区块链恶意交易的层次化研究综述
Review of Hierarchical Research on Malicious Transactions in Blockchain
摘要
Abstract
Although blockchain technology has significant advantages in decentralization and security,the threat of malicious transactions latent in its layered architecture is increasingly complex,and the existing research mostly focuses on the security analysis of a single layer and lacks the systematic exploration of cross-layer attack conduction mechanism.A hierarchical malicious transaction analysis framework including the basic protocol layer,the basic chain layer,the extended solution layer,and the application layer is proposed,which deeply analyzes the hierarchical problem of malicious transactions in blockchain technology,and completely summarizes the research progress of the existing methods for detecting and defending against malicious attacks.Firstly,the malicious attacks in the above four layers are reviewed and analyzed,and the definitions and attack forms of 35 types of malicious attacks are outlined;there is a significant conduction effect between the attacks in each layer,and the key leakage in the protocol layer can expand the loss of the DeFi protocol in the application layer by several times.Secondly,the detection methods of each type of attack as well as the defense methods are introduced respectively,and the relevant technologies that can be used to defend against this type of attack are summarized.Finally,the existing security problems in each layer of the blockchain are analyzed:high power consumption of post-quantum cryptography algorithms in blockchain devices,confirmation delays and low block exit speeds,complexity and security risks of the proxy contract model,and the state growth risks of Rollups.According to this,four directions are proposed for future research:low-power design of post-quantum cryptography,dynamic block time and adaptive block exit speeds,enhancing the security and efficiency of the proxy contract model and Verkle tree constant size proof scheme for stateless clients.关键词
区块链/安全/攻击/漏洞检测Key words
blockchain/security/attacks/vulnerability detection分类
信息技术与安全科学引用本文复制引用
李嘉乐,李雷孝,林浩,杜金泽,史建平,刘哲旭..区块链恶意交易的层次化研究综述[J].计算机科学与探索,2025,19(10):2559-2586,28.基金项目
国家自然科学基金(62362055) (62362055)
内蒙古自治区重点研发与成果转化计划项目(2022YFSJ0013,2023YFHH0052) (2022YFSJ0013,2023YFHH0052)
内蒙古自治区高等学校青年科技英才支持计划项目(NJYT22084,NJYT24035) (NJYT22084,NJYT24035)
内蒙古自然科学基金(2023MS06008) (2023MS06008)
内蒙古自治区科技成果转化专项资金项目(2020CG0073,2021CG0033) (2020CG0073,2021CG0033)
内蒙古自治区直属高校科研项目(JY20220061,JY20230119,JY20230019) (JY20220061,JY20230119,JY20230019)
鄂尔多斯市重点研发计划(YF20232328) (YF20232328)
国家重点研发计划(2023YFB2703900).This work was supported by the National Natural Science Foundation of China(62362055),the Key Research and Development and Achievement Transformation Programme Projects of Inner Mongolia Autonomous Region(2022YFSJ0013,2023YFHH0052),the Support Programme for Young Scientific and Technological Talents in Higher Education Institutions in Inner Mongolia Autonomous Region(NJYT22084,NJYT24035),the Natural Science Foundation of Inner Mongolia(2023MS06008),the Special Funds for Transformation of Scientific and Technological Achievements in Inner Mongolia Autonomous Region(2020CG0073,2021CG0033),the Research Projects of Universities Directly under the Inner Mongolia Autonomous Region(JY20220061,JY20230119,JY20230019),the Ordos Key Research and Development Program Project(YF20232328),and the National Key Research and Development Program of China(2023YFB2703900). (2023YFB2703900)