2021
DOI: 10.1109/access.2021.3091317
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating Countermeasures for Verifying the Integrity of Ethereum Smart Contract Applications

Abstract: Blockchain technology, which provides digital security in a distributed manner, has evolved into a key technology that can build efficient and reliable decentralized applications (called DApps) beyond the function of cryptocurrency. The characteristics of blockchain such as immutability and openness, however, have made DApps more vulnerable to various security risks, and thus it has become of great significance to validate the integrity of DApps before they actually operate upon blockchain. Recently, research … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 22 publications
(36 reference statements)
0
11
0
Order By: Relevance
“…and evaluate the performance of analysis tools [64,85,87,101,106,111,137,169,227]. All of these surveys focus on Ethereum smart contracts written in Solidity, except the study of Yamashita, Kazuhiro et al [227], which investigates the potential risks of Hyperledger Fabric blockchain.…”
Section: Studymentioning
confidence: 99%
“…and evaluate the performance of analysis tools [64,85,87,101,106,111,137,169,227]. All of these surveys focus on Ethereum smart contracts written in Solidity, except the study of Yamashita, Kazuhiro et al [227], which investigates the potential risks of Hyperledger Fabric blockchain.…”
Section: Studymentioning
confidence: 99%
“…We noticed the following inter-contractual vulnerabilities. Reentrancy vulnerability: The reentrancy vulnerability [69,76,90,101,102,104,109,114,116,117,119,120,122,125,126] describes a vulnerability, where an external callee contract calls back to a function in the caller contract before the caller contract finishes and, thereby, bypasses the due validity. One example of an attack based on the reentrancy vulnerability is the decentralized autonomous organization (DAO) attack [52,69,125].…”
Section: Inter-contractual Vulnerabilitiesmentioning
confidence: 99%
“…The metric benchmarks that are covered by studies can be classified into seven groups: (1) functional [ 122 ] (in some studies called performance), in which HIoT BC-IdM are evaluated based on the primary functions that the system must perform; (2) security; (3) privacy levels [ 86 , 123 , 124 ]; (4) trust; (5) user experience [ 125 ]; (6) portability and interoperability [ 71 ]; and (7) regulation compliance metrics [ 126 ]. Moreover, some studies, such as [ 127 ], went further and proposed using a tool to evaluate the security countermeasure solutions based on security metrics. Skilled security auditors who are experts in BC-based applications are vital in the security risk management process [ 128 ].…”
Section: Taxonomymentioning
confidence: 99%
“…The risk-contributing factors are classified as privacy- and security-contributing factors. Finally, six types of risk solutions are identified from the literature: (1) novel security risk management frameworks, (2) security risk assessment/risk analysis based on general risk assessment standards, (3) threat models, (4) risk analysis tools as services (static [ 111 ] or dynamic [ 107 ]), (5) solutions proposed to evaluate security risk countermeasures [ 124 , 127 ], and (6) risk penetration testing solutions.…”
Section: Taxonomymentioning
confidence: 99%
See 1 more Smart Citation