Blockchain technology has continued to evolve rapidly in recent years. However, the lack of efficient methods to transmit data and value between different blockchains has created many disjoint data silos. Cross-chain technology has been introduced and applied across various fields, including distributed transaction platforms, digital finance, and electronic governance, to address this issue. However, this, in turn, reignited concerns regarding possible vulnerabilities in the cross-chain environment. In this paper, we aim to explore how double-spending vulnerabilities manifest in cross-chain environments. Specifically, we investigate how attack vectors at consensus-level and network-level may be leveraged or amplified in cross-chain transactions. Although, double-spending attacks are well-documented in single-chain systems, there are still issues and challenges related to these vulnerabilities in blockchain interoperability settings.This allows us to pinpoint the potential security threats associated with cross-chain technology and identify future research directions.

Double-Spending Attacks in Cross-Blockchain Ecosystems

Mukherjee, Aradhita;Olivieri, Luca;Chaki, Nabendu;Cortesi, Agostino
2025-01-01

Abstract

Blockchain technology has continued to evolve rapidly in recent years. However, the lack of efficient methods to transmit data and value between different blockchains has created many disjoint data silos. Cross-chain technology has been introduced and applied across various fields, including distributed transaction platforms, digital finance, and electronic governance, to address this issue. However, this, in turn, reignited concerns regarding possible vulnerabilities in the cross-chain environment. In this paper, we aim to explore how double-spending vulnerabilities manifest in cross-chain environments. Specifically, we investigate how attack vectors at consensus-level and network-level may be leveraged or amplified in cross-chain transactions. Although, double-spending attacks are well-documented in single-chain systems, there are still issues and challenges related to these vulnerabilities in blockchain interoperability settings.This allows us to pinpoint the potential security threats associated with cross-chain technology and identify future research directions.
File in questo prodotto:
File Dimensione Formato  
double-spending-bcra25.pdf

accesso aperto

Descrizione: Author’s Accepted Manuscript
Tipologia: Documento in Post-print
Licenza: Creative commons
Dimensione 813.42 kB
Formato Adobe PDF
813.42 kB Adobe PDF Visualizza/Apri

I documenti in ARCA sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10278/5106022
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact