A Survey on Ethereum Systems Security

@article{Chen2020ASO,
  title={A Survey on Ethereum Systems Security},
  author={Huashan Chen and Marcus Pendleton and Laurent L. Njilla and Shouhuai Xu},
  journal={ACM Computing Surveys (CSUR)},
  year={2020},
  volume={53},
  pages={1 - 43}
}
Blockchain technology is believed by many to be a game changer in many application domains. While the first generation of blockchain technology (i.e., Blockchain 1.0) is almost exclusively used for cryptocurrency, the second generation (i.e., Blockchain 2.0), as represented by Ethereum, is an open and decentralized platform enabling a new paradigm of computing—Decentralized Applications (DApps) running on top of blockchains. The rich applications and semantics of DApps inevitably introduce many… 
The Intersection of Blockchain and 6G Technologies
TLDR
A state-of-the-art survey on the integration of blockchain with 5G networks and beyond, exploring and analysing the opportunities that blockchain potentially empowers important 5G services, ranging from spectrum management, data sharing, network virtualization, resource management to interference management, federated learning, privacy and security provision.
A Study on Blockchain Architecture Design Decisions and Their Security Attacks and Threats
TLDR
A comprehensive systematic literature review is reported to derive a taxonomy of commonly used architecture design decisions in blockchain-based systems and map each of these decisions to potential security attacks and their posed threats.
Review of Automated Vulnerability Analysis of Smart Contracts on Ethereum
TLDR
A systematic literature review (SLR) to assess the state of the art regarding automated vulnerability analysis of smart contracts on Ethereum with a focus on classifications of vulnerabilities, detection methods, security analysis tools, and benchmarks for the assessment of tools.
Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures
TLDR
This paper aims at studying the multi-level security threats existing in the Ethereum blockchain, and exploring the security protection schemes under multiple attack scenarios, and proposes protection schemes.
Security enhancement technologies for smart contracts in the blockchain: A survey
TLDR
This paper provides a review of the current research status and advances in smart contract security based on related literature published in recent years, divided into six categories along the line of the technology, which includes symbolic execution, abstract interpretation, fuzz testing, formal verification, deep learning, and privacy enhancement.
A Research Survey on Applications of Consensus Protocols in Blockchain
TLDR
Some of the +e consensus protocols covered in this paper include PoW (Proof of Work), PoS ( proof of Stake), DPoS (Delegated Proof of St stake), PoET (proof of Elapsed Time), PBFT (Practical Byzantine Fault Tolerance), and PoA (Proof-of- Authority).
Blockchain Attack Discovery via Anomaly Detection
TLDR
This work defines an anomaly detection system based on a encoder-decoder deep learning model, that is trained exploiting aggregate information extracted by monitoring blockchain activities, and is the first one that provides a comprehensive and feasible solution to monitor the security of blockchain transactions.
A Deep Learning Approach for Detecting Security Attacks on Blockchain
TLDR
This work defines an anomaly detection system based on a encoder-decoder deep learning model, that is trained exploiting aggregate information extracted by monitoring blockchain activities, and is the first one that provides a comprehensive and feasible solution to monitor the security of blockchain transactions.
CTRF: Ethereum-Based Ponzi Contract Identification
TLDR
A method to detect Ponzi scheme contracts on Ethereum-CTRF by extracting the word features and sequence features of the smart contract’s code and the features of transactions and results show that the model has significantly improved recall compared with existing Ponsoni contract detection methods.
Feature: Blockchain and Cyberphysical Systems Blockchains for Transactive Energy Systems: Opportunities, Challenges, and Approaches
TLDR
Several of the key challenges which prevent the widespread adoption of decentralized TES are described and TRANSAX, a blockchain-based transactive energy system that provides an efficient, safe, and privacy-preserving market built on smart contracts is presented.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 297 REFERENCES
Security and Privacy on Blockchain
TLDR
This article presents a comprehensive overview of the security and privacy of blockchain with respect to concept, attributes, techniques, and systems, and describes the basic security properties that are supported as the essential requirements and building blocks for Bitcoin-like cryptocurrency systems.
Stick a fork in it: Analyzing the Ethereum network partition
TLDR
This paper closely study the large-scale fork that occurred in Ethereum, a new blockchain technology that allows for both currency transactions and smart contracts and explores the consequences of this fork, showing the impact on the two networks and their mining pools, and how the fork lead to unintentional incentives and security vulnerabilities.
Exploring the Attack Surface of Blockchain: A Systematic Overview
TLDR
This paper systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains, and outlines several attacks, including selfish mining, the 51% attack, Domain Name System attacks, distributed denial-of-service (DDoS) attacks, consensus delay, orphaned blocks, block ingestion, wallet thefts, smart contract attacks, and privacy attacks.
A Survey on the Security of Blockchain Systems
Impact of Man-In-The-Middle Attacks on Ethereum
TLDR
The results demonstrate that attacking Ethereum is remarkably devastating in a consortium or private context as the adversary can multiply her digital assets by 200,000 × in 10 hours through BGP hijacking whereas it would be almost impossible in a public context.
Consensus in the Age of Blockchains
TLDR
A systematic and comprehensive study of blockchain consensus protocols is conducted, developing a framework to evaluate their performance, security and design properties, and using it to systematize key themes in the protocol categories described above.
On the Security and Performance of Proof of Work Blockchains
TLDR
This paper introduces a novel quantitative framework to analyse the security and performance implications of various consensus and network parameters of PoW blockchains and devise optimal adversarial strategies for double-spending and selfish mining while taking into account real world constraints.
Blockchain Consensus Protocols in the Wild
TLDR
The process of assessing and gaining confidence in the resilience of a consensus protocols exposed to faults and adversarial nodes is discussed, and the consensus protocols in some prominent permissioned blockchain platforms with respect to their fault models and resilience against attacks are reviewed.
A Survey on Security and Privacy Issues of Bitcoin
TLDR
This paper presents a systematic survey that covers the security and privacy aspects of Bitcoin, and reviews the existing vulnerabilities in Bitcoin and its major underlying technologies such as blockchain and PoW-based consensus protocol.
Smart contracts vulnerabilities: a call for blockchain software engineering?
TLDR
A case of study where a bug discovered in a Smart Contract library, and perhaps "unsafe" programming, allowed an attack on Parity, a wallet application, causing the freezing of about 500K Ethers, is analyzed.
...
1
2
3
4
5
...