{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,11]],"date-time":"2024-08-11T17:46:31Z","timestamp":1723398391540},"reference-count":32,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2022,2,14]],"date-time":"2022-02-14T00:00:00Z","timestamp":1644796800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2020YFB1005604","2020YFB1006003","GCIS201915","61902021","4212008","2020B0101090002","2018GXNSFDA281054"],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2022,2,14]]},"abstract":"Blockchain technology has been widely used in digital currency, Internet of Things, and other important fields because of its decentralization, nontampering, and anonymity. The vigorous development of blockchain cannot be separated from the security guarantee. However, there are various security threats within the blockchain that have shown in the past to cause huge financial losses. This paper aims at studying the multi-level security threats existing in the Ethereum blockchain, and exploring the security protection schemes under multiple attack scenarios. There are ten attack scenarios studied in this paper, which are replay attack, short url attack, false top-up attack, transaction order dependence attack, integer overflow attack, re-entrancy attack, honeypot attack, airdrop hunting attack, writing of arbitrary storage address attack, and gas exhaustion denial of service attack. This paper also proposes protection schemes. Finally, these schemes are evaluated by experiments. Experimental results show that our approach is efficient and does not bring too much extra cost and that the time cost has doubled at most.<\/jats:p>","DOI":"10.1155\/2022\/5307697","type":"journal-article","created":{"date-parts":[[2022,2,15]],"date-time":"2022-02-15T01:21:09Z","timestamp":1644888069000},"page":"1-11","source":"Crossref","is-referenced-by-count":14,"title":["Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures"],"prefix":"10.1155","volume":"2022","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-1825-7416","authenticated-orcid":true,"given":"Li","family":"Duan","sequence":"first","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, China"},{"name":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin, Guangxi, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0429-2146","authenticated-orcid":true,"given":"Yangyang","family":"Sun","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9715-6076","authenticated-orcid":true,"given":"Kejia","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Mathematical Science, Heilongjiang University, Harbin 150080, China"},{"name":"Cryptology and Cyberspace Security Laboratory of Heilongjiang University, Harbin 150080, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3571-7576","authenticated-orcid":true,"given":"Yong","family":"Ding","sequence":"additional","affiliation":[{"name":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin, Guangxi, China"}]}],"member":"98","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/int.22666"},{"key":"2","article-title":"Leveraging public-private blockchain interoperability for closed consortium interfacing","author":"B. C. Ghosh","year":"2021"},{"key":"3","volume-title":"Bitcoin: A Peer-To-Peer Electronic Cash System","author":"S. Nakamoto","year":"2008"},{"key":"4","first-page":"1","article-title":"Ethereum: a secure decentralised generalised transaction ledger","volume":"151","author":"G. Wood","year":"2014","journal-title":"Ethereum project yellow paper"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.5210\/fm.v2i9.548","volume-title":"Formalizing and Securing Relationships on Public Networks","author":"N. Szabo","year":"1997"},{"key":"6","first-page":"61","article-title":"Protect your smart contract against unfair payment","author":"Y. Li"},{"key":"7","first-page":"254","article-title":"Making smart contracts smarter","author":"L. Luu"},{"key":"8","first-page":"1317","article-title":"teether: gnawing at ethereum to automatically exploit smart contracts","author":"J. Krupp","year":"2018","journal-title":"27th USENIX Security Symposium (USENIX Security 18)"},{"key":"9","first-page":"67","article-title":"Securify: practical security analysis of smart contracts","author":"P. Tsankov"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.14722\/NDSS.2018.23082"},{"key":"11","first-page":"23","article-title":"Easyflow: keep ethereum away from overflow","author":"J. Gao"},{"key":"12","article-title":"SMARTEST: effectively hunting vulnerable transaction sequences in smart contracts through language model-guided symbolic execution","author":"S. So","year":"2021","journal-title":"30th USENIX Security Symposium (USENIX Security 21)"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.11896\/jsjkx.210600117"},{"key":"14","article-title":"SquirRL: automating attack discovery on blockchain incentive mechanisms with deep reinforcement learning","author":"C. Hou","year":"2019"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1002\/int.22428"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1002\/int.22656"},{"issue":"236","key":"17","first-page":"1","article-title":"Low-resource eclipse attacks on ethereum\u2019s peer-to-peer network","volume":"1","author":"Y. Marcus","year":"2018","journal-title":"IACR Cryptology ePrint Archive"},{"key":"18","first-page":"491","article-title":"AgentChain: a decentralized cross-chain exchange system","author":"D. Li"},{"key":"19","first-page":"294","article-title":"Replay attacks and defenses against cross-shard consensus in sharded distributed ledgers","volume-title":"IEEE","author":"A. Sonnino"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.3390\/su12072824"},{"key":"21","first-page":"94","article-title":"Blockchain router: a cross-chain communication protocol","author":"H. Wang"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813659"},{"key":"23","first-page":"17","article-title":"A secure sharding protocol for open blockchains","author":"L. Luu"},{"key":"24","article-title":"SGUARD: towards fixing vulnerable smart contracts automatically","author":"T. D. Nguyen","year":"2021"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"issue":"3","key":"26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3391195","article-title":"A survey on ethereum systems security: vulnerabilities, attacks, and defenses","volume":"53","author":"H. Chen","year":"2020","journal-title":"ACM Computing Surveys"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2021.3127023"},{"key":"28","doi-asserted-by":"crossref","first-page":"28712","DOI":"10.1109\/ACCESS.2019.2901858","article-title":"A survey on long-range attacks for proof of stake protocols","volume":"7","author":"E. Deirmentzoglou","year":"2019","journal-title":"IEEE Access"},{"key":"29","first-page":"790","article-title":"Do the rich get richer? Fairness analysis for blockchain incentives","author":"Y. Huang"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.020"},{"key":"31","article-title":"A survey of attacks on Ethereum smart contracts","volume":"2016","author":"N. Atzei","year":"2016","journal-title":"IACR Cryptol.ePrint Arch."},{"key":"32","article-title":"Safemath","author":"Github","year":"2021"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/5307697.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/5307697.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/5307697.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,15]],"date-time":"2022-02-15T01:21:24Z","timestamp":1644888084000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2022\/5307697\/"}},"subtitle":[],"editor":[{"given":"Yuling","family":"Chen","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,2,14]]},"references-count":32,"alternative-id":["5307697","5307697"],"URL":"https:\/\/doi.org\/10.1155\/2022\/5307697","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2022,2,14]]}}}