{"id":10540,"date":"2022-07-07T08:22:11","date_gmt":"2022-07-07T08:22:11","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/?post_type=session&#038;p=10540"},"modified":"2024-09-03T02:18:55","modified_gmt":"2024-09-03T02:18:55","slug":"discovering-and-investigating-propagated-vulnerabilities-from-ethereum-to-its-layer-2-blockchains","status":"publish","type":"session","link":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/discovering-and-investigating-propagated-vulnerabilities-from-ethereum-to-its-layer-2-blockchains\/","title":{"rendered":"Discovering and Investigating Propagated Vulnerabilities from Ethereum to Its Layer-2 Blockchains"},"content":{"rendered":"<div class=\"simple_format\">\n<p><strong><a href=\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/materials\/D2T1%20-%20%20Discovering%20and%20Investigating%20Propagated%20Vulnerabilities%20from%20Ethereum%20to%20Its%20Layer-2%20Blockchains%20-%20Daoyuan%20Wu%20&amp;%20Ning%20Liu.pdf\">PRESENTATION SLIDES<\/a><\/strong><\/p>\n<p style=\"text-align: justify;\">Ethereum is the most popular blockchain for hosting smart contracts. Despite its decentralization, Ethereum suffers from expensive transaction fees and low throughput in terms of TPS (transactions per second). As a result, third-party layer-2 blockchain networks have emerged in recent years, including self-contained networks such as BSC, Polygon, and Avalanche, as well as roll-up-based networks like Optimism, Avalanche, and Base.<\/p>\n<p style=\"text-align: justify;\">In this talk, we will introduce our recent efforts to discover how Ethereum&#8217;s CVE vulnerabilities could propagate from Ethereum to BSC\/Optimism\/Base\/Mantle. The discussion consists of the following three parts:<\/p>\n<ul style=\"text-align: justify;\">\n<li>First, the architectural background between Ethereum and its layer-2 blockchain networks will be introduced (around 8 minutes).<\/li>\n<li>Second, a novel tool, BlockScope (see the attached whitepaper), will be discussed in terms of its design and implementation (around 18 minutes).<\/li>\n<li>Third, our vulnerability discovery in BSC\/Optimism\/Base\/Mantle, including a total of 15 zero-day vulnerabilities (1 for BSC, 4 for Optimism, and 5 for Base\/Mantle), will be introduced (around 24 minutes).<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><strong><br \/>\nLastly, we will open-source BlockScope for the first time at this conference.<\/strong><\/p>\n<\/div>\n","protected":false},"template":"","class_list":["post-10540","session","type-session","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Discovering and Investigating Propagated Vulnerabilities from Ethereum to Its Layer-2 Blockchains - HITBSecConf2024 - Bangkok<\/title>\n<meta name=\"description\" content=\"In this talk, I will introduce our recent efforts to discover how Ethereum&#039;s CVE vulnerabilities could propagate from Ethereum to BSC\/Optimism\/Base\/Mantle. The discussion consists of the following three parts:\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/discovering-and-investigating-propagated-vulnerabilities-from-ethereum-to-its-layer-2-blockchains\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Discovering and Investigating Propagated Vulnerabilities from Ethereum to Its Layer-2 Blockchains\" \/>\n<meta property=\"og:description\" content=\"In this talk, I will introduce our recent efforts to discover how Ethereum&#039;s CVE vulnerabilities could propagate from Ethereum to BSC\/Optimism\/Base\/Mantle. The discussion consists of the following three parts:\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/discovering-and-investigating-propagated-vulnerabilities-from-ethereum-to-its-layer-2-blockchains\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBSecConf2024 - Bangkok\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-03T02:18:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-content\/uploads\/sites\/22\/2024\/06\/ning-liu.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/discovering-and-investigating-propagated-vulnerabilities-from-ethereum-to-its-layer-2-blockchains\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/discovering-and-investigating-propagated-vulnerabilities-from-ethereum-to-its-layer-2-blockchains\/\",\"name\":\"Discovering and Investigating Propagated Vulnerabilities from Ethereum to Its Layer-2 Blockchains - HITBSecConf2024 - Bangkok\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/#website\"},\"datePublished\":\"2022-07-07T08:22:11+00:00\",\"dateModified\":\"2024-09-03T02:18:55+00:00\",\"description\":\"In this talk, I will introduce our recent efforts to discover how Ethereum's CVE vulnerabilities could propagate from Ethereum to BSC\/Optimism\/Base\/Mantle. The discussion consists of the following three parts:\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/discovering-and-investigating-propagated-vulnerabilities-from-ethereum-to-its-layer-2-blockchains\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/discovering-and-investigating-propagated-vulnerabilities-from-ethereum-to-its-layer-2-blockchains\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/discovering-and-investigating-propagated-vulnerabilities-from-ethereum-to-its-layer-2-blockchains\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Session\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Discovering and Investigating Propagated Vulnerabilities from Ethereum to Its Layer-2 Blockchains\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/\",\"name\":\"HITBSecConf2024 - Bangkok\",\"description\":\"August 26 - 30 @ InterContinental\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Discovering and Investigating Propagated Vulnerabilities from Ethereum to Its Layer-2 Blockchains - HITBSecConf2024 - Bangkok","description":"In this talk, I will introduce our recent efforts to discover how Ethereum's CVE vulnerabilities could propagate from Ethereum to BSC\/Optimism\/Base\/Mantle. The discussion consists of the following three parts:","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/discovering-and-investigating-propagated-vulnerabilities-from-ethereum-to-its-layer-2-blockchains\/","og_locale":"en_US","og_type":"article","og_title":"Discovering and Investigating Propagated Vulnerabilities from Ethereum to Its Layer-2 Blockchains","og_description":"In this talk, I will introduce our recent efforts to discover how Ethereum's CVE vulnerabilities could propagate from Ethereum to BSC\/Optimism\/Base\/Mantle. The discussion consists of the following three parts:","og_url":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/discovering-and-investigating-propagated-vulnerabilities-from-ethereum-to-its-layer-2-blockchains\/","og_site_name":"HITBSecConf2024 - Bangkok","article_modified_time":"2024-09-03T02:18:55+00:00","og_image":[{"width":300,"height":300,"url":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-content\/uploads\/sites\/22\/2024\/06\/ning-liu.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/discovering-and-investigating-propagated-vulnerabilities-from-ethereum-to-its-layer-2-blockchains\/","url":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/discovering-and-investigating-propagated-vulnerabilities-from-ethereum-to-its-layer-2-blockchains\/","name":"Discovering and Investigating Propagated Vulnerabilities from Ethereum to Its Layer-2 Blockchains - HITBSecConf2024 - Bangkok","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/#website"},"datePublished":"2022-07-07T08:22:11+00:00","dateModified":"2024-09-03T02:18:55+00:00","description":"In this talk, I will introduce our recent efforts to discover how Ethereum's CVE vulnerabilities could propagate from Ethereum to BSC\/Optimism\/Base\/Mantle. The discussion consists of the following three parts:","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/discovering-and-investigating-propagated-vulnerabilities-from-ethereum-to-its-layer-2-blockchains\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/discovering-and-investigating-propagated-vulnerabilities-from-ethereum-to-its-layer-2-blockchains\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/discovering-and-investigating-propagated-vulnerabilities-from-ethereum-to-its-layer-2-blockchains\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/"},{"@type":"ListItem","position":2,"name":"Session","item":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/"},{"@type":"ListItem","position":3,"name":"Discovering and Investigating Propagated Vulnerabilities from Ethereum to Its Layer-2 Blockchains"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/#website","url":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/","name":"HITBSecConf2024 - Bangkok","description":"August 26 - 30 @ InterContinental","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/session\/10540"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/session"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/types\/session"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/media?parent=10540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}