2023
DOI: 10.22541/au.169760541.13864334/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Comprehensive Overview of Security Vulnerability Penetration Methods in Blockchain Cross-Chain Bridges

Qianrui Zhao,
Yinan Wang,
Bo Yang
et al.

Abstract: Cross-chain bridges are crucial mechanisms for facilitating interoperation between different blockchains, allowing the flow of assets and information across various chains. Their pivotal role and the vast value of assets they handle make them highly attractive to attackers. Major security incidents involving cross-chain bridge projects have been occurring frequently, resulting in losses of several billion due to cyber attacks. The diversity of vulnerability exploitation methods by hackers is vast, but not enti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Furthermore, malevolent entities use crosschain on and off ramps to launder stolen assets-sometimes from other bridges [28], attempting to circumvent deny lists and complicating forensic investigations, given several forensic tools available widespread [29], [30]. Even though most of the funds stolen in interoperability solutions come from cross-chain bridges, other interoperability schemes also originate numerous vulnerabilities [31]- [33].…”
Section: Motivationmentioning
confidence: 99%
“…Furthermore, malevolent entities use crosschain on and off ramps to launder stolen assets-sometimes from other bridges [28], attempting to circumvent deny lists and complicating forensic investigations, given several forensic tools available widespread [29], [30]. Even though most of the funds stolen in interoperability solutions come from cross-chain bridges, other interoperability schemes also originate numerous vulnerabilities [31]- [33].…”
Section: Motivationmentioning
confidence: 99%