DLT Interoperability and More ⛓️#15 ⛓️ — SoK: Not Quite Water Under the Bridge: Review of Cross-Chain Bridge Hacks

In this series, we analyze papers on blockchain and interoperability.

This edition covers a paper that surveys cross-chain bridge hacks.

➡️ Title: SoK: Not Quite Water Under the Bridge: Review of Cross-Chain Bridge Hacks
➡️ Authors: Sung-Shine Lee, Alexandr Murashkin, Martin Derka, Jan Gorzny

➡️ Paper source: https://arxiv.org/abs/2210.16209

➡️ Background:

Background on blockchain interoperability can be found here.

The background on bridges can be found in Section 2 of the current paper, but the process, in a nutshell, is:

Source: https://arxiv.org/abs/2210.16209

This is, it follows a lock-unlock mechanism. Lock tokens on the source chain (namely on the custodian contract), which emits an event. A communicator watches these events and issues debt tokens (a representation of the token on the source chain). The structure and types of communicators can be found in our work published at ACM DLT.

➡️ Contributions:

💪 Strong points:

🤞 Suggestions for improvement:

🔥 Points of interest:

🚀 How does it relate to our work at Técnico Lisboa, INESC-ID, and Blockdaemon? (views are my own and do not necessarily reflect the opinions of my employer)

🚀 What are the implications for our work?

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Rafael Belchior

R&D Engineer at Blockdaemon. Opinions and articles are my own and do not necessarily reflect the view of my employer. https://rafaelapb.github.io