Full metadata record
DC FieldValueLanguage
dc.contributorDepartment of Computingen_US
dc.contributor.advisorXiao, Bin (COMP)en_US
dc.creatorLi, Zecheng-
dc.identifier.urihttps://theses.lib.polyu.edu.hk/handle/200/12166-
dc.languageEnglishen_US
dc.publisherHong Kong Polytechnic Universityen_US
dc.rightsAll rights reserveden_US
dc.titleOn building trustworthy network systems with blockchain and TEEen_US
dcterms.abstractThe Internet consists of many network systems, such as Domain Name System (DNS) and Public Key Infrastructure (PKI), that work together to provide network services and connect the world. However, these network systems suffer from a number of security issues, such as cache poisoning attacks on DNS and rogue certificates on PKI. These security risks can in turn lead to the proliferation of phishing sites, man-in-­the-middle attacks on encrypted connections, and a host of other severe and complex network attacks. Traditional solutions still have limitations, and as we delve into blockchain and Trusted Execution Environment (TEE) technology, we find that their benefits can be leveraged to enhance the security of these network systems.en_US
dcterms.abstractBlockchain technology was born from the cryptocurrency Bitcoin, whose tamper-proof nature catalyzes the secure exchange of assets. The decentralized architecture and replicated storage of blockchain guarantee the integrity and consistency of the stored data. They also provide a new way of building traditional network systems with guaranteed data security. In addition, TEE ensures execution security. Its model of attested execution allows users to verify the content returned by the enclave inside TEE and decide whether to trust the execution result. The combination of blockchain and TEE provides a new computing paradigm for building trustworthy network systems.en_US
dcterms.abstractFirstly, we note that DNS is vulnerable to many attacks such as the cache poisoning attack and DDoS attack. Records in recursive resolver are vulnerable to be modified maliciously. Facing these problems, we propose B-DNS, a secure and efficient blockchain-based domain name system. B-DNS leverages blockchain to store resource records and provide name service. The tamper-proof feature of blockchain prevents it from poisoning attacks. B-DNS also fills up two shortcomings in legacy blockchain-based DNS: computation-heavy consensus protocol and inefficient query. For the security of B-DNS, a novel way is proposed to quantitatively compare the security of B-DNS and legacy DNS in terms of attack success rate, attack cost, and attack surface. Our experiments show that the probability of a successful attack on B-DNS is 1% of a successful attack on legacy DNS. The attack cost goes up a million times in B-DNS, and the attack surface of B-DNS is far smaller than that of legacy DNS. The query performance evaluation of B-DNS shows that B-DNS can achieve similar or even less query latency than state-of-the-art commercial DNS implementations.en_US
dcterms.abstractSecondly, we find that current Certificate Authorities (CAs) are vulnerable to be compromised to issue unauthorized certificates. Current countermeasures can only detect unauthorized certificates rather than preventing them. Facing these problems, we propose PISTIS, a framework for issuing authorized and trusted certificates with blockchain and TEE. In PISTIS, TEE nodes validate whether the applicant in a certificate request passes the domain ownership validation (i.e., the domain is under the corresponding applicant's control) and submit attested results to a smart contract on the blockchain. The smart contract issues the certificate to the applicant when an attested result shows a pass. Therefore, PISTIS can ensure its issued certificates are authorized because of the domain ownership validation mechanism. The security of PISTIS is formally proved in the Universally Composable (UC) framework. Compared with state-of-the-art, PISTIS avoids potential damages by preventing unauthorized certificates from issuing.en_US
dcterms.abstractThirdly, we note that smart contracts cannot be modified once they are deployed on the blockchain, so vulnerabilities in deployed smart contracts can have devastating consequences. We emphasize that current countermeasures is to thoroughly test and validate contracts prior to deployment. However, these testing methods suffer from false-negative results and do not protect against unknown contract defects. Furthermore, Decentralised Finance (DeFi) based on smart contracts has gained significant momentum and is now attractive target for attacks. Facing these problems, we propose SolSaviour to protect deployed smart contracts and DeFi. SolSaviour consists of a voteDestruct mechanism and a TEE cluster. The voteDestruct mechanism allows contract stakeholders to decide whether to destroy the defective contract and withdraw inside assets. The TEE cluster is responsible for asset escrow, redeployment of patched contracts, and state migration. Specifically, SolSaviour can destroy the defective contract, redeploy a patched contract, and migrate the funds and state variables from the destroyed contract to the patched one. Our experiment results show SolSaviour can protect smart contracts and complex DeFi protocols with feasible overhead.en_US
dcterms.extent163 pages : color illustrationsen_US
dcterms.isPartOfPolyU Electronic Thesesen_US
dcterms.issued2022en_US
dcterms.educationalLevelPh.D.en_US
dcterms.educationalLevelAll Doctorateen_US
dcterms.LCSHComputer securityen_US
dcterms.LCSHComputer networks -- Security measuresen_US
dcterms.LCSHInternet -- Security measuresen_US
dcterms.LCSHHong Kong Polytechnic University -- Dissertationsen_US
dcterms.accessRightsopen accessen_US

Files in This Item:
File Description SizeFormat 
6614.pdfFor All Users3.45 MBAdobe PDFView/Open


Copyright Undertaking

As a bona fide Library user, I declare that:

  1. I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
  2. I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
  3. I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.

By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.

Show simple item record

Please use this identifier to cite or link to this item: https://theses.lib.polyu.edu.hk/handle/200/12166