the fallback method, as there is also a call of withdraw
method in the target contract, while the balance of this
account has not been modified from the primary
balance, which leads to another time for withdrawing
balance from the target contract. When the balance
Ether on the target contract comes to zero, the
fallback method ends and begins to return, making no
sense anymore as the Ethers of the target contract has
been transferred to the attack contract.
For solving this attack immediately, the Ethereum
official tried to send plenty of transactions to block
the blockchain and came to the idea that having a soft
branch between the hacked Ethers and the main
blockchain of Ethereum (Dhillon, 2017).
Nonetheless, the reason that users act on the
blockchain is mainly because of the decentralization
and privacy. Whereas, the action of the official
accounts that there is still a third party to supervise
and control the whole blockchain ledgers, and having
the ability to modify users’ transaction and action,
disobeying to the consensus mechanism
(Praitheeshan, 2019). After this soft branch and hard
branch in the next few months, there are two main
blockchains, ETC and ETH, operation by the original
users who believe in and preserve the consensus
mechanism and by the official Ethereum respectively.
6 LIMITATIONS & PROSPECTS
During several years of development of blockchain,
there are some experienced strategies to solve trading
security vulnerabilities. Whereas, the limitations are
also obvious, especially in cryptocurrencies
transaction which is connected with users closely, as
listed in following:
Protocol limitation. Blockchain depends on a
consensus mechanism protocol to keep the platform
working, while this mechanism is quite different on
different blockchain platforms, standing for a weak
consensus (Sayeed, 2020). Therefore, when an attack
happens on the blockchain, the blocks will be
removed, and then, damage the blockchain fully. In
addition, another protocol Pow, Proof of Work, is a
disadvantage in blockchain, which accounts for huge
energy consuming for proofing and validating
transactions, limiting the mining time to add a block
onto the blockchain as a low efficiency on operations.
For this limitation, multiple withdrawal attacks and
also selfish mining attacks were designed to attack
this weakness.
Transaction time limitation. As shown in Fig. 1,
when users want to transact on the blockchain, miners
need to validate the transaction by calculating.
Conversely, this time is always long and depends on
various issues such as the block size and the gas fee
which is used as a reward for miners’ work
(Gebraselase, 2021). Although this long-time
validation provides some security indeed, it leads to
lots of attacks such as double spending and multiple
withdrawal attack, which are caused by the time delta
between sending and validating. The other
disadvantage is that most of the users have no
intention to wait for such a long time, while their time
can also be regarded as money.
Smart contract limitation. This always happens
on an application tier, as after deploying the smart
contract with an application. Once the smart contract
has vulnerabilities, the attackers can make use of
them and steal lots of cryptocurrencies and destroy
the security and also the blockchain. This attack
always occurs when smart contract developers fail to
find and identify the code bugs, and when the smart
contract is deployed, it is static on the blockchain,
which means that the developers cannot modify it
anymore despite deploying a new smart contract,
causing finance loss if the previous threat smart
contract has been used for a long time. Just like the
DAO hack (Dhillon, 2017), the smart contract has
collected lots of Ethers from the blockchain, but, at
that time, the underlying threats appeared, leading to
a huge influence such as the furcation of the two kinds
of cryptocurrencies.
It is undeniable that the appearance of blockchain
and cryptocurrencies makes a significant influence on
trading and finance, while they have not gotten into a
mature way, especially in cryptocurrency trading and
transactions. PoA, Proof of Activity, can be
considered to have wider use in the future to having
less energy consuming by miners and shortening the
time for validating the transaction, which can avoid
some attacks such as multiple withdrawal attacks that
depending on the time difference, and increasing the
enthusiasm on mining (Sayeed, 2020). In addition,
another aspect of the strength of security is that more
work can be done on smart contract. It is obvious that
lots of attacks on the blockchain are caused by some
vulnerabilities on smart contracts, for example, the
DAO hack due to a reentrance attack by contract
threat and the multi-sig wallet attack, which is also an
attack caused by attackers hacking on smart contracts.
It is possible that the blockchain platforms can give
more instructions on smart contract generation and
deployment, together with forbidding unsafe methods
in smart contracts to avoid developers’ misusing
when applying. While the last aspect can be users’
actions. The protection of private keys should be
considered, with more secure ways to use them such