Reproducing decentralized finance attacks
Decentralized Finance (DeFi) has been a prominent application of blockchain technology in recent times. With billions of dollars in total value locked in the DeFi ecosystem, hackers are motivated to exploit vulnerabilities in DeFi for financial gains. These include both economic vulnerabilitie...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/156549 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-156549 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1565492022-04-20T01:12:16Z Reproducing decentralized finance attacks Cheng, Jia Hang Li Yi School of Computer Science and Engineering yi_li@ntu.edu.sg Engineering::Computer science and engineering Decentralized Finance (DeFi) has been a prominent application of blockchain technology in recent times. With billions of dollars in total value locked in the DeFi ecosystem, hackers are motivated to exploit vulnerabilities in DeFi for financial gains. These include both economic vulnerabilities and smart contract vulnerabilities. In this report, we focus on both economic and smart contract exploits. Economic exploits are simulated while smart contract exploits are reproduced. For each smart contract vulnerability covered in this report, a case study of existing DeFi contract will be conducted, followed by creating a reproducible experiment as code to demonstrate the vulnerability. Then providing countermeasures to mitigate the vulnerability. Finally, we present the direction for future research in reproducing DeFi attacks. Bachelor of Engineering (Computer Science) 2022-04-20T01:12:16Z 2022-04-20T01:12:16Z 2022 Final Year Project (FYP) Cheng, J. H. (2022). Reproducing decentralized finance attacks. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/156549 https://hdl.handle.net/10356/156549 en SCSE21-0123 application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Computer science and engineering |
spellingShingle |
Engineering::Computer science and engineering Cheng, Jia Hang Reproducing decentralized finance attacks |
description |
Decentralized Finance (DeFi) has been a prominent application of blockchain technology
in recent times. With billions of dollars in total value locked in the DeFi ecosystem, hackers
are motivated to exploit vulnerabilities in DeFi for financial gains. These include both
economic vulnerabilities and smart contract vulnerabilities. In this report, we focus on both
economic and smart contract exploits. Economic exploits are simulated while smart
contract exploits are reproduced. For each smart contract vulnerability covered in this
report, a case study of existing DeFi contract will be conducted, followed by creating a
reproducible experiment as code to demonstrate the vulnerability. Then providing
countermeasures to mitigate the vulnerability. Finally, we present the direction for future
research in reproducing DeFi attacks. |
author2 |
Li Yi |
author_facet |
Li Yi Cheng, Jia Hang |
format |
Final Year Project |
author |
Cheng, Jia Hang |
author_sort |
Cheng, Jia Hang |
title |
Reproducing decentralized finance attacks |
title_short |
Reproducing decentralized finance attacks |
title_full |
Reproducing decentralized finance attacks |
title_fullStr |
Reproducing decentralized finance attacks |
title_full_unstemmed |
Reproducing decentralized finance attacks |
title_sort |
reproducing decentralized finance attacks |
publisher |
Nanyang Technological University |
publishDate |
2022 |
url |
https://hdl.handle.net/10356/156549 |
_version_ |
1731235787902550016 |