Electrotechnical and Computer Engineering
Vol. 40 No. 03 (2025): Proceedings of the Faculty of Technical Sciences
TIMING AND SEQUENCE ATTACKS ON L2 BLOCKCHAIN NETWORKS
Abstract
This paper will present L2 blockchain networks, attacks based on transaction sequence, instruction sequence inside a transaction, and timing-based attacks on said networks. The paper includes the implementation of a simple smart contract to better show the effects of some of these attacks. Finally, the defense mechanisms, to completely mitigate the attacks, or reduce their effectiveness, are given.
References
[1] Ethereum Foundation. Layer 2. https://ethereum.org/en/layer-2/
[2] Merkleovo stablo https://en.wikipedia.org/wiki/Merkle_tree/
[3] Huashan Chen, Marcus Pendleton, Laurent Njilla, and Shouhuai Xu. 2020. A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses. ACM Comput. Surv. 53, 3, Article 67 (May 2021), 43 pages. https://doi.org/10.1145/3391195
[4] S. S. Kushwaha, S. Joshi, D. Singh, M. Kaur and H.-N. Lee, "Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract," in IEEE Access, vol. 10, pp. 6605-6621, 2022, https://doi.org/10.1109/ACCESS.2021.3140091
[5] P. Daian et al., "Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability," 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2020, pp. 910-927, https://doi.org/10.1109/SP40000.2020.00040