Researchers Wenwen Zhou, Dongyang Lyu, and Xiaoqi Li from the School of Computer Science and Technology at the University of Science and Technology Beijing have published a comprehensive review of blockchain security, focusing on cryptographic vulnerabilities and mitigation strategies. Their work provides a detailed analysis of attacks on blockchain systems, offering insights into the evolving threats and potential defences in this rapidly advancing field.
The researchers begin by outlining the foundational cryptographic technologies that underpin blockchain systems, including hash functions and digital signatures. These mechanisms are critical to ensuring the integrity, authenticity, and security of blockchain transactions. Hash functions, for instance, convert data into fixed-length strings, making it nearly impossible to reverse-engineer the original input. Digital signatures, on the other hand, authenticate the identity of users and ensure that transactions cannot be tampered with once they are recorded on the blockchain.
The study then delves into the six-layer architecture of blockchain systems, examining vulnerabilities at each level. At the data layer, where transactions are stored, the researchers highlight the risks of data tampering and forgery. The network layer, responsible for communication between nodes, is susceptible to attacks such as Sybil attacks, where an attacker creates multiple fake identities to disrupt the network. The consensus layer, which ensures agreement among nodes, faces threats like the 51% attack, where a single entity gains control of the majority of the network’s computing power, enabling them to manipulate transactions. The contract layer, which automates agreements, is vulnerable to reentrancy attacks, where a contract is repeatedly called before the first call is completed, leading to unintended consequences. The incentive layer, which rewards participants for maintaining the network, can be exploited through double-spending attacks, where the same digital currency is spent more than once. Finally, the application layer, where users interact with the blockchain, is at risk of replay attacks, where a valid transaction is maliciously repeated, and timestamp tampering, where the timing of transactions is altered to deceive participants.
For each of these attacks, the researchers propose mitigation strategies. For example, to counter the 51% attack, they suggest increasing the computational power required to control the network, making it economically unfeasible for an attacker to gain majority control. To prevent double-spending, they recommend implementing robust consensus mechanisms that verify transactions across multiple nodes before they are recorded. Reentrancy attacks can be mitigated by ensuring that smart contracts include checks to prevent repeated calls before the initial transaction is completed. Sybil attacks can be mitigated by implementing identity verification protocols that make it difficult for attackers to create multiple fake identities. Replay attacks can be countered by using unique transaction identifiers that prevent the same transaction from being repeated. Timestamp tampering can be addressed by using decentralised timestamping services that provide immutable records of transaction times.
The researchers also discuss the broader challenges facing blockchain security, such as the need for scalable and efficient consensus mechanisms that can handle large volumes of transactions without compromising security. They emphasise the importance of continuous research and development to stay ahead of emerging threats and ensure the long-term viability of blockchain technology.
Looking ahead, the study projects that future advancements in cryptography and consensus mechanisms will play a crucial role in enhancing blockchain security. The researchers call for greater collaboration between academia, industry, and government to address these challenges and foster innovation in the field. By doing so, they argue, blockchain technology can realise its full potential as a secure and decentralised framework for digital transactions and data management.
The findings of this research are particularly relevant to the defence and security sector, where blockchain technology is increasingly being explored for applications such as secure communications, supply chain management, and electronic evidence preservation. By understanding the vulnerabilities and mitigation strategies outlined in this study, defence and security professionals can better assess the risks and benefits of adopting blockchain technology in their operations. The insights provided by Zhou, Lyu, and Li offer a valuable roadmap for enhancing the security of blockchain systems, ensuring that they remain resilient against evolving threats. Read the original research paper here.

