, V.; Zhu, H. Evaluating Fork after Withholding (FAW) Attack in Bitcoin. In Proceedings of the 19th ACM International Conference on Computing Frontiers (CF), Turin, Italy, 17–22 May 2022; ACM Digital Library: New York, NY, USA, 2022; pp. 67–74. [Google Scholar] [CrossRef]
- Wang, Y.; Zuest, P.; Yao, Y.; Lu, Z.; Wattenhofer, R. Impact and User Perception of Sandwich Attacks in the DeFi Ecosystem. In Proceedings of the 40th CHI Conference on Human Factors in Computing Systems (CHI), New Orleans, LA, USA, 29 April–5 May 2022; ACM Digital Library: New York, NY, USA, 2022. [Google Scholar] [CrossRef]
- Yang, Z.; Man, G.; Yue, S. Understanding Security Audits on Blockchain. In Proceedings of the 5th International Conference on Blockchain Technology and Applications (ICBTA), Xi’an, China, 16–18 December 2022; ACM Digital Library: New York, NY, USA, 2023; pp. 10–15. [Google Scholar] [CrossRef]
- Harris, J.; Zohar, A. Flood & Loot: A Systemic Attack on The Lightning Network. In Proceedings of the 2nd ACM Conference on Advances in Financial Technologies (AFT), New York, NY, USA, 21–23 October 2020; ACM Digital Library: New York, NY, USA, 2020; pp. 202–213. [Google Scholar] [CrossRef]
- He, Z.; Li, J.; Wu, Z. Don’t Trust, Verify: The Case of Slashing from a Popular Ethereum Explorer. In Proceedings of the 32nd ACM Web Conference (WWW) Companion, Austin, TX, USA, 30 April 2023–4 May 2023; ACM Digital Library: New York, NY, USA, 2023; pp. 1078–1084. [Google Scholar] [CrossRef]
- Agarwal, R.; Thapliyal, T.; Shukla, S. Analyzing Malicious Activities and Detecting Adversarial Behavior in Cryptocurrency Based Permissionless Blockchains: An Ethereum Usecase. Distrib. Ledger Technol. 2022, 1, 8. [Google Scholar] [CrossRef]
- Zaghloul, E.; Li, T.; Mutka, M.W.; Ren, J. Bitcoin and Blockchain: Security and Privacy. IEEE Internet Things J. 2020, 7, 10288–10313. [Google Scholar] [CrossRef]
- Paavolainen, S.; Carr, C. Security Properties of Light Clients on the Ethereum Blockchain. IEEE Access 2020, 8, 124339–124358. [Google Scholar] [CrossRef]
- Brotsis, S.; Kolokotronis, N.; Limniotis, K.; Bendiab, G.; Shiaeles, S. On the Security and Privacy of Hyperledger Fabric: Challenges and Open Issues. In Proceedings of the 16th IEEE World Congress on Services (SERVICES), Beijing, China, 18–23 October 2020; pp. 197–204. [Google Scholar] [CrossRef]
- Bouichou, A.; Mezroui, S.; Oualkadi, A.E. An overview of Ethereum and Solidity vulnerabilities. In Proceedings of the 3rd International Symposium on Advanced Electrical and Communication Technologies (ISAECT), Marrakech, Marocco, 25–27 November 2020; pp. 1–7. [Google Scholar] [CrossRef]
- Ferreira Torres, C.; Iannillo, A.K.; Gervais, A.; State, R. The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts. In Proceedings of the 25th International Workshops on Financial Cryptography and Data Security (FC), Virtual, 5 March 2021; Borisov, N., Diaz, C., Eds.; Springer: Berlin/Heidelberg, Germany, 2021; pp. 33–52. [Google Scholar]
- Ashouri, M. An Extensive Security Analysis on Ethereum Smart Contracts. In Proceedings of the 17th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Virtual, 6–9 September 2021; Garcia-Alfaro, J., Li, S., Poovendran, R., Debar, H., Yung, M., Eds.; Springer: Cham, Switzerland, 2021; pp. 144–163. [Google Scholar]
- Gupta, B.C.; Kumar, N.; Handa, A.; Shukla, S.K. An Insecurity Study of Ethereum Smart Contracts. In Proceedings of the 10th International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE), Kolkata, India, 17–21 December 2020; Batina, L., Picek, S., Mondal, M., Eds.; Springer: Cham, Switzerland, 2020; pp. 188–207. [Google Scholar]
- Ji, M.; Liang, G.; Li, M.; Zhang, H.; He, J. Security Analysis of Blockchain Smart Contract: Taking Reentrancy Vulnerability as an Example. In Proceedings of the 7th International Conference on Advances in Artificial Intelligence and Security (ICAIS), Dublin, Ireland, 19–23 July 2021; Sun, X., Zhang, X., Xia, Z., Bertino, E., Eds.; Springer: Cham, Switzerland, 2021; pp. 492–501. [Google Scholar]
- Chiu, W.Y.; Meng, W. Mind the Scraps: Attacking Blockchain Based on Selfdestruct. In Proceedings of the 26th Australasian Conference on Information Security and Privacy (ACISP), Virtual, 1–3 December 2021; Baek, J., Ruj, S., Eds.; Springer: Cham, Switzerland, 2021; pp. 451–469. [Google Scholar]
- Ivanov, N.; Li, C.; Yan, Q.; Sun, Z.; Cao, Z.; Luo, X. Security Threat Mitigation for Smart Contracts: A Comprehensive Survey. ACM Comput. Surv. 2023, 55, 326. [Google Scholar] [CrossRef]
- Maier, D.; Fäßler, F.; Seifert, J.P. Uncovering Smart Contract VM Bugs Via Differential Fuzzing. In Proceedings of the 5th Reversing and Offensive-Oriented Trends Symposium (ROOTS), Vienna, Austria, 18–19 November 2021; ACM Digital Library: New York, NY, USA, 2022; pp. 11–22. [Google Scholar] [CrossRef]
- Wan, Z.; Xia, X.; Lo, D.; Chen, J.; Luo, X.; Yang, X. Smart Contract Security: A Practitioners’ Perspective. In Proceedings of the 43rd International Conference on Software Engineering (ICSE), Madrid, Spain, 22–30 May 2021; pp. 1410–1422. [Google Scholar] [CrossRef]
- Zhang, Z.; Lei, Y.; Yan, M.; Yu, Y.; Chen, J.; Wang, S.; Mao, X. Reentrancy Vulnerability Detection and Localization: A Deep Learning Based Two-Phase Approach. In Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE), Rochester, MI, USA, 10–14 October 2022; ACM Digital Library: New York, NY, USA, 2023. [Google Scholar] [CrossRef]
- Tjiam, K.; Wang, R.; Chen, H.; Liang, K. Your Smart Contracts Are Not Secure: Investigating Arbitrageurs and Oracle Manipulators in Ethereum. In Proceedings of the 3rd Workshop on Cyber-Security Arms Race (CYSARM), Virtual, 19 November 2021; ACM Digital Library: New York, NY, USA, 2021; pp. 25–35. [Google Scholar] [CrossRef]
- Liu, Y.; Li, Y.; Lin, S.W.; Artho, C. Finding Permission Bugs in Smart Contracts with Role Mining. In Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), Virtual, 18–22 July 2022; ACM Digital Library: New York, NY, USA, 2022; pp. 716–727. [Google Scholar] [CrossRef]
- Hwang, S.; Ryu, S. Gap between Theory and Practice: An Empirical Study of Security Patches in Solidity. In Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering (ICSE), Seoul, Republic of Korea, 27 June–19 July 2020; ACM Digital Library: New York, NY, USA, 2020; pp. 542–553. [Google Scholar] [CrossRef]
- Varun, M.; Palanisamy, B.; Sural, S. Mitigating Frontrunning Attacks in Ethereum. In Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI), Nagasaki, Japan, 30 May–3 June 2022; ACM Digital Library: New York, NY, USA, 2022; pp. 115–124. [Google Scholar] [CrossRef]
- Samreen, N.F.; Alalfi, M.H. A Survey of Security Vulnerabilities in Ethereum Smart Contracts. In Proceedings of the 30th Annual International Conference on Computer Science and Software Engineering (CASCON), Toronto, ON, Canada, 10–13 November 2020; pp. 73–82. [Google Scholar]
- Brent, L.; Grech, N.; Lagouvardos, S.; Scholz, B.; Smaragdakis, Y. Ethainter: A Smart Contract Security Analyzer for Composite Vulnerabilities. In Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), London, UK, 15–20 June 2020; ACM Digital Library: New York, NY, USA, 2020; pp. 454–469. [Google Scholar] [CrossRef]
- Sayeed, S.; Marco-Gisbert, H.; Caira, T. Smart Contract: Attacks and Protections. IEEE Access 2020, 8, 24416–24427. [Google Scholar] [CrossRef]
- Kushwaha, S.S.; Joshi, S.; Singh, D.; Kaur, M.; Lee, H.N. Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract. IEEE Access 2022, 10, 6605–6621. [Google Scholar] [CrossRef]
- Pise, R.; Patil, S. A Deep Dive into Blockchain-based Smart Contract-specific Security Vulnerabilities. In Proceedings of the 1st IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS), Pune, India, 16–18 September 2022; pp. 1–6. [Google Scholar] [CrossRef]
- Ji, S.; Kim, D.; Im, H. Evaluating Countermeasures for Verifying the Integrity of Ethereum Smart Contract Applications. IEEE Access 2021, 9, 90029–90042. [Google Scholar] [CrossRef]
- Kushwaha, S.S.; Joshi, S.; Singh, D.; Kaur, M.; Lee, H.N. Ethereum Smart Contract Analysis Tools: A Systematic Review. IEEE Access 2022, 10, 57037–57062. [Google Scholar] [CrossRef]
- Kissoon, Y.; Bekaroo, G. Detecting Vulnerabilities in Smart Contract within Blockchain: A Review and Comparative Analysis of Key Approaches. In Proceedings of the 3rd International Conference on Next Generation Computing Applications (NextComp), Flic-en-Flac, Mauritius, 6–8 October 2022; pp. 1–6. [Google Scholar] [CrossRef]
- He, D.; Deng, Z.; Zhang, Y.; Chan, S.; Cheng, Y.; Guizani, N. Smart Contract Vulnerability Analysis and Security Audit. IEEE Netw. 2020, 34, 276–282. [Google Scholar] [CrossRef]
- Sifra, E.M. Security Vulnerabilities and Countermeasures of Smart Contracts: A Survey. In Proceedings of the 4th IEEE International Conference on Blockchain (Blockchain), Espoo, Finland, 22–25 August 2022; pp. 512–515. [Google Scholar] [CrossRef]
- Matulevicius, N.; Cordeiro, L.C. Verifying Security Vulnerabilities for Blockchain-based Smart Contracts. In Proceedings of the 11th Brazilian Symposium on Computing Systems Engineering (SBESC), Florianopolis, Brazil, 22–26 November 2021; pp. 1–8. [Google Scholar] [CrossRef]
- Usman, T.A.; Selçuk, A.A.; Özarslan, S. An Analysis of Ethereum Smart Contract Vulnerabilities. In Proceedings of the 14th International Conference on Information Security and Cryptology (ISCTURKEY), Ankara, Turkey, 2–3 December 2021; pp. 99–104. [Google Scholar] [CrossRef]
- Khan, Z.A.; Siami Namin, A. Ethereum Smart Contracts: Vulnerabilities and their Classifications. In Proceedings of the 8th IEEE International Conference on Big Data (Big Data), Atlanta, GA, USA, 10–13 December 2020; pp. 1–10. [Google Scholar] [CrossRef]
- Staderini, M.; Palli, C.; Bondavalli, A. Classification of Ethereum Vulnerabilities and their Propagations. In Proceedings of the 2nd International Conference on Blockchain Computing and Applications (BCCA), Antalya, Turkey, 2–5 November 2020; pp. 44–51. [Google Scholar] [CrossRef]
- Hajdu, A.; Ivaki, N.; Kocsis, I.; Klenik, A.; Gönczy, L.; Laranjeiro, N.; Madeira, H.; Pataricza, A. Using Fault Injection to Assess Blockchain Systems in Presence of Faulty Smart Contracts. IEEE Access 2020, 8, 190760–190783. [Google Scholar] [CrossRef]
- Weber, K.; Schütz, A.E.; Fertig, T.; Müller, N.H. Exploiting the Human Factor: Social Engineering Attacks on Cryptocurrency Users. In Proceedings of the 7th HCI International Conference on Learning and Collaboration Technologies. Human and Technology Ecosystems (LCT), Copenhagen, Denmark, 19–24 July 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 650–668. [Google Scholar] [CrossRef]
- Ivanov, N.; Lou, J.; Chen, T.; Li, J.; Yan, Q. Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts. In Proceedings of the 16th ACM Asia Conference on Computer and Communications Security (ASIA CCS), Virtual, 7–11 June 2021; ACM Digital Library: New York, NY, USA, 2021; pp. 787–801. [Google Scholar] [CrossRef]
- Fröhlich, M.; Hulm, P.; Alt, F. Under Pressure. A User-Centered Threat Model for Cryptocurrency Owners. In Proceedings of the 4th International Conference on Blockchain Technology and Applications (ICBTA), Xi’an, China, 17–19 December 2021; ACM Digital Library: New York, NY, USA, 2022; pp. 39–50. [Google Scholar] [CrossRef]
- Fröhlich, M.; Gutjahr, F.; Alt, F. Don’t Lose Your Coin! Investigating Security Practices of Cryptocurrency Users. In Proceedings of the 15th ACM Designing Interactive Systems Conference (DIS), Eindhoven, The Netherlands, 6–10 July 2020; ACM Digital Library: New York, NY, USA, 2020; pp. 1751–1763. [Google Scholar] [CrossRef]
- Buja, A.G.; Katan, M.; Nasrijal, N.M.H.; Alwi, S.F.S.; Siang, T.G. Into the Look: Security Issues, Crypto-Hygiene, and Future Direction of Blockchain and Cryptocurrency for Beginners in Malaysia. In Proceedings of the 6th IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE), Kedah, Malaysia, 1–3 December 2021; pp. 1–6. [Google Scholar] [CrossRef]
- OpenZeppelin. Math. 2023. Available online: https://docs.openzeppelin.com/contracts/2.x/api/math (accessed on 19 October 2023).
- Solidity. Solidity v0.5.0 Breaking Changes. 2018. Available online: https://docs.soliditylang.org/en/latest/050-breaking-changes.html (accessed on 19 October 2023).
- Solidity. Security Considerations. 2023. Available online: https://docs.soliditylang.org/en/latest/security-considerations.html (accessed on 19 October 2023).
- Ethereum Foundation. ERC-4337: Account Abstraction. 2023. Available online: https://www.erc4337.io (accessed on 19 October 2023).
- Ethereum Foundation. EIP-608: Hardfork Meta: Tangerine Whistle. 2017. Available online: https://eips.ethereum.org/EIPS/eip-608 (accessed on 19 October 2023).
- Ethereum Foundation. EIP-150: Gas Cost Changes for IO-Heavy Operations. 2016. Available online: https://eips.ethereum.org/EIPS/eip-150 (accessed on 19 October 2023).
- Ethereum Foundation. Ethash. 2023. Available online: https://ethereum.org/en/developers/docs/consensus-mechanisms/pow/mining-algorithms/ethash/ (accessed on 19 October 2023).
- Ethereum Foundation. EIP-155: Simple Replay Attack Protection. 2016. Available online: https://eips.ethereum.org/EIPS/eip-155 (accessed on 19 October 2023).
- Ethereum Foundation. EIP-161: State Trie Clearing (Invariant-Preserving Alternative). 2016. Available online: https://eips.ethereum.org/EIPS/eip-161 (accessed on 19 October 2023).
- Ethereum Foundation. Consensus Mechanisms. 2023. Available online: https://ethereum.org/en/developers/docs/consensus-mechanisms/ (accessed on 19 October 2023).
- Hyperledger Indy. 2023. Welcome to Indy Plenum’s Documentation! Available online: https://hyperledger-indy.readthedocs.io/projects/plenum/en/latest/index.html (accessed on 19 October 2023).
- Yang, G.; Lee, K.; Lee, K.; Yoo, Y.; Lee, H.; Yoo, C. Resource Analysis of Blockchain Consensus Algorithms in Hyperledger Fabric. IEEE Access 2022, 10, 74902–74920. [Google Scholar] [CrossRef]
- Schäfer, J.; Malinka, K.; Hanácek, P. Peer-to-Peer Networks Security. In Proceedings of the 3rd International Conference on Internet Monitoring and Protection (ICIMP), Bucharest, Romania, 29 June–5 July 2008; ACM Digital Library: New York, NY, USA, 2008; pp. 74–79. [Google Scholar] [CrossRef]
- Graux, H. Whose Data is It Anyway? Diverging Perspectives in EU Policy on the Current and Future Role of the Citizen in Digital Government. In Proceedings of the 24th Annual International Conference on Digital Government Research (DG.O), Gdansk, Poland, 11–14 July 2023; ACM Digital Library: New York, NY, USA, 2023; pp. 508–513. [Google Scholar] [CrossRef]
Wallet | Organization | Version | SSI Flavor |
---|---|---|---|
DataWallet | iGrant.io | 3.4.1 | W3C, X.509 |
esatus Wallet | esatus | 1.13 | W3C |
Gataca Identity | Gataca | 1.14.1 | W3C |
Lissi Wallet | Lissi | 1.8.1. | Lissi |
SmartWallet | Jolocom | 2.6.0 | W3C |
Verimi | Verimi | 2.7.0 | Verimi |
VIDwallet | ValidatedID | 1.7.19 | W3C |
Type | API Signature | DW | eW | GÍ | SW | LW | V | VID |
---|---|---|---|---|---|---|---|---|
Root Detection | Runtime.exec() | - | - | - | - | - | - | lib |
PackageManager.getPackageInfo() | - | - | - | - | - | - | - | |
Os.stat() | - | - | - | - | - | - | - | |
Os.access() | - | - | - | - | - | - | - | |
Integrity Check | PackageManager.getPackageInfo() | - | - | - | - | - | - | - |
Context.getPackageCodePath() | - | - | - | - | - | - | - | |
ZipFile.init() | - | - | - | - | - | - | - | |
RandomAccessFile.init() | - | - | - | - | - | - | - | |
Custom Keyboard | KeyboardView.setKeyboard() | - | - | - | - | - | - | - |
OnKeyboardActionListener.onKey() | - | - | - | - | - | - | - | |
InputMethodService.onCreateInputView() | - | - | - | - | - | - | - | |
InputConnection.commitText() | - | - | - | - | - | - | - | |
InputMethod | + | + | + | + | + | + | + | |
Biometric Authentication | BiometricManager | + | + | + | + | + | + | + |
BiometricPrompt | + | + | + | + | + | + | + | |
FingerprintManager | + | + | + | + | + | + | + | |
BiometricService | - | - | - | - | - | - | - | |
FingerprintService | - | - | - | - | - | - | - | |
Screenshots Disabled | Windows.setFlags() | - | - | - | - | - | - | - |
View.setDrawingCacheEnabled() | - | - | - | - | - | - | - | |
Hardware Security Module | KeyStore.getInstance() | - | - | - | - | - | - | - |
KeyGenParameterSpec.Builder.isStrongBoxBacked() | - | - | - | - | - | - | - | |
StrongBoxUnavailableException | - | lib | + | - | - | + | - | |
Random Generator | SecureRandom | + | lib | + | + | + | + | + |
Publisher | Search String | Results | Relevant |
---|---|---|---|
ACM | [Abstract: “self-sovereign identity”] AND [[Abstract: security] OR [Abstract: attack] OR [Abstract: threat]] | 3 | 0 |
IEEE | (“Abstract”:“self-sovereign identity”) AND ((“Abstract”:security) OR (“Abstract”:attack) OR (“Abstract”:threat)) | 56 | 2 |
Springer Link | Basis with limitation to language = English, discipline = Computer Science, and Document publication = 2020–2023; in addition without books | 69 | 1 |
Publisher | Search String | Results | Relevant |
---|---|---|---|
ACM | [[Abstract: security] OR [Abstract: attack] OR [Abstract: threat]] AND [[Abstract: wallet] OR [Abstract: blockchain] OR [Abstract: dlt] OR [Abstract: “smart contract”] ] AND [E-Publication Date: (01/01/2020 TO 12/06/2023)] | 830 | 36 |
IEEE | ((“Abstract”:security) OR (“Abstract”:threat) OR (“Abstract”:vulnerability)) AND ((“Abstract”:wallet) OR (“Abstract”:dlt) OR (“Abstract”:blockchain) OR (“Abstract”:“smart contract”)) and restriction to 2020–2023, publication type (Conferences, journals, early access articles, magazines), publisher (IEEE), and topics (blockchains, contracts, cryptocurrencies) | 3356 | 37 |
Springer Link | (wallet OR blockchain OR dlt OR “smart contract) AND (security OR attack OR threat) | 600 | 27 |
Category | Publications | No. of Publications |
---|---|---|
SSI | [32,33,34] | 3 |
Wallet | [28,35,36,37,38,39,40,41,42,43] | 10 |
DLT/Blockchain | [44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82] | 39 |
Smart Contracts | [83,84,85,86,87,88,89,90,91,92,93,94,95,96,97,98,99,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,119,120,121,122,123,124,125,126,127,128] | 46 |
Humans | [129,130,131,132,133] | 5 |
Year | SSI | Wallet | DLT | Humans | Smart Contract |
---|---|---|---|---|---|
2020 | 0 | 3 | 10 | 2 | 16 |
2021 | 1 | 6 | 13 | 3 | 15 |
2022 | 1 | 0 | 13 | 0 | 13 |
2023 | 1 | 1 | 3 | 0 | 2 |
all | 3 | 10 | 39 | 5 | 47 |
Layer | Category | Threat/Vulnerability/Attack | Section |
---|---|---|---|
General | DoS, DDoS, and more | Section 6.1 | |
Human | Social engineering | Phishing, Identity theft, shoulder surfing | Section 6.2.1 |
Human errors | Human errors, deanonymization | Section 6.2.2 | |
Wallet | Physical threats, keyboard, backup, malware, spoofing | Section 6.2.3 | |
Application | Inter-contractual | Reentrancy vulnerability, gas-related issues | Section 6.3.1 |
Contractual | Issues with Ether, upgradeable contract and backdoor, honeypot, address issues, unprotected suicide, DoS with unexpected revert, integer overflow/underflow, confidentiality failure, insufficient signature information | Section 6.3.2 | |
Contract-programming | Specific issues, delegatecall injection, erroneous visibility, authentication through tx.origin, manipulated balance, unchecked call return values, uninitialized storage pointer, call to unknown, type casts, outdated compiler version, permission control | Section 6.3.3 | |
Transaction | Call-stack depth limit, timestamp dependence | Section 6.3.4 | |
Consensus | Mining | Honest mining assumption, misleading rewards, probabilistic finality, transaction vulnerability, verifier’s dilemma | Section 6.4.1 |
Timing | Timing vulnerabilities, transaction order | Section 6.4.2 | |
Others | Strength of algorithm, spoofing, collusion attack, and more | Section 6.4.3 | |
Data | Indistinguishable chains, empty account in the state trie, trusted third parties | Section 6.5 | |
Network | Blockchain-specific | Forgery attack, unlimited node creation, uncapped incoming connections, public/fixed peer selection, sole block synchronization | Section 6.6.1 |
Network | Impersonation attack, replay attack, Sybil attack, Eclipse attack, API exposure | Section 6.6.2 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Pöhn, D.; Grabatin, M.; Hommel, W. Analyzing the Threats to Blockchain-Based Self-Sovereign Identities by Conducting a Literature Survey. Appl. Sci. 2024, 14, 139. https://doi.org/10.3390/app14010139
Pöhn D, Grabatin M, Hommel W. Analyzing the Threats to Blockchain-Based Self-Sovereign Identities by Conducting a Literature Survey. Applied Sciences. 2024; 14(1):139. https://doi.org/10.3390/app14010139
Chicago/Turabian StylePöhn, Daniela, Michael Grabatin, and Wolfgang Hommel. 2024. "Analyzing the Threats to Blockchain-Based Self-Sovereign Identities by Conducting a Literature Survey" Applied Sciences 14, no. 1: 139. https://doi.org/10.3390/app14010139
APA StylePöhn, D., Grabatin, M., & Hommel, W. (2024). Analyzing the Threats to Blockchain-Based Self-Sovereign Identities by Conducting a Literature Survey. Applied Sciences, 14(1), 139. https://doi.org/10.3390/app14010139