Open Access Open Access  Restricted Access Subscription Access

Analysis and Solution of Exploiting Vulnerabilities of Smart Contracts in Decentralized Financial Applications

Wan-Shiuan Hsu,
Iuon-Chang Lin,

Abstract


Decentralized finance began to flourish after June 2020, and security incidents also broke out one after another, mostly related to code security. At present, the technology of various decentralized finance (DeFi) protocols is not yet mature, and potential risks at different application levels may not be discovered during security audits. In the future, more unknown attacks that combine different protocol vulnerabilities will inevitably occur. This paper intends to use various common DeFi applications such as flash loans, oracles, and governance projects to analyze the following vulnerabilities in a total of eight attack processes: Unstoppable, Naive Receiver, Truster, Side Entrance, The Rewarder, Selfie, Compromised, and Puppet. It also provides smart contract security writing or resolution methods for the analysis and solution of various attack vulnerabilities, so that distributed financial applications can be safely controlled by the source code after they are deployed on Ethereum, and fundamentally slow down external attacks.


Citation Format:
Wan-Shiuan Hsu, Iuon-Chang Lin, "Analysis and Solution of Exploiting Vulnerabilities of Smart Contracts in Decentralized Financial Applications," Communications of the CCISA, vol. 27, no. 2 , pp. 23-40, May. 2021.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.





Published by Chinese Cryptology and Information Security Association (CCISA), Taiwan, R.O.C
CCCISA Editorial Office, No.1, Sec. 1, Shennong Rd., Yilan City, Yilan County 260, Taiwan (R.O.C.)
E-mail: ccisa.editor@gmail.com