2021 IEEE Symposium on Computers and Communications (ISCC) 2021
DOI: 10.1109/iscc53001.2021.9631249
|View full text |Cite
|
Sign up to set email alerts
|

Potential Risk Detection System of Hyperledger Fabric Smart Contract based on Static Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…For the general, native consortial smart contract development context, although there are some generally known risks, fault forecasting is hindered by the lack of statistical insight into faults and their effects, and tooling is limited and largely experimental. Speciőcally, for Hyperledger Fabric, there are some static code analysis tools [80] [44] [57] [52] [62] [79] and hybrid dynamic and static analysis has been proposed [50]. Fuzzing [27] has been also introduced.…”
Section: The Challenge Of Dependable Consortial Smart Contractsmentioning
confidence: 99%
“…For the general, native consortial smart contract development context, although there are some generally known risks, fault forecasting is hindered by the lack of statistical insight into faults and their effects, and tooling is limited and largely experimental. Speciőcally, for Hyperledger Fabric, there are some static code analysis tools [80] [44] [57] [52] [62] [79] and hybrid dynamic and static analysis has been proposed [50]. Fuzzing [27] has been also introduced.…”
Section: The Challenge Of Dependable Consortial Smart Contractsmentioning
confidence: 99%
“…Security threats in assets can also be categorized as on-chain threats found in secondary assets, such as SC, consensus, DID, and off-chain threats in secondary assets, such as IPFS [ 106 ], cloud servers, sensors, and APIs. SC assets are prevalent in the literature [ 107 , 108 , 109 , 110 , 111 ]; and finally, (6) the functionality defect. According to findings from [ 4 ], some HIoT BC-IdM solutions lack some of the main functions of an IdM system, such as identity provisioning/de-provisioning and IdM life-cycle control.…”
Section: Taxonomymentioning
confidence: 99%
“…The risk-contributing factors are classified as privacy- and security-contributing factors. Finally, six types of risk solutions are identified from the literature: (1) novel security risk management frameworks, (2) security risk assessment/risk analysis based on general risk assessment standards, (3) threat models, (4) risk analysis tools as services (static [ 111 ] or dynamic [ 107 ]), (5) solutions proposed to evaluate security risk countermeasures [ 124 , 127 ], and (6) risk penetration testing solutions.…”
Section: Taxonomymentioning
confidence: 99%
See 1 more Smart Citation