Security Analysis of DeFi: Vulnerabilities, Attacks and Advances.
Wenkai LiJiuyang BuXiaoqi LiXianyi ChenPublished in: CoRR (2022)
Keyphrases
- security analysis
- security mechanisms
- security vulnerabilities
- security requirements
- security properties
- countermeasures
- smart card
- information security
- security risks
- stream cipher
- security problems
- buffer overflow
- password guessing
- security threats
- security model
- image encryption
- high security
- public key
- user authentication
- encryption algorithm
- security protocols
- security issues
- security policies
- access control
- access control policies
- encryption scheme
- defense mechanisms
- resource constrained
- elliptic curve cryptography
- authentication protocol
- mutual authentication
- watermarking scheme
- authentication scheme
- operating system
- intrusion detection