He et al., 2024 - Google Patents
Nurgle: Exacerbating resource consumption in blockchain state storage via mpt manipulationHe et al., 2024
View PDF- Document ID
- 1643372314317891033
- Author
- He Z
- Li Z
- Qiao A
- Luo X
- Zhang X
- Chen T
- Song S
- Liu D
- Niu W
- Publication year
- Publication venue
- 2024 IEEE Symposium on Security and Privacy (SP)
External Links
Snippet
Blockchains, with intricate architectures, encompass various components, eg, consensus network, smart contracts, decentralized applications, and auxiliary services. While offering numerous advantages, these components expose various attack surfaces, leading to severe …
- 230000003090 exacerbative effect 0 title description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Luu et al. | {SmartPool}: Practical decentralized pooled mining | |
| Tikhomirov | Ethereum: state of knowledge and research perspectives | |
| Kolb et al. | Core concepts, challenges, and future directions in blockchain: A centralized tutorial | |
| Yan et al. | Confidentiality support over financial grade consortium blockchain | |
| Haugum et al. | Security and privacy challenges in blockchain interoperability-a multivocal literature review | |
| Ferreira Torres et al. | The eye of horus: Spotting and analyzing attacks on ethereum smart contracts | |
| He et al. | Nurgle: Exacerbating resource consumption in blockchain state storage via mpt manipulation | |
| Bonneau | EthIKS: Using Ethereum to audit a CONIKS key transparency log | |
| Qin et al. | The blockchain imitation game | |
| Duan et al. | Multiple‐Layer Security Threats on the Ethereum Blockchain and Their Countermeasures | |
| Guggenberger et al. | A Structured Overview of Attacks on Blockchain Systems. | |
| Liu et al. | Sok: Security analysis of blockchain-based cryptocurrency | |
| Liang et al. | Towards effective detection of ponzi schemes on ethereum with contract runtime behavior graph | |
| Lyu et al. | An empirical study on ethereum private transactions and the security implications | |
| Shahriar et al. | Modelling attacks in blockchain systems using petri nets | |
| Moubarak et al. | On distributed ledgers security and illegal uses | |
| Ferreira Torres et al. | Rolling in the shadows: Analyzing the extraction of mev across layer-2 rollups | |
| Daveas et al. | A gas-efficient superlight bitcoin client in solidity | |
| Wang et al. | Towards saving blockchain fees via secure and cost-effective batching of smart-contract invocations | |
| He et al. | Enabling Decentralized and Dynamic Data Integrity Verification for Secure Cloud Storage via T‐Merkle Hash Tree Based Blockchain | |
| Li et al. | Blockexplorer: Exploring blockchain big data via parallel processing | |
| Yang et al. | Who stole my nft? investigating web3 nft phishing scams on ethereum | |
| Li et al. | fAmulet: Finding Finalization Failure Bugs in Polygon zkRollup | |
| Zhu et al. | Attacker traceability on ethereum through graph analysis | |
| Wang et al. | Blockchain-based multi-malicious double-spending attack blacklist management model |