skip to main content
10.1145/3543507.3583393acmconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article
Artifacts Available / v1.1

Bad Apples: Understanding the Centralized Security Risks in Decentralized Ecosystems

Published:30 April 2023Publication History

ABSTRACT

The blockchain-powered decentralized applications and systems have been widely deployed in recent years. The decentralization feature promises users anonymity, security, and non-censorship, which is especially welcomed in the areas of decentralized finance and digital assets. From the perspective of most common users, a decentralized ecosystem means every service follows the principle of decentralization. However, we find that the services in a decentralized ecosystem still may contain centralized components or scenarios, like third-party SDKs and privileged operations, which violate the promise of decentralization and may cause a series of centralized security risks. In this work, we systematically study the centralized security risks existing in decentralized ecosystems. Specifically, we identify seven centralized security risks in the deployment of two typical decentralized services – crypto wallets and DApps, such as anonymity loss and overpowered owner. Also, to measure these risks in the wild, we designed an automated detection tool called Naga and carried out large-scale experiments. Based on the measurement of 28 Ethereum crypto wallets (Android version) and 110,506 on-chain smart contracts, the result shows that the centralized security risks are widespread. Up to 96.4% of wallets and 83.5% of contracts exist at least one security risk, including 260 well-known tokens with a total market cap of over $98 billion.

References

  1. Oct. 5, 2022. Find a wallet. Retrieved Oct. 5, 2022 from https://ethereum.org/en/wallets/find-wallet/Google ScholarGoogle Scholar
  2. Lawrence Abrams. Apr. 3, 2022. Fake Trezor data breach emails used to steal cryptocurrency wallets. Retrieved Oct. 5, 2022 from https://www.bleepingcomputer.com/news/security/fake-trezor-data-breach-emails-used-to-steal-cryptocurrency-wallets/Google ScholarGoogle Scholar
  3. Aleks-blockchaincap, Banteg, Dudesahn, Ekrenzke, Lehnberg, Ryanwatkins, Srs-parafi, Tracheopteryx, Vooncer, Yfi-cent, and Milkyklim. Jan. 21, 2021. YIP-57: Funding Yearn’s Future. Retrieved Oct. 5, 2022 from https://gov.yearn.finance/t/yip-57-funding-yearns-future/9319Google ScholarGoogle Scholar
  4. Maria Apostolaki, Aviv Zohar, and Laurent Vanbever. 2017. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. In Proceedings of the 2017 IEEE Symposium on Security and Privacy (S&P), San Jose, CA, USA, May 22-26, 2017.Google ScholarGoogle Scholar
  5. Jeff Benson. Mar. 4, 2022. Ethereum’s Infura Cuts Off Users to Separatist Areas in Ukraine, Accidentally Blocks Venezuela. Retrieved Oct. 5, 2022 from https://decrypt.co/94315/ethereum-infura-cuts-off-users-separatist-areas-ukraine-accidentally-blocks-venezuelaGoogle ScholarGoogle Scholar
  6. Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, and Edward W. Felten. 2015. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. In Proceedings of the 2015 IEEE Symposium on Security and Privacy (S&P), San Jose, CA, USA, May 17-21, 2015.Google ScholarGoogle Scholar
  7. Vitalik Buterin. Oct. 4, 2022. A Next-Generation Smart Contract and Decentralized Application Platform. Retrieved Oct. 5, 2022 from https://ethereum.org/en/whitepaper/Google ScholarGoogle Scholar
  8. Ting Chen, Yufei Zhang, Zihao Li, Xiapu Luo, Ting Wang, Rong Cao, Xiuzhuo Xiao, and Xiaosong Zhang. 2019. TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS), London, UK, November 11-15, 2019.Google ScholarGoogle Scholar
  9. Ethereum. Oct. 5, 2022. Solidity Lang. Retrieved Oct. 5, 2022 from https://github.com/ethereum/solidityGoogle ScholarGoogle Scholar
  10. Etherscan. Oct. 5, 2022. Etherscan. Retrieved Oct. 5, 2022 from http://etherscan.io/Google ScholarGoogle Scholar
  11. Josselin Feist, Gustavo Grieco, and Alex Groce. 2019. Slither: a static analysis framework for smart contracts. In Proceedings of the 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB@ICSE), Montreal, QC, Canada, May 27, 2019.Google ScholarGoogle Scholar
  12. Asem Ghaleb and Karthik Pattabiraman. 2020. How effective are smart contract analysis tools¿ evaluating smart contract static analysis tools using bug injection. In Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), Virtual Event, USA, July 18-22, 2020.Google ScholarGoogle Scholar
  13. Bo Jiang, Ye Liu, and W. K. Chan. 2018. ContractFuzzer: Fuzzing Smart Contracts for Vulnerability Detection. In Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering (ASE), Montpellier, France, September 3-7, 2018.Google ScholarGoogle Scholar
  14. Sukrit Kalra, Seep Goel, Mohan Dhawan, and Subodh Sharma. 2018. ZEUS: Analyzing Safety of Smart Contracts. In Proceedings of the 25th Annual Network and Distributed System Security Symposium (NDSS), San Diego, California, USA, February 18-21, 2018.Google ScholarGoogle Scholar
  15. Yogita Khatri. Nov. 11, 2020. Ethereum infrastructure provider Infura is down, crypto exchanges begin to disable ETH withdrawals. Retrieved Oct. 5, 2022 from https://www.theblock.co/post/84232/ethereum-infrastructure-provider-infura-is-downGoogle ScholarGoogle Scholar
  16. Johannes Krupp and Christian Rossow. 2018. teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts. In Proceedings of the 27th USENIX Security Symposium (USENIX-Sec), Baltimore, MD, USA, August 15-17, 2018.Google ScholarGoogle Scholar
  17. Kai Li, Jiaqi Chen, Xianghong Liu, Yuzhe Richard Tang, XiaoFeng Wang, and Xiapu Luo. 2021. As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service. In Proceedings of the 28th Annual Network and Distributed System Security Symposium (NDSS), virtually, February 21-25, 2021.Google ScholarGoogle Scholar
  18. Chao Liu, Han Liu, Zhao Cao, Zhong Chen, Bangdao Chen, and Bill Roscoe. 2018. ReGuard: Finding Reentrancy Bugs in Smart Contracts. In Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings (ICSE-Companion), Gothenburg, Sweden, May 27 - June 03, 2018.Google ScholarGoogle Scholar
  19. Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Qi Li, and Yih-Chun Hu. 2022. Make Web3.0 Connected. IEEE Transactions on Dependable and Secure Computing 19, 5 (2022), 2965–2981.Google ScholarGoogle Scholar
  20. Sishan Long, Soumya Basu, and Emin Gün Sirer. 2022. Measuring Miner Decentralization in Proof-of-Work Blockchains. CoRR abs/2203.16058 (2022). arXiv:2203.16058Google ScholarGoogle Scholar
  21. Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, and Aquinas Hobor. 2016. Making Smart Contracts Smarter. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS), Vienna, Austria, October 24-28, 2016.Google ScholarGoogle Scholar
  22. Kartik Nayak, Srijan Kumar, Andrew Miller, and Elaine Shi. 2016. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack. In Proceedings of the 1st IEEE European Symposium on Security and Privacy (EuroS&P), Saarbrücken, Germany, March 21-24, 2016.Google ScholarGoogle Scholar
  23. OpenZeppelin. Oct. 5, 2022. Openzeppelin Contracts. Retrieved Oct. 5, 2022 from https://github.com/OpenZeppelin/openzeppelin-contractsGoogle ScholarGoogle Scholar
  24. Martin Ortner, Eskandari, and Shayan. Jul. 1, 2022. Smart Contract Sanctuary. Retrieved Oct. 5, 2022 from https://github.com/tintinweb/smart-contract-sanctuaryGoogle ScholarGoogle Scholar
  25. Pierluigi Paganini. Jul. 30, 2018. KICKICO security breach – hackers stole over $7.7 million worth of KICK tokens. Retrieved Oct. 5, 2022 from https://securityaffairs.co/wordpress/74910/hacking/kickico-hack.htmlGoogle ScholarGoogle Scholar
  26. Michael Rodler, Wenting Li, Ghassan O. Karame, and Lucas Davi. 2019. Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks. In Proceedings of the 26th Annual Network and Distributed System Security Symposium (NDSS), San Diego, California, USA, February 24-27, 2019.Google ScholarGoogle Scholar
  27. Sunbeom So, Seongjoon Hong, and Hakjoo Oh. 2021. SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution. In Proceedings of the 30th USENIX Security Symposium (USENIX-Sec), August 11-13, 2021.Google ScholarGoogle Scholar
  28. Sunbeom So, Myungho Lee, Jisu Park, Heejo Lee, and Hakjoo Oh. 2020. VERISMART: A Highly Precise Safety Verifier for Ethereum Smart Contracts. In Proceedings of the 2020 IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, USA, May 18-21, 2020.Google ScholarGoogle Scholar
  29. Cryptopedia Staff. Mar. 17, 2022. What Was The DAO¿Retrieved Oct. 5, 2022 from https://www.gemini.com/cryptopedia/the-dao-hack-makerdaoGoogle ScholarGoogle Scholar
  30. Gilad Stern and Ittai Abraham. 2022. New Dolev-Reischuk Lower Bounds Meet Blockchain Eclipse Attacks. IACR Cryptol. ePrint Arch. (2022), 730.Google ScholarGoogle Scholar
  31. Liya Su, Xinyue Shen, Xiangyu Du, Xiaojing Liao, XiaoFeng Wang, Luyi Xing, and Baoxu Liu. 2021. Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications. In Proceedings of the 30th USENIX Security Symposium (USENIX-Sec), August 11-13, 2021.Google ScholarGoogle Scholar
  32. Eli Tan. Aug. 4, 2022. Solana’s $6M Exploit Likely Tied to Slope Wallet, Developers Say. Retrieved Oct. 5, 2022 from https://www.coindesk.com/business/2022/08/03/solanas-latest-6m-exploit-likely-tied-to-slope-wallet-devs-say/Google ScholarGoogle Scholar
  33. Christof Ferreira Torres, Antonio Ken Iannillo, Arthur Gervais, and Radu State. 2021. ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts. In Proceedings of the 6th IEEE European Symposium on Security and Privacy (EuroS&P), Vienna, Austria, September 6-10, 2021.Google ScholarGoogle Scholar
  34. Christof Ferreira Torres, Julian Schütte, and Radu State. 2018. Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts. In Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC), San Juan, PR, USA, December 03-07, 2018.Google ScholarGoogle Scholar
  35. Muoi Tran, Inho Choi, Gi Jun Moon, Anh V. Vu, and Min Suk Kang. 2020. A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network. In Proceedings of the 2020 IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, USA, May 18-21, 2020. IEEE, 894–909.Google ScholarGoogle Scholar
  36. Petar Tsankov, Andrei Marian Dan, Dana Drachsler-Cohen, Arthur Gervais, Florian Bünzli, and Martin T. Vechev. 2018. Securify: Practical Security Analysis of Smart Contracts. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS), Toronto, ON, Canada, October 15-19, 2018.Google ScholarGoogle Scholar
  37. Connor Tumbleson. Sept. 20, 2022. Apktool. Retrieved Oct. 5, 2022 from https://ibotpeaches.github.io/Apktool/Google ScholarGoogle Scholar
  38. Md Shahab Uddin, Mohammad Mannan, and Amr M. Youssef. 2021. Horus: A Security Assessment Framework for Android Crypto Wallets. In Proceedings of the 17th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Virtual Event, September 6-9, 2021.Google ScholarGoogle Scholar
  39. Samuel Wan. Jul. 7, 2022. Celsius Network continues to make moves, prompting calls to resume withdrawals. Retrieved Oct. 5, 2022 from https://cryptoslate.com/celsius-network-continues-to-make-moves-prompting-calls-to-resume-withdrawals/Google ScholarGoogle Scholar
  40. Philipp Winter, Anna Harbluk Lorimer, Peter Snyder, and Benjamin Livshits. 2021. What’s in Your Wallet¿ Privacy and Security Issues in Web 3.0. CoRR abs/2109.06836 (2021). arXiv:2109.06836Google ScholarGoogle Scholar
  41. Martin Young. Oct. 7, 2020. 75 crypto exchanges have closed down so far in 2020. Retrieved Oct. 5, 2022 from https://cointelegraph.com/news/75-crypto-exchanges-have-closed-down-so-far-in-2020Google ScholarGoogle Scholar

Index Terms

  1. Bad Apples: Understanding the Centralized Security Risks in Decentralized Ecosystems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      WWW '23: Proceedings of the ACM Web Conference 2023
      April 2023
      4293 pages
      ISBN:9781450394161
      DOI:10.1145/3543507

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 30 April 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate1,899of8,196submissions,23%

      Upcoming Conference

      WWW '24
      The ACM Web Conference 2024
      May 13 - 17, 2024
      Singapore , Singapore
    • Article Metrics

      • Downloads (Last 12 months)249
      • Downloads (Last 6 weeks)17

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format