2023 IEEE Symposium on Security and Privacy (SP) 2023
DOI: 10.1109/sp46215.2023.10179435
|View full text |Cite
|
Sign up to set email alerts
|

SoK: Decentralized Finance (DeFi) Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 50 publications
(4 citation statements)
references
References 135 publications
0
4
0
Order By: Relevance
“…This highlights the importance of proactively analyzing malicious contracts and preventing such attacks. Research by Zhou et al [38] analyzed 192 attacks and discovered that 56% of the hackers are not executing attacks automatically, providing defenders with a rescue time frame. Rescue time is the time frame between deploying a malicious smart contract and the first malicious transaction.…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…This highlights the importance of proactively analyzing malicious contracts and preventing such attacks. Research by Zhou et al [38] analyzed 192 attacks and discovered that 56% of the hackers are not executing attacks automatically, providing defenders with a rescue time frame. Rescue time is the time frame between deploying a malicious smart contract and the first malicious transaction.…”
Section: Motivationmentioning
confidence: 99%
“…Wang et al [29] propose BlockEye a real-time attack detection system for DeFi projects, which performs symbolic reasoning on the data flow of smart contract states, e.g., asset price, and flags a transaction as a potential attack if a violation is detected on a critical invariant. Zhou et al [38] analyzed close to 200 real-world incidents and concluded that the average rescue time frame for most smart contract attacks is 1±4.1 hours, with the longest rescue time frame being 26.5 hours. Forta [17] tries to leverage the same fact as we do, namely that there is a rescue window that allows them to detect malicious deployment bytecode before an attacker can perform the actual attack.…”
Section: Related Workmentioning
confidence: 99%
“…Collating this vast knowledge, the literature not only offers surveys centered on the protocol layer [270] but also delves into aspects of implementation [271], [272], network architecture [273], and operational modalities [274], [275]. A significant body of work is dedicated to studying blockchain attacks at various levels: infrastructure/network [263], protocol/application [276]- [278], and operational layers [273].…”
Section: Blockchain Security and Attacksmentioning
confidence: 99%
“…In [1], the authors performed a bibliometric analysis and demonstrated the alarming scarcity of the research dedicated to blockchain oracles. Moreover, in the recent study of DeFi incidents [2], the authors empirically showed that oracle manipulation attacks are the most frequent incident types in DeFi. Although there are tools that can detect the price manipulation attacks [3,4], and identify new vulnerabilities in real time, there is still a need for prevention measures.…”
Section: Introductionmentioning
confidence: 99%