July 22, 2022, 1:20 a.m. | Truc Nguyen, My T. Thai

cs.CR updates on arXiv.org arxiv.org

Since 2016, sharding has become an auspicious solution to tackle the
scalability issue in legacy blockchain systems. Despite its potential to
strongly boost the blockchain throughput, sharding comes with its own security
issues. To ease the process of deciding which shard to place transactions,
existing sharding protocols use a hash-based transaction sharding in which the
hash value of a transaction determines its output shard. Unfortunately, we show
that this mechanism opens up a loophole that could be exploited to conduct …

attack hash service sharding vulnerability

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Operations Analyst

@ Astranis | San Francisco

Manager - Business continuity Security and Safety.Risk and Compliance

@ MTN | Benin

Cyber Analyst, Digital Forensics Incident Response

@ At-Bay | Canada

Technical Product Manager, AppSec and DevSecOps

@ Penn Interactive | Philadelphia

Experienced Cloud Security Engineer (m/f/d) - Cybersecurity

@ MediaMarktSaturn | Barcelona, ES, 8003