Chaos Engineering of Ethereum Blockchain Clients
- URL: http://arxiv.org/abs/2111.00221v2
- Date: Sun, 18 Jun 2023 00:43:29 GMT
- Title: Chaos Engineering of Ethereum Blockchain Clients
- Authors: Long Zhang, Javier Ron, Benoit Baudry, and Martin Monperrus
- Abstract summary: We present ChaosETH, a chaos engineering approach for resilience assessment of blockchain clients.
Our results reveal a broad spectrum of resilience characteristics of clients w.r.t. system call invocation errors, ranging from direct crashes to full resilience.
- Score: 13.131269677617286
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In this paper, we present ChaosETH, a chaos engineering approach for
resilience assessment of Ethereum blockchain clients. ChaosETH operates in the
following manner: First, it monitors Ethereum clients to determine their normal
behavior. Then, it injects system call invocation errors into one single
Ethereum client at a time, and observes the behavior resulting from
perturbation. Finally, ChaosETH compares the behavior recorded before, during,
and after perturbation to assess the impact of the injected system call
invocation errors. The experiments are performed on the two most popular
Ethereum client implementations: GoEthereum and Nethermind. We assess the
impact of 22 different system call errors on those Ethereum clients with
respect to 15 application-level metrics. Our results reveal a broad spectrum of
resilience characteristics of Ethereum clients w.r.t. system call invocation
errors, ranging from direct crashes to full resilience. The experiments clearly
demonstrate the feasibility of applying chaos engineering principles to
blockchain systems.
Related papers
- Remeasuring the Arbitrage and Sandwich Attacks of Maximal Extractable Value in Ethereum [7.381773144616746]
Maximal Extractable Value (MEV) drives the prosperity of the blockchain ecosystem.
Before The Merge of 2022, around $675M was extracted in terms of MEV.
Our research will shed light on future MEV-related work.
arXiv Detail & Related papers (2024-05-28T08:17:15Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - FRAD: Front-Running Attacks Detection on Ethereum using Ternary
Classification Model [3.929929061618338]
Front-running attacks, a unique form of security threat, pose significant challenges to the integrity of blockchain transactions.
In these attack scenarios, malicious actors monitor other users' transaction activities, then strategically submit their own transactions with higher fees.
We introduce a novel detection method named FRAD (Front-Running Attacks Detection on using Ternary Classification Model)
Our experimental validation reveals that the Multilayer Perceptron (MLP) classifier offers the best performance in detecting front-running attacks, achieving an impressive accuracy rate of 84.59% and F1-score of 84.60%.
arXiv Detail & Related papers (2023-11-24T14:42:29Z) - G$^2$uardFL: Safeguarding Federated Learning Against Backdoor Attacks
through Attributed Client Graph Clustering [116.4277292854053]
Federated Learning (FL) offers collaborative model training without data sharing.
FL is vulnerable to backdoor attacks, where poisoned model weights lead to compromised system integrity.
We present G$2$uardFL, a protective framework that reinterprets the identification of malicious clients as an attributed graph clustering problem.
arXiv Detail & Related papers (2023-06-08T07:15:04Z) - Blockchain Large Language Models [65.7726590159576]
This paper presents a dynamic, real-time approach to detecting anomalous blockchain transactions.
The proposed tool, BlockGPT, generates tracing representations of blockchain activity and trains from scratch a large language model to act as a real-time Intrusion Detection System.
arXiv Detail & Related papers (2023-04-25T11:56:18Z) - BERT4ETH: A Pre-trained Transformer for Ethereum Fraud Detection [29.518411879700263]
BERT4ETH is a pre-trained Transformer account representation extractor for detecting various fraud behaviors.
BERT4ETH features the superior modeling capability of Transformer to capture the dynamic sequential patterns inherent in transactions.
Our empirical evaluation demonstrates that BERT4ETH outperforms state-of-the-art methods with significant enhancements in terms of the phishing account detection and de-anonymization tasks.
arXiv Detail & Related papers (2023-03-29T20:30:52Z) - Highly Available Blockchain Nodes With N-Version Design [13.131269677617286]
This paper introduces the concept of N-version blockchain nodes.
N-version nodes rely on simultaneous execution of different implementations of the same blockchain protocol.
We show that N-ETH is able to mitigate the effects of unstable execution environments and significantly enhance availability under environment faults.
arXiv Detail & Related papers (2023-03-25T11:16:17Z) - Token Spammers, Rug Pulls, and SniperBots: An Analysis of the Ecosystem of Tokens in Ethereum and the Binance Smart Chain (BNB) [50.888293380932616]
We study the ecosystem of the tokens and liquidity pools, highlighting analogies and differences between the two blockchains.
We estimate the lifetime of the tokens, discovering that about 60% of them are active for less than one day.
We present an exit scam fraud and quantify its prevalence on both blockchains.
arXiv Detail & Related papers (2022-06-16T14:20:19Z) - A Simple Hash-Based Early Exiting Approach For Language Understanding
and Generation [77.85086491395981]
Early exiting allows instances to exit at different layers according to the estimation of difficulty.
We propose a Hash-based Early Exiting approach (HashEE) that replaces the learn-to-exit modules with hash functions to assign each token to a fixed exiting layer.
Experimental results on classification, regression, and generation tasks demonstrate that HashEE can achieve higher performance with fewer FLOPs and inference time.
arXiv Detail & Related papers (2022-03-03T12:02:05Z) - ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep
Neural Network and Transfer Learning [80.85273827468063]
Existing machine learning-based vulnerability detection methods are limited and only inspect whether the smart contract is vulnerable.
We propose ESCORT, the first Deep Neural Network (DNN)-based vulnerability detection framework for smart contracts.
We show that ESCORT achieves an average F1-score of 95% on six vulnerability types and the detection time is 0.02 seconds per contract.
arXiv Detail & Related papers (2021-03-23T15:04:44Z) - Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users [0.0]
We propose and implement user profiling techniques based on quasi-identifiers.
We describe a malicious value-fingerprinting attack, a variant of the Danaan-gift attack, applicable for the confidential transaction overlays.
arXiv Detail & Related papers (2020-05-28T14:33:32Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.