A Mechanism to Detect and Prevent Ethereum Blockchain Smart Contract Reentrancy Attacks

Alkhalifah, Ayman and Ng, Alex and Watters, Paul A. and Kayes, A. S. M. (2021) A Mechanism to Detect and Prevent Ethereum Blockchain Smart Contract Reentrancy Attacks. Frontiers in Computer Science, 3. ISSN 2624-9898

[thumbnail of pubmed-zip/versions/1/package-entries/fcomp-03-598780.pdf] Text
pubmed-zip/versions/1/package-entries/fcomp-03-598780.pdf - Published Version

Download (4MB)

Abstract

In Ethereum blockchain, smart contracts are immutable, public, and distributed. However, they are subject to many vulnerabilities stemming from coding errors made by developers. Seven cybersecurity incidents occurred in Ethereum smart contracts between 2016 and 2018, which led to financial losses estimated to be over US$ 289 million. Reentrancy vulnerability was the cause of two of these incidents, and the impacts went far beyond financial loss. Several reentrancy countermeasures are available, which are based on predefined patterns that are used to prevent vulnerability exploitation before the deployment of a smart contract; however, several limitations have been identified in these countermeasures. Motivated by all these issues, the objective of this article is to help developers improve the cybersecurity of smart contracts by proposing a solution that calculates the difference between the contract balance and the total balance of all participants in a smart contract before and after any operation in a transaction that changes its state. Proof-of-concept implementations show that this solution can provide a detection and prevention mechanism against reentrancy attacks during the execution of any smart contract.

Item Type: Article
Subjects: Institute Archives > Computer Science
Depositing User: Managing Editor
Date Deposited: 18 Feb 2023 09:37
Last Modified: 29 Jun 2024 08:19
URI: http://eprint.subtopublish.com/id/eprint/490

Actions (login required)

View Item
View Item