TIMING AND SEQUENCE ATTACKS ON L2 BLOCKCHAIN NETWORKS

Authors

  • Nikola Vukić Autor

DOI:

https://doi.org/10.24867/30BE18Vukic

Keywords:

blockchain, scalability problem, security

Abstract

This paper will present L2 blockchain networks, attacks based on transaction sequence, instruction sequence inside a transaction, and timing-based attacks on said networks. The paper includes the implementation of a simple smart contract to better show the effects of some of these attacks. Finally, the defense mechanisms, to completely mitigate the attacks, or reduce their effectiveness, are given.

References

[1] Ethereum Foundation. Layer 2. https://ethereum.org/en/layer-2/
[2] Merkleovo stablo https://en.wikipedia.org/wiki/Merkle_tree/
[3] Huashan Chen, Marcus Pendleton, Laurent Njilla, and Shouhuai Xu. 2020. A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses. ACM Comput. Surv. 53, 3, Article 67 (May 2021), 43 pages. https://doi.org/10.1145/3391195
[4] S. S. Kushwaha, S. Joshi, D. Singh, M. Kaur and H.-N. Lee, "Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract," in IEEE Access, vol. 10, pp. 6605-6621, 2022, https://doi.org/10.1109/ACCESS.2021.3140091
[5] P. Daian et al., "Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability," 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2020, pp. 910-927, https://doi.org/10.1109/SP40000.2020.00040

Published

2025-03-06

Issue

Section

Electrotechnical and Computer Engineering