Novel method for handling Ethereum attack

Reading time: 6 minute
...

📝 Original Info

  • Title: Novel method for handling Ethereum attack
  • ArXiv ID: 1909.12934
  • Date: 2019-09-25
  • Authors: G. Hall, M. Mansi, I. Makrant

📝 Abstract

Block-chain world is very dynamic and there is need for strong governance and underlying technology architecture to be robust to face challenges. This paper considers Ethereum, a leading block chain. We deep dive into the nature of this block chain, wherein for software upgrades forks are performed. They types of forks and impact is discussed. A specific Ethereum hack led to a hard fork and focus is provided on understanding the hack and overcoming it from a novel approach. The current model has been unable to handle multiple Ethereum attacks. Thus the current approach is compared against a novel approach providing a security and scaling solution. Here the architecture draws upon combining block-chain layers into operating system level. The approach can have tremendous benefits to block chain world and improve the way decentralized application teams perform. The benefits of the novel architecture is discussed. The approach helps safe guard block chain projects, making them safer and chain agnostic.

💡 Deep Analysis

Deep Dive into Novel method for handling Ethereum attack.

Block-chain world is very dynamic and there is need for strong governance and underlying technology architecture to be robust to face challenges. This paper considers Ethereum, a leading block chain. We deep dive into the nature of this block chain, wherein for software upgrades forks are performed. They types of forks and impact is discussed. A specific Ethereum hack led to a hard fork and focus is provided on understanding the hack and overcoming it from a novel approach. The current model has been unable to handle multiple Ethereum attacks. Thus the current approach is compared against a novel approach providing a security and scaling solution. Here the architecture draws upon combining block-chain layers into operating system level. The approach can have tremendous benefits to block chain world and improve the way decentralized application teams perform. The benefits of the novel architecture is discussed. The approach helps safe guard block chain projects, making them safer and ch

📄 Full Content

Ethereum is a leading distributed block-chain. Ethereum is capable of writing code for block-chain in decentralized manner for applications. Solidity is the programming language used for writing smart contracts. Sharing and exchange of money is possible through applications established Ethereum network. This is trustless system and no middle men are involved. There is no downtime as the nodes do not stop running. Users are protected from censorship and third party influences. Instead of building individual block chains, Ethereum virtual machine can be used to host the block-chain. Nodes are used to connect the block chain. The node usually uses an antenna model for communication within a device or multiple nodes that form a cluster. The blocks in Ethereum are designed in hierarchical structure and so you can match semantic of each block id, transaction id to search for the transactions occurred within blocks. As multiple blocks are connected in ontological structure, the semantic of block-id, transaction-id and account-id can be used.

Ethereum can help build decentralized autonomous organizations known as DAO. There help funding of development for profit and non-profit focus. These are multiple users take part with no leader and this continues till Ethereum governance has faced lots of challenges over a period of time. Once such occurrence was during DAO attack. In order to understand DAO (Decentralized autonomous organization), we describe the types of Ethereum forks.

2 Model for handling software update Forks are a way to bring about software changes. Develoeprs make enhancement to chain inorder to ensure the protocol is continously improving over time. There is need for a process to bring about changes via forks. Core code of protocol should be protected, so that the block-chain databases are protected and compatible. Testing should also be done so that block-chain should not break down. There are two types of Ethereum fork that is hard fork and soft fork.

There are changes to software configuration part. There are provided by the core development team.

Consider the above figure wherein softfork occurs at a given snapshot. Here we get two chains, the exiting one known as V0.1 and new ones VO.2. The dual forks will stop to exist that is become one when all the node operators fully upgrade. The chain does not actually split as there is consensuses on proposed change is approved by the stakeholders. There is backward compatibility for soft fork. This implies that the old nodes have the capability to process new version.

For a radical change to be made to block-chain protocol is enabled through hard fork. Resultantly all the key stakeholders such as the network operator and user have to upgrade to the latest protocol. There is permanent shift from the older version of the chain. Prior version is no more acceptable by latest version.

Consider above figure. There is base coin X having version V0.1. At a given point, a snapshot of hard fork is decided. At that snapshot, we get two chains X and chain Y. These chains are independent chains. The new chains try to compete among each other for survival, node operation, developer and branding. The only thing the common thing these chains share is the transaction history before the snapshot is taken. These chains behave differently having different hashing power, mining difficulty and other metrics. The old version refuse to recognize the new blocks. There is need to provide important security risks in old version. This radical change can be done through hard fork. In order to add new features or rollback certain transactions, hard fork is needed.

The need to provide decentralized business setup for nonprofit and profit was provided by DAO that stood for decentralized autonomous. This was setup on Ethereum block chain. There was no formal board members. The DAO code had a limitation due to which hack took place in the month of June 201. The issue let to loss of funds for DAO token holders and resultantly Ethereum members. Block chain is characterized by non rollback that transactions once placed, should be honored. The difference of opinion among Ethereum community led to a hard fork of Ethereum known as Ethereum Classic. These are two separate and independent chains. The DAO code bug occurred in the layer 3 that deals with the contract code. This comes under cyber security and system programming.

The token interface creates a map data structure in which all map data structures are mapped. The map helps to track the specified addresses where tokens are sent. The total supply is the variable which tells us what is available in the contract. The balance will tell us the balance of token contained in that particular address. Transfer is to send token from one address to another address. There is a TransferFrom wherein transfer is performed on behalf of a person’s approval.

Provided below is the TokenInterface code that follows above process. The traditional mode

…(Full text truncated)…

📸 Image Gallery

cover.png

Reference

This content is AI-processed based on ArXiv data.

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut