Crypto Gloom

Research Review: SoK: Security of Cross-Chain Bridges: Attack Surfaces, Defenses, and Open Issues | Posted by Ervin Zubic | Coins | January 2024

Erwin Zubik
Coin Monk

Explore our research review of cross-chain bridge security to find critical vulnerabilities and defenses in blockchain interoperability to ensure safe and secure token exchange across various blockchain platforms.

Image of a female librarian reviewing blockchain research.
Research review. Image created using DALL-E.

publication date: December 19, 2023

introduction

The rapid expansion of blockchain technology has introduced smart contracts, which are the backbone of numerous applications, especially decentralized applications (DApps). Despite its growth, blockchain faces serious limitations. This means that it operates in an isolated environment and cannot interact with other blockchains. This is where cross-chain bridges come into play, serving as critical infrastructure that facilitates the exchange of tokens and data across various blockchains. Mengya Zhang et al.’s paper “SoK: Security of Cross-Chain Bridges: Attack Surfaces, Defenses, and Disclosure Issues,” published on December 19, 2023, addresses the new challenges and vulnerabilities associated with these bridges.

Research Paper Summary

Cross-chain bridges are becoming increasingly popular, with approximately 80 bridges in existence at the time of publication. This enables transactions such as transfer, governance, lending, borrowing, and staking of tokens across various blockchains. However, as its popularity has grown, it has become a major target of cyberattacks and significant financial losses have been reported. For example, the ChainSwap and Nomad hacks resulted in losses of $8 million and $190 million respectively. Attacks on cross-chain bridges accounted for 69% of all DeFi attack losses from January to July 2022.

This whitepaper categorizes cross-chain bridges based on their verification methods (external, local, optimistic, and native verification), communication models (lock and mint, burn and release, liquidity pool-based), and functionality. The study identified 12 potential attack vectors and categorized past bridge attacks into 10 types. We provide detailed descriptions of each vulnerability supported in Solidity code examples. The paper concludes with open questions about existing and potential defenses against these vulnerabilities and directions for future research.

Image showing a table listing various cross-chain bridges and detailing their Total Value Locked (TVL), verification mechanism, communication model, trust mechanism, operating layer, features, and the blockchains they support.
Table adapted from: SoK: Security of Cross-Chain Bridges: Attack Surface, Defenses, and Open IssuesDecember 19, 2023, pages 1–20, https://arxiv.org/abs/2312.12573.

critical analysis

This comprehensive study plays a pivotal role in highlighting the security landscape of cross-chain bridges. It categorizes bridges and their vulnerabilities and provides practical insight into how they can be exploited and mitigated. The use of real-world examples and Solidity code makes the analysis especially useful for developers and researchers. However, this paper focuses more on summarizing and classifying existing knowledge rather than proposing new solutions or methodologies to mitigate these vulnerabilities.

Implications and Potential

The insights provided in this white paper are critical to the continued development of secure blockchain technology. Cross-chain bridges are essential to the interoperability and functionality of blockchains, so understanding their security vulnerabilities is essential. Classification of attacks and vulnerabilities can help developers strengthen the security of current and future cross-chain bridges. Additionally, discussion of open issues and future research directions can serve as a roadmap for the blockchain community and potentially lead to more robust and secure cross-chain communication methods.

conclusion

“SoK: Security of Cross-Chain Bridges: Attack Surfaces, Defenses, and Open Issues” by Mengya Zhang et al. is a significant contribution to the field of blockchain security. Organizing knowledge about cross-chain bridge vulnerabilities and defenses provides a valuable resource for developers and researchers in this field. The relevance of this research extends beyond academia to impact the broader blockchain community, potentially influencing the development of more secure and efficient cross-chain protocols.