期刊文献+

区块链公链应用的典型安全问题综述 被引量:15

Overview on Typical Security Problems in Public Blockchain Applications
下载PDF
导出
摘要 区块链作为互联网金融的颠覆性创新技术,吸引学术研究和工程应用领域广泛关注,并被持续推广应用到各种行业领域中.以公有链为代表的区块链系统具有弱中心化、信任共识、平台开放、系统自治、用户匿名、数据完整等特点,在缺乏集中可信的分布式场景中实现可信数据管理和价值交易.但区块链作为新兴信息技术,由于自身机制和周边设施不够完善、用户安全观念不够成熟等原因,也面临安全威胁和挑战.本文首先介绍了区块链技术,回顾其面临的安全风险;其次以比特币和以太坊两个典型系统为例,剖析了针对面向代币交易和应用的区块链系统的各类安全威胁以及应对方法;接着分析了钱包交易所等区块链周边设施和区块链用户的安全隐患;最后对文中安全问题进行了分类总结,提出可行技术线路和防御方法,展望当前区块链安全的研究热点和发展趋势. Originated as Internet financial technology,blockchain is prevailing in many application scenarios and attracting attentions from both academia and industry.Typical blockchain systems are characterized with decentralization,trustworthiness,openness,autonomy,anonymity,and immutability,which brings trustworthiness for data management and value exchange in distributed computation environment without centralized trust authority.However,blockchain is still developing as a continuously evolving new technique.Its mechanisms,peripheral facilities,and user maturity in security are yet to be optimized,resulting in various security threats and frequent security incidents.This paper first overviews the blockchain technology and its potential security vulnerabilities when being used for token transaction and exchange.Then the mostly-seen security problems are enumerated and analyzed with Bitcoin and Ethereum as two sample systems.The security problems encountered by blockchain peripheral facilities and users are presented,and their root causes are probed.Finally,the surveyed problems are categorized and the possible countermeasures or defenses are proposed to address them.Promising research areas and technology evolving directions are briefly covered for the future.
作者 魏松杰 吕伟龙 李莎莎 WEI Song-Jie;LÜ Wei-Long;LI Sha-Sha(School of Computer Science and Engineering,Nanjing University of Science and Technology,Nanjing 210094,China)
出处 《软件学报》 EI CSCD 北大核心 2022年第1期324-355,共32页 Journal of Software
基金 国家自然科学基金(61802186,61472189) 国家重点研发计划(2020YFB1804604)。
关键词 区块链 公链安全 攻击流程 防御策略 共识安全 blockchain public chain security attack procedure defense strategy consensus security
  • 相关文献

参考文献3

二级参考文献15

共引文献412

同被引文献175

引证文献15

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部