2020
DOI: 10.1109/access.2020.3032239
|View full text |Cite
|
Sign up to set email alerts
|

Using Fault Injection to Assess Blockchain Systems in Presence of Faulty Smart Contracts

Abstract: Blockchain has become particularly popular due to its promise to support businesscritical services in very different domains (e.g., retail, healthcare). Blockchain systems rely on complex middleware, like Ethereum or Hyperledger Fabric, that allow running smart contracts, which specify business logic in cooperative applications. The presence of software defects in these contracts has notably caused failures, including severe security problems. In this paper, we use software-implemented fault injection (SWIFI) … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 37 publications
0
8
0
Order By: Relevance
“…Bouichou et al [100] enumerate the issues as privacy and control, storage accessibility, logic, compiler, authentication, cryptography, initiation, wrong attribution of names, arithmetic, useless code, user interface, time constraint, and requirement violation. Sharma and Shak [72] and Snegireva [77] summarize them as faults and vulnerabilities, whereas Hajdu et al [128] map vulnerabilities to common weakness enumerations (CWEs). These can have different reasons and occur at different places, such as contracts, programming languages, or implementation.…”
Section: Application Layermentioning
confidence: 99%
“…Bouichou et al [100] enumerate the issues as privacy and control, storage accessibility, logic, compiler, authentication, cryptography, initiation, wrong attribution of names, arithmetic, useless code, user interface, time constraint, and requirement violation. Sharma and Shak [72] and Snegireva [77] summarize them as faults and vulnerabilities, whereas Hajdu et al [128] map vulnerabilities to common weakness enumerations (CWEs). These can have different reasons and occur at different places, such as contracts, programming languages, or implementation.…”
Section: Application Layermentioning
confidence: 99%
“…The data processing workload is the framework for understanding the performance of private blockchains. Common software failures and blockchain-specific software failures [12] (e.g., the need for a transaction sender) affect the reliability and integrity of the Smart Contract Index and observations of absolute reliability.…”
Section: Related Workmentioning
confidence: 99%
“…Fu et al [26] designed EVMFuzzer, a framework that generates seed contracts via a set of predefined mutators to find security bugs in different EVM implementations. Hajdu et al [28] proposed an approach that assesses the behavior of permissioned blockchain systems by injecting faults into smart contracts. Wang et al [52] invented ContraMaster, an oraclesupported fuzzing tool that detects exploitable vulnerabilities in smart contracts.…”
Section: Related Work a Blockchain Dependabilitymentioning
confidence: 99%