Decentralized finance security: A survey of attacks, defenses, and open challenges

  • Shan JIANG
  • , Wenxin YOU
  • , Shichang XUAN*
  • , Jiaxing SHEN
  • *Corresponding author for this work

Research output: Journal PublicationsJournal Article (refereed)peer-review

Abstract

Decentralized finance (DeFi) has emerged as a transformative paradigm, leveraging programmable blockchains to innovate upon traditional financial services without centralized intermediaries. However, DeFi introduces a unique and highly adversarial security landscape characterized by immutable transactions, complex protocol composability, and transparent execution environments. This survey provides a comprehensive systematization of DeFi security, categorizing vulnerabilities across three distinct layers: technical and code layer, economic and protocol layer, and infrastructure and cross-chain layer. Furthermore, we structure the defense mechanisms according to the protocol lifecycle, including pre-deployment prevention strategies, runtime mitigation techniques, and post-incident response and recovery mechanisms. We also delve into specific phenomena such as maximal extractable value, analyzing its dual role as both a market efficiency tool and a security vector. By synthesizing existing literature and incident reports, this survey establishes a holistic framework for understanding the interplay between code and finance. Finally, we identify critical open challenges and propose future research directions aimed at maturing the discipline of DeFi security and mitigating systemic risks.
Original languageEnglish
Article number100383
JournalHigh-Confidence Computing
DOIs
Publication statusE-pub ahead of print - 28 Feb 2026

Funding

This work was supported by the HK RGC Theme-based Research Scheme (No. T43-513/23-N) and the Pearl River Talent Plan (No. 2024QN11X183).

Keywords

  • Decentralized finance
  • DeFi security
  • Maximal extractable value
  • Stablecoin
  • Oracle

Fingerprint

Dive into the research topics of 'Decentralized finance security: A survey of attacks, defenses, and open challenges'. Together they form a unique fingerprint.

Cite this