Security Analysis of DeFi: Vulnerabilities, Attacks and Advances.
Wenkai LiJiuyang BuXiaoqi LiXianyi ChenPublished in: Blockchain (2022)
Keyphrases
- security analysis
- security vulnerabilities
- security properties
- security mechanisms
- security requirements
- smart card
- countermeasures
- information security
- security risks
- stream cipher
- password guessing
- security model
- high security
- public key
- buffer overflow
- security problems
- authentication protocol
- defense mechanisms
- security protocols
- security issues
- encryption scheme
- mutual authentication
- authentication scheme
- user authentication
- security threats
- security policies
- private key
- access control policies
- network security
- encryption algorithm
- information systems
- software engineering