2019
DOI: 10.2991/ijndc.k.190710.003
|View full text |Cite
|
Sign up to set email alerts
|

Defects and Vulnerabilities in Smart Contracts, a Classification using the NIST Bugs Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(10 citation statements)
references
References 13 publications
(33 reference statements)
0
8
0
Order By: Relevance
“…The hackers attempt to manipulate the execution of the smart contracts using loopholes present in waste management smart contracts to execute it in favor of their activities (e.g., stealing the virtual currencies) [83], [98], [99]. The common vulnerabilities in smart contracts for waste management are classified into operational, security, developmental, and functional categories [100]. The common vulnerabilities in waste management smart contacts that are often exploited by hackers include reentrance attacks, integer overflow, denial of service attacks, and remote code execution.…”
Section: A Waste Management Smart Contracts Vulnerabilitiesmentioning
confidence: 99%
“…The hackers attempt to manipulate the execution of the smart contracts using loopholes present in waste management smart contracts to execute it in favor of their activities (e.g., stealing the virtual currencies) [83], [98], [99]. The common vulnerabilities in smart contracts for waste management are classified into operational, security, developmental, and functional categories [100]. The common vulnerabilities in waste management smart contacts that are often exploited by hackers include reentrance attacks, integer overflow, denial of service attacks, and remote code execution.…”
Section: A Waste Management Smart Contracts Vulnerabilitiesmentioning
confidence: 99%
“…It is a well-known fact that code contains bugs, and smart contracts are not an exception. There are several examples where small bugs in smart contracts have had detrimental impacts (Atzei et al, 2017;Magazzeni et al, 2017;Dingman et al, 2019;Tai, 2019). Computer scientists have developed several techniques to mitigate against bugs in software.…”
Section: Deployment On the Blockchain?mentioning
confidence: 99%
“…The focus is given on gas vulnerabilities and the gas consumption mechanism. Dingman et al 16 analyzed the gas related vulnerabilities of Ethereum blockchain and identified many vulnerabilities in the gas system using the bugs framework. 17 They classified the gas vulnerabilities classes that is, bugs which can occur in a resource-constrained environment and bugs which can occur in a distributed environment.…”
Section: Related Workmentioning
confidence: 99%