• Tech News
    • Games
    • Pc & Laptop
    • Mobile Tech
    • Ar & Vr
    • Security
  • Startup
    • Fintech
  • Reviews
  • How To
What's Hot

Elementor #32036

January 24, 2025

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

April 18, 2024

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

April 16, 2024
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
    1. Games
    2. Pc & Laptop
    3. Mobile Tech
    4. Ar & Vr
    5. Security
    6. View All

    Bring Elden Ring to the table with the upcoming board game adaptation

    September 19, 2022

    ONI: Road to be the Mightiest Oni reveals its opening movie

    September 19, 2022

    GTA 6 images and footage allegedly leak

    September 19, 2022

    Wild west adventure Card Cowboy turns cards into weird and silly stories

    September 18, 2022

    7 Reasons Why You Should Study PHP Programming Language

    October 19, 2022

    Logitech MX Master 3S and MX Keys Combo for Business Gen 2 Review

    October 9, 2022

    Lenovo ThinkPad X1 Carbon Gen10 Review

    September 18, 2022

    Lenovo IdeaPad 5i Chromebook, 16-inch+120Hz

    September 3, 2022

    It’s 2023 and Spotify Still Can’t Say When AirPlay 2 Support Will Arrive

    April 4, 2023

    YouTube adds very convenient iPhone homescreen widgets

    October 15, 2022

    Google finishes iOS 16 Lock Screen widgets rollout w/ Maps

    October 14, 2022

    Is Apple actually turning iMessage into AIM or is this sketchy redesign rumor for laughs?

    October 14, 2022

    MeetKai launches AI-powered metaverse, starting with a billboard in Times Square

    August 10, 2022

    The DeanBeat: RP1 simulates putting 4,000 people together in a single metaverse plaza

    August 10, 2022

    Improving the customer experience with virtual and augmented reality

    August 10, 2022

    Why the metaverse won’t fall to Clubhouse’s fate

    August 10, 2022

    How Apple privacy changes have forced social media marketing to evolve

    October 16, 2022

    Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

    October 16, 2022

    Decentralization and KYC compliance: Critical concepts in sovereign policy

    October 15, 2022

    What Thoma Bravo’s latest acquisition reveals about identity management

    October 14, 2022

    What is a Service Robot? The vision of an intelligent service application is possible.

    November 7, 2022

    Tom Brady just chucked another Microsoft Surface tablet

    September 18, 2022

    The best AIO coolers for your PC in 2022

    September 18, 2022

    YC’s Michael Seibel clarifies some misconceptions about the accelerator • DailyTech

    September 18, 2022
  • Startup
    • Fintech
  • Reviews
  • How To
Behind The ScreenBehind The Screen
Home»Security»Fixing cross-chain bridges with confidential computing
Security

Fixing cross-chain bridges with confidential computing

August 20, 2022No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Fixing cross-chain bridges with confidential computing
Share
Facebook Twitter LinkedIn Pinterest Email

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.


Every now and then we hear that a cross-chain bridge has been hacked. In 2022 alone, six bridges have been hacked, and more than $1.2 Billion worth of crypto assets have been stolen.

What are cross-chain bridges? What purpose do they serve? And why are they such prominent honeypots? Can Confidential Computing be used to improve the security of cross-chain bridges?  

Cross-chain bridges help in moving crypto assets from one blockchain to another. Interesting circumstances are popularizing them. For one: Older blockchains that have survived over the years end up having more valuable assets. But older blockchains are often slow, have low throughputs and offer higher transaction fees. On the flip side, newer blockchains or sidechains can be fast, have high throughput and the transaction fees may be extremely low. Cross-chain bridges make it easy to move popular assets from older blockchains onto newer blockchains and sidechains where they may be transacted more efficiently.  

Let us understand how a cross-chain bridge works. A crypto asset is locked in a vault smart contract on the source blockchain, and a representation of that asset is minted in the peg smart contract on the destination blockchain. A set of entities that are commonly called “guardians” are responsible for monitoring the vault smart contract on the source chain for new deposits and for creating their representations in the peg smart contract on the destination blockchain.

Event

MetaBeat 2022

See also  Intel's confidential computing solution for protecting cloud data is tested in healthcare

MetaBeat will bring together thought leaders to give guidance on how metaverse technology will transform the way all industries communicate and do business on October 4 in San Francisco, CA.

Register Here

Conversely, when the representations are destroyed in the peg smart contract, these guardians are responsible for releasing an equivalent amount of tokens held in the vault smart contract on the source chain.  

Figure 2: A schematic showing how cross-chain bridges work. 

It is easy to see that an attacker can either attack the vault smart contract, the peg smart contract or the guardians. Often, vulnerabilities are found in smart contracts. For example, the latest hack on bridge provider Nomad resulted in the loss of nearly $200 million, exploiting vulnerabilities in the smart contract logic on the source blockchain. These were introduced during a smart contracts upgrade process. The attack on Axie Infinity’s Ronin bridge led to a loss of $625 million; the attack on Horizon Bridge operated by California-based firm Harmony led to the loss of $100 million. Both of those attacks involved compromising the keys held by guardians.  

Figure 3: Tweets by Harmony founder Stephen Tse describing that private keys were indeed compromised. He also describes the system used to store private keys. This level of security is not sufficient. 

Harmony did not use data in-use encryption. It is quite possible that the private keys were lost following a memory dump attack. It is irrelevant if the keys were doubly encrypted when at rest. When these keys are being used, they are brought to the main memory. If the memory of the process using the key is dumped, the private key can be extracted.  

Figure 4: Enterprise-grade Confidential Computing

Enterprise-grade Confidential Computing

Confidential Computing is a technology that supports data in-use encryption. Simple memory dump attacks do not work when using Confidential Computing technologies such as Intel SGX. It is also possible to raise the bar and create an enterprise-grade Confidential Computing platform. This involves supporting cluster mode operations, high availability, disaster recovery, obtaining a variety of security certifications, and encasing nodes with tamper-resistant hardware to prevent side-channel attacks. Enterprise-grade Confidential Computing platforms also support quorum approvals for using stored keys. Multiple approvers could be required for signing transactions with each key.  

See also  Confidential computing: A quarantine for the digital age

Given that cross-chain bridges store remarkably high sums of cryptocurrencies, enterprise-grade Confidential Computing platforms should be used by guardians for generating, storing and using keys.  

But it is also hard for a bridge guardian to completely trust an enterprise-grade Confidential Computing platform. What if the platform operator denies service for some reason? Generating keys that do not depend on a user-provided seed can be dangerous. A DOS attack could lead to the funds being permanently locked.

One solution is to own the platform and to deploy it yourself in datacenters of your choice. The other solution is to make the platform generate a key and then make it generate components of the key using a threshold secret sharing scheme. The shares can be encrypted with public keys provided by the bridge guardians. This way, if a threshold number of guardians can combine their shares, the key can be re-generated even if there is a DOS attack by the provider of the enterprise-grade Confidential Computing platform.  

Bridge guardians need to reconsider how they are managing their keys. We have seen too many attacks that could have been averted with better key management practices. Keeping keys online and maintaining them securely is a tough task.

Thankfully, enterprise-grade Confidential Computing can go a long way in improving the security of bridge guardian keys. 

Pralhad Deshpande, Ph.D. is senior solutions architect at Fortanix.



Source link

bridges computing Confidential crosschain Fixing
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Nvidia Chip Shortages Leave AI Startups Scrambling for Computing Power

September 3, 2023

For Quantum Computing Startups The Challenge Is Finding The Use Cases

November 14, 2022

How Apple privacy changes have forced social media marketing to evolve

October 16, 2022

Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

October 16, 2022
Add A Comment

Comments are closed.

Editors Picks

The best laptop deals you can get right now

August 19, 2022

Ghost of Tsushima movie director wants the film to have Japanese cast speaking Japanese

August 15, 2022

How to Polish Your LinkedIn Profile | Startup

May 31, 2023

Galaxy Buds 2 Pro review: Big sound in a tiny package

September 9, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Elementor #32036

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.uk - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.