Affiliation:
1. Kudelski Security, Switzerland
Abstract
Blockchains are not invulnerable. There are known vulnerabilities in various blockchain ecosystem components. This field note describes some vulnerabilities observed in smart contracts and node software, their exploitation, and how to avoid them, with a focus on the Ethereum ecosystem.
Publisher
Association for Computing Machinery (ACM)
Reference65 articles.
1. Algorand. 2018. Algorand. Retrieved from https://www.algorand.com/. Algorand. 2018. Algorand. Retrieved from https://www.algorand.com/.
2. Ayman Alkhalifah Alex Ng A. S. M. Kayes Mohammad Chowdhury Mamoun Alazab and Paul Watters. 2019. A Taxonomy of Blockchain Threats and Vulnerabilities. DOI:https://doi.org/10.20944/preprints201909.0117.v1 Ayman Alkhalifah Alex Ng A. S. M. Kayes Mohammad Chowdhury Mamoun Alazab and Paul Watters. 2019. A Taxonomy of Blockchain Threats and Vulnerabilities. DOI:https://doi.org/10.20944/preprints201909.0117.v1
3. Various authors. 2013. Go Ethereum—Official Go implementation of the Ethereum protocol. Retrieved from Retrieved from https://github.com/ethereum/go-ethereum. Various authors. 2013. Go Ethereum—Official Go implementation of the Ethereum protocol. Retrieved from Retrieved from https://github.com/ethereum/go-ethereum.
4. Eric Banisadr. 2018. How 800k Evaporated from the PoWH Coin Ponzi Scheme Overnight. Retrieved from https://medium.com/@ebanisadr/how-800k-evaporated-from-the-powh-coin-ponzi-scheme-overnight-1b025c33b530?. Eric Banisadr. 2018. How 800k Evaporated from the PoWH Coin Ponzi Scheme Overnight. Retrieved from https://medium.com/@ebanisadr/how-800k-evaporated-from-the-powh-coin-ponzi-scheme-overnight-1b025c33b530?.
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. SoK: A Unified Data Model for Smart Contract Vulnerability Taxonomies;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
2. OpenSCV: an open hierarchical taxonomy for smart contract vulnerabilities;Empirical Software Engineering;2024-06-18
3. A taxonomy of endpoint vulnerabilities and affected blockchain architecture layers;Concurrency and Computation: Practice and Experience;2024-05-29
4. Supply Chain Resilience Strategy for Healthcare Organizations;Advances in Logistics, Operations, and Management Science;2024-04-26
5. Cyber Security in Blockchain;2023 IEEE Conference on Dependable and Secure Computing (DSC);2023-11-07