Understanding Cross-Chain Bridges: Characteristics and Security Implications