A Comprehensive Overview of Security Vulnerability Penetration Methods
in Blockchain Cross-Chain Bridges
- Qianrui Zhao,
- Yinan Wang,
- Bo Yang,
- Ke Shang,
- Maozeng Sun,
- Haijun Wang,
- Zijiang Yang,
- Haojie Xin
Haijun Wang
Xi'an Jiaotong University
Corresponding Author:haijunwang@xjtu.edu.cn
Author ProfileAbstract
Cross-chain bridges are crucial mechanisms for facilitating
interoperation between different blockchains, allowing the flow of
assets and information across various chains. Their pivotal role and the
vast value of assets they handle make them highly attractive to
attackers. Major security incidents involving cross-chain bridge
projects have been occurring frequently, resulting in losses of several
billion due to cyber attacks. The diversity of vulnerability
exploitation methods by hackers is vast, but not entirely untraceable.
There are scarce research outcomes studying cross-chain bridge cyber
incidents, and we have conducted a study based on the most recent
cross-chain bridge security incidents. We introduce the working
principles, components, and architecture of cross-chain bridges, explain
the categorization mechanisms of the trust layer in cross-chain bridges,
summarize four categories of hacker vulnerability exploitation
techniques from real cases, and propose preventative measures for
cross-chain bridge security.10 Oct 2023Submitted to Journal of Software: Evolution and Process 18 Oct 2023Submission Checks Completed
18 Oct 2023Assigned to Editor
07 Feb 2024Review(s) Completed, Editorial Evaluation Pending
13 Apr 2024Editorial Decision: Revise Major
07 Jul 20241st Revision Received
29 Jul 2024Submission Checks Completed
29 Jul 2024Assigned to Editor
08 Aug 2024Reviewer(s) Assigned
20 Sep 2024Review(s) Completed, Editorial Evaluation Pending