Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3548606.3559342acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Open access

Understanding Security Issues in the NFT Ecosystem

Published: 07 November 2022 Publication History

Abstract

Non-Fungible Tokens (NFTs) have emerged as a way to collect digital art as well as an investment vehicle. Despite having been popularized only recently, NFT markets have witnessed several high-profile (and high-value) asset sales and a tremendous growth in trading volumes over the last year. Unfortunately, these marketplaces have not yet received much security scrutiny. Instead, most academic research has focused on attacks against decentralized finance (DeFi) protocols and automated techniques to detect smart-contract vulnerabilities. To the best of our knowledge, we are the first to study the market dynamics and security issues of the multi-billion dollar NFT ecosystem.
In this paper, we first present a systematic overview of how the NFT ecosystem works, and we identify three major actors: marketplaces, external entities, and users. We then perform an in-depth analysis of the top 8 marketplaces (ranked by transaction volume) to discover potential issues, many of which can lead to substantial financial losses. We also collected a large amount of asset and event data pertaining to the NFTs being traded in the examined marketplaces. We automatically analyze this data to understand how the entities external to the blockchain are able to interfere with NFT markets, leading to serious consequences, and quantify the malicious trading behaviors carried out by users under the cloak of anonymity.

Supplementary Material

MP4 File (CCS22-fp0082.mp4)
This talk is about the systematic study of the emerging Non-Fungible Token (NFT) ecosystem that we conducted on 8 top NFT marketplaces. We first identify three actors in the ecosystem, and then present security and privacy issues and design weaknesses involving all those three actors. In this talk, we explain how we perform both qualitative and quantitative analyses. First, we discover the issues by interacting with the marketplaces, and then quantify the prevalence of those issues by sourcing trading data from the marketplaces. Many of the issues that we identified could lead to potential financial losses. This talk only scratches the surface by explaining a handful of the issues we found. To understand the threat landscape in-depth, please check out our paper.

References

[1]
The 15 most expensive nfts ever sold. https://decrypt.co/62898/most-expensive- nfts-ever-sold.
[2]
The art industry and u.s. policies that undermine sanctions. https: //www.hsgac.senate.gov/imo/media/doc/2020-07-29%20PSI%20Staff% 20Report%20-%20The%20Art%20Industry%20and%20U.S.%20Policies%20that% 20Undermine%20Sanctions.pdf.
[3]
Axie infinity. https://axieinfinity.com.
[4]
Behaviors in the nft ecosystem that we hope will decrease in 2020. https:// nonfungible.com/blog/bad-behaviors-nft-blockchain.
[5]
Bitmix. https://bitmix.online.
[6]
Coingecko. https://www.coingecko.com.
[7]
Cryptokitties. https://www.cryptokitties.co.
[8]
Cryptopunks. https://www.larvalabs.com/cryptopunks.
[9]
Dappradar. https://dappradar.com.
[10]
Decentraland. https://market.decentraland.org/.
[11]
Dune analytics-opensea. https://dune.xyz/rchen8/opensea.
[12]
Echidna. https://github.com/crytic/echidna. [accessed 07/27/2020].
[13]
Eth mixer. https://eth-mixer.com.
[14]
Ethereum name service (ens) as nft. https://docs.ens.domains/dapp-developer- guide/ens-as-nft.
[15]
Fake banksy nft sold through artist's website for £244k. https://www.bbc.com/ news/technology-58399338.
[16]
Flipkick. https://www.flipkick.io.
[17]
Foundation. https://foundation.app.
[18]
Full version of this paper. https://arxiv.org/pdf/2111.08893.pdf. 2022/08/26.
[19]
Hackers stole nfts from nifty gateway users. https://www.theverge.com/2021/3/ 15/22331818/nifty-gateway-hack-steal-nfts-credit-card.
[20]
How do i get a blue checkmark? https://support.opensea.io/hc/en-us/articles/ 360063519133-How-do-I-get-a-blue-checkmark-.
[21]
How nft giant opensea's $3 billion month compares to amazon, ebay and etsy. https://decrypt.co/79789/opensea-3b-month-ethereum-nft-sales-amazon- ebay-etsy.
[22]
Imagehash. https://github.com/JohannesBuchner/imagehash.
[23]
Interplanetary file system (ipfs). https://ipfs.io.
[24]
Mastering ethereum. https://www.oreilly.com/library/view/mastering- ethereum/9781491971932/ch04.html.
[25]
More rari tokens rewarded than the actual art purchase. https://twitter.com/ bergleeuw62/status/1293502649308979200?utm_source=nonfungible.
[26]
Mythril. https://github.com/ConsenSys/mythril.
[27]
Nft mania is here, so are the scammers. https://www.theverge.com/2021/3/20/ 22334527/nft-scams-artists-opensea-rarible-marble-cards-fraud-art.
[28]
Nifty. https://niftygateway.com.
[29]
Now postage stamps are getting the nft treatment. https://decrypt.co/61963/now- postage-stamps-are-getting-the-nft-treatment.
[30]
Opensea. https://opensea.io.
[31]
Perpetual image hash. http://www.hackerfactor.com/blog/index.php?/archives/ 432-Looks-Like-It.html.
[32]
Rarible. https://https://rarible.com.
[33]
Real estate tokenization. https://www.blockchainappfactory.com/real-estate- tokenization.
[34]
Signing and verifying ethereum signatures. https://yos.io/2018/11/16/ethereum- signatures.
[35]
Social engineering nft users through unauthorized support channel. https://www.theverge.com/22683766/nft-scams-theft-social-engineering-opensea-community-recovery.
[36]
Solana nft project accused of rug pull after lil uzi deletes tweets. https://cryptobriefing.com/solana-nft-project-accused-of-rug-pull-after-lil-uzi-deletes-tweets.
[37]
Sorare. https://sorare.com.
[38]
The specter of shill bidding around nfts - tokensmart nft humpday report 15. https://nft.substack.com/p/the-specter-of-shill-bidding-around.
[39]
Superrare. https://superrare.com.
[40]
Tornado cash. https://tornado.cash.
[41]
Usps certifies casemail as first blockchain generated epostage. https: //www.prnewswire.com/news-releases/usps-certifies-casemail-as-first- blockchain-generated-epostage-301267842.html.
[42]
What is "wash trading" and why is it negative for non-fungible tokens? https://nonfungible.com/blog/wash-trading-and-why-its-negative-for- non-fungible-tokens.
[43]
You can now buy gold-backed nfts with the mining carbon footprint off- set. https://cointelegraph.com/news/you-can-now-buy-gold-backed-nfts-with-the-mining-carbon-footprint-offset.
[44]
Manticore. https://github.com/trailofbits/manticore/, 2016.
[45]
Etherscan. https://etherscan.io/, 2018.
[46]
Priyanka Bose, Dipanjan Das, Yanju Chen, Yu Feng, and Christopher Kruegel Giovanni Vigna. Sailfish: vetting smart contract state-inconsistency bugs in seconds. In Proc. IEEE Symposium on Security and Privacy, 2022.
[47]
Philip Daian, Steven Goldfeder, T. Kell, Yunqi Li, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, and A. Juels. Flash boys 2.0: Frontrunning, transaction reordering, and consensus instability in decentralized exchanges. In Proc. IEEE Symposium on Security and Privacy, 2020.
[48]
William Entriken, Dieter Shirley, Jacob Evans, and Nastassia Sachs. Eip-721: Erc-721 non-fungible token standard, ethereum improvement proposals, no. 721. https://eips.ethereum.org/EIPS/eip-721.
[49]
Shayan Eskandari, Seyedehmahsa Moosavi, and Jeremy Clark. Sok: Transparent dishonesty: Front-running attacks on blockchain. In Proc. Financial Cryptography and Data Security, 2020.
[50]
Joel Frank, Cornelius Aschermann, and Thorsten Holz. ETHBMC: A bounded model checker for smart contracts. In Proc. USENIX Security Symposium, 2020.
[51]
Neil Gandal, JT Hamrick, Tyler Moore, and Tali Oberman. Price manipulation in the bitcoin ecosystem. Journal of Monetary Economics, 95, 01 2018.
[52]
Neville Grech, Michael Kong, Anton Jurisevic, Lexi Brent, Bernhard Scholz, and Yannis Smaragdakis. Madmax: surviving out-of-gas conditions in ethereum smart contracts. In Proc. International Conference on Object-Oriented Programming, Systems, Languages, and Applications, 2018.
[53]
Shelly Grossman, Ittai Abraham, Guy Golan-Gueta, Yan Michalevsky, Noam Rinetzky, Mooly Sagiv, and Yoni Zohar. Online detection of effectively callback free objects with applications to smart contracts. In Proc. Symposium on Principles of Programming Languages, 2018.
[54]
Bo Jiang, Ye Liu, and W. K. Chan. Contractfuzzer: fuzzing smart contracts for vulnerability detection. In Proc. International Conference on Automated Software Engineering, 2018.
[55]
Sukrit Kalra, Seep Goel, Mohan Dhawan, and Subodh Sharma. ZEUS: analyzing safety of smart contracts. In Proc. The Network and Distributed System Security Symposium, 2018.
[56]
Josh Kamps and Bennett Kleinberg. To the moon: defining and detecting cryp- tocurrency pump-and-dumps. Crime Science, 7(1):18, Nov 2018.
[57]
Kai Li, Jiaqi Chen, Xianghong Liu, Yuzhe Tang, Xiaofeng Wang, and Xiapu Luo. As strong as its weakest link: How to break blockchain dapps at rpc service. In Proc. The Network and Distributed System Security Symposium, 2021.
[58]
Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, and Aquinas Hobor. Making smart contracts smarter. In Proc. Conference on Computer and Communications Security, 2016.
[59]
Matthieu Nadini, Laura Alessandretti, Flavio Di Giacinto, Mauro Martino, Luca Maria Aiello, and Andrea Baronchelli. Mapping the nft revolution: market trends, trade networks, and visual features. Scientific Reports, 2021.
[60]
Tai Nguyen, Long Pham, Jun Sun, Yun Lin, and Minh Quang Tran. sfuzz: An efficient adaptive fuzzer for solidity smart contracts. In Proc. International Conference on Software Engineering, 2020.
[61]
Kaihua Qin, Liying Zhou, and Arthur Gervais. Quantifying blockchain extractable value: How dark is the forest? ArXiv, abs/2101.05511, 2021.
[62]
Kaihua Qin, Liying Zhou, B. Livshits, and Arthur Gervais. Attacking the defi ecosystem with flash loans for fun and profit. In Proc. Financial Cryptography and Data Security, 2021.
[63]
Jarrod Trevathan and Wayne Read. Detecting Shill Bidding in Online English Auctions, pages 446--470. 01 2008.
[64]
Petar Tsankov, Andrei Marian Dan, Dana Drachsler-Cohen, Arthur Gervais, Florian Bünzli, and Martin T. Vechev. Securify: Practical security analysis of smart contracts. In Proc. Conference on Computer and Communications Security, 2018.
[65]
Friedhelm Victor and Andrea Marie Weintraud. Detecting and quantifying wash trading on decentralized cryptocurrency exchanges. In Proc. The Web Conference, pages 23--32, 2021.
[66]
Fabian Vogelsteller and Vitalik Buterin. Eip-20: Erc-20 token standard, ethereum improvement proposals, no. 20. https://eips.ethereum.org/EIPS/eip-20. 2021/07/11.
[67]
Qin Wang, Rujia Li, Qi Wang, and Shiping Chen. Non-fungible token (nft): Overview, evaluation, opportunities and challenges. arxiv, abs/2105.07447, 2021.
[68]
Jiahua Xu and Benjamin Livshits. The anatomy of a cryptocurrency pump-and-dump scheme. In Proc. USENIX Security Symposium, 2019.
[69]
Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, and Zhiqiang Lin. TXSPECTOR: Uncovering attacks in ethereum from transactions. In Proc. USENIX Security Symposium, 2020.
[70]
Liying Zhou, Kaihua Qin, Antoine Cully, Benjamin Livshits, and Arthur Gervais. On the just-in-time discovery of profit-generating transactions in defi protocols. In Proc. IEEE Symposium on Security and Privacy, 2021.
[71]
Liying Zhou, Kaihua Qin, C. F. Torres, D. Le, and Arthur Gervais. High-frequency trading on decentralized on-chain exchanges. In Proc. IEEE Symposium on Security and Privacy, 2020.

Cited By

View all
  • (2024)Novel Cryptocurrency Investment Approaches: Risk Reduction and Diversification through Index Based StrategiesCryptocurrencies - Financial Technologies of the Future [Working Title]10.5772/intechopen.1004097Online publication date: 1-Feb-2024
  • (2024)NFT-Based Marketing CampaignsAdoption of NFTs and Cryptocurrency in Marketing10.4018/979-8-3693-1392-3.ch008(91-120)Online publication date: 22-Mar-2024
  • (2024)Application of Graph Theory for Blockchain TechnologiesMathematics10.3390/math1208113312:8(1133)Online publication date: 10-Apr-2024
  • Show More Cited By

Index Terms

  1. Understanding Security Issues in the NFT Ecosystem

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
    November 2022
    3598 pages
    ISBN:9781450394505
    DOI:10.1145/3548606
    This work is licensed under a Creative Commons Attribution International 4.0 License.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 November 2022

    Check for updates

    Author Tags

    1. blockchain
    2. decentralized finance (defi)
    3. non-fungible token (nft)

    Qualifiers

    • Research-article

    Conference

    CCS '22
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '24
    ACM SIGSAC Conference on Computer and Communications Security
    October 14 - 18, 2024
    Salt Lake City , UT , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2,106
    • Downloads (Last 6 weeks)172
    Reflects downloads up to 30 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Novel Cryptocurrency Investment Approaches: Risk Reduction and Diversification through Index Based StrategiesCryptocurrencies - Financial Technologies of the Future [Working Title]10.5772/intechopen.1004097Online publication date: 1-Feb-2024
    • (2024)NFT-Based Marketing CampaignsAdoption of NFTs and Cryptocurrency in Marketing10.4018/979-8-3693-1392-3.ch008(91-120)Online publication date: 22-Mar-2024
    • (2024)Application of Graph Theory for Blockchain TechnologiesMathematics10.3390/math1208113312:8(1133)Online publication date: 10-Apr-2024
    • (2024)Role of Nft in MetaverseSSRN Electronic Journal10.2139/ssrn.4485278Online publication date: 2024
    • (2024)COMET: NFT Price Prediction with Wallet ProfilingProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671621(5893-5904)Online publication date: 25-Aug-2024
    • (2024)"Centralized or Decentralized?": Concerns and Value Judgments of Stakeholders in the Non-Fungible Tokens (NFTs) MarketProceedings of the ACM on Human-Computer Interaction10.1145/36373058:CSCW1(1-34)Online publication date: 26-Apr-2024
    • (2024)Unveiling Wash Trading in Popular NFT MarketsCompanion Proceedings of the ACM Web Conference 202410.1145/3589335.3651580(730-733)Online publication date: 13-May-2024
    • (2024)Characterizing Ethereum Upgradable Smart Contracts and Their Security ImplicationsProceedings of the ACM Web Conference 202410.1145/3589334.3645640(1847-1858)Online publication date: 13-May-2024
    • (2024)Unveiling the Paradox of NFT ProsperityProceedings of the ACM Web Conference 202410.1145/3589334.3645566(167-177)Online publication date: 13-May-2024
    • (2024)Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature LearningIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.332698419(616-631)Online publication date: 1-Jan-2024
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media