当前位置:网站首页>Why are there so many security incidents in DeFi?
Why are there so many security incidents in DeFi?
2022-08-06 13:14:00 【Blockchain Interstellar Society】
Although the blockchain has always been known for its high security, we often hear in many reports about the frequent security incidents in the blockchain.This has led some to cast doubt on the security of the blockchain.
However, when we carefully analyze these security incidents, we will find a very wonderful phenomenon, that is, most of them are concentrated in the application of decentralized finance (DeFi)in the scene.According to a report released by CipherTrace earlier this year, DeFi accounts for more than 75% of all crypto hacking attacks that occur in blockchain security incidents.Among the crypto fraud cases, the incidents that occurred in DeFi also accounted for 54%.

The high security of the blockchain itself is worthy of recognition.The structural characteristics of the decentralized distributed ledger make the blockchain network composed of a large number of nodes in equal positions, and these nodes jointly govern the blockchain through a consensus mechanism in the network.In theory, to launch an intelligent attack on the blockchain, the attacker needs to control all nodes.

Although it is difficult for blockchains to achieve this ideal state in actual construction, it still sets a huge challenge for attackers.The security of blockchain is also recognized by many people.
So, why is DeFi built on a highly secure blockchain an area of "focus" for attackers?
Here we need to mention the cross-chain bridge between blockchains.
The so-called cross-chain bridge refers to a mechanism that connects two different blockchains so that users' digital assets and data information can be circulated between different blockchains.As the application of blockchain in the financial field, DeFi will naturally involve the flow of a large amount of funds between different blockchains. Therefore, DeFi has a very high demand for cross-chain bridges.

From a security point of view, cross-chain bridges are actually very fragile.The task that the cross-chain bridge needs to perform is not a simple capital exchange like RMB to USD. To use an easier-to-understand analogy, it is to convert your WeChat steps into RMB.The complexity of this information and asset exchange brings a test to the logic, verification, signature and other security measures between the cross-chain bridges.Therefore, under the limitations of technology, there are actually a lot of security holes in the cross-chain bridge, which also makes it more vulnerable to hackers.
In addition, many cross-chain bridges today use third-party external verification. However, the cross-chain bridge itself does not have a particularly high review of the credibility of the verification nodes.ability, which provides a channel for attackers to do evil by validating nodes.Many security incidents in DeFi are caused by hackers hijacking or deceiving validators.
These security issues of cross-chain bridges make DeFi a "hardest hit" for security incidents in the blockchain.However, the interoperability provided by the cross-chain bridge for the blockchain is an indispensable part of the entire ecosystem. Therefore, how to improve the security environment of DeFi has also become a key research direction for many developers.Only by making the cross-chain bridge more secure can DeFi develop better.
边栏推荐
- Learned Valley Learning Records] Super summary, share with heart | Basic usage of mongodb
- BufferedReader和BufferedWriter的实现原理
- 对话小牛电动CEO李彦:我们要做有独特价值主张的产品
- Promrtheus etcd 监控
- GDB/MI 命令总结
- leetcode 105. 从前序与中序遍历序列构造二叉树
- Logstash、Filebeat安装与数据同步
- 【TypeScript】深入学习TypeScript命名空间
- 锐捷MPLS 网络配置实例 ---尚文网络奎哥
- 多重背包问题 ← 规模小时可转化为0-1背包问题
猜你喜欢

浅谈树状数组

解决spacedesk卸载/重装软件时显示 指定的账户已存在
![微服务架构 | 分布式事务 - [Seata]](/img/a6/84d09ea07a4dc7c33ffa1f237db976.png)
微服务架构 | 分布式事务 - [Seata]

Wang Shuang Assembly Language Chapter 6: Programs Containing Multiple Segments

40度高温,如何通过SOLIDWORKS找到室内最凉快的地方?

Unity tool class ResourcesManager resource manager

The "Pytorch Common Functions Manual" compiled by Dr. Harbin Institute of Technology for half a year is open for download!Contains more than 200 functions! …

【TypeScript】深入学习TypeScript装饰器

【 TypeScript will learn will be 】 you must know all about TypeScript

你对数据库与数据处理了解吗?
随机推荐
[TypeScript] In-depth study of TypeScript decorators
易知微数字孪生智慧港口|打造智能化调度综合管控“大脑”,实现港口建设“新升级”
GD32E103 USB官方库 + STM32CubeMX
Multiple knapsack problem ← scale hour can be transformed into 0-1 knapsack problem
动物主题网页设计(小白必看)
如何用 ONES 管理工单,快速响应用户反馈?|2分钟了解 ONES
安全第六天课后练习
NAS 系统调研
解决创建虚拟机时No DEFAULT or UI configuration directive found问题
leetcode 105. 从前序与中序遍历序列构造二叉树
Web page side IM products RainbowChat - Web v4.1 version has been released
顶象首期业务安全月报来了!
一文搞懂什么是kubernetes Service
IO流学习
unity2D横版游戏教程10-场景控制
select、poll和epoll的优势和缺陷
多路分发器:IO复用的抽象Poller
Yizhiwei Digital Twin Smart Port | Create a "brain" for intelligent dispatching and comprehensive management and control, and realize a "new upgrade" of port construction
分布式架构网络通信
【cookie & & session】