Abstract
Blockchain is a decentralized, shared ledger that aggregates blocks of data in a factual data structure in chronological order using a chain structure. Two hundred sixty thousand tokens, or 98% of the around 2.5 million smart contracts in Ethereum network, are ERC-20 tokens. The ERC20 standard specifies constructors for token contracts that establish and initialize the contract state. The Ethereum wallet and Ethereum decentralized, centralized applications can access tokens through these standard interfaces. Security vulnerabilities in ERC-20 have drawn a lot of attention lately in recent years. This paper summarizes some basic security vulnerabilities and suggests avoiding multiple withdrawal attacks. Tokens can be used to support dApps, access blockchain services, trade, and obtain voting rights. Various tokens exist depending on their properties and use cases, including governance, utility, security, transaction, and platform tokens. Tokens can be sorted as fungible tokens and non-fungible tokens. Tokens that can be fungible are identical, divisible, and can be instead of money. Non-fungible tokens have a single owner and are unique.
Publisher
Darcy & Roy Press Co. Ltd.
Reference11 articles.
1. Alpos, O., Cachin, C., Marson, G. A., et al. (2021, July). On the Synchronization Power of Token Smart Contracts. In 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS) (pp. 640-651). IEEE.
2. Cui, W., & Gao, C. (2022). WTEYE: On-chain wash trade detection and quantification for ERC20 cryptocurrencies. Blockchain: Research and Applications, 100108.
3. Ivanov, N., Guo, H., & Yan, Q. (2021, September). Rectifying Administrated ERC20 Tokens. In International Conference on Information and Communications Security (pp. 22-37). Springer, Cham.
4. Ivanov, N., & Yan, Q. (2022). Decentralization Paradox: A Study of Hegemonic and Risky ERC-20 Tokens. arXiv preprint arXiv:2209.08370.
5. Li, X. (2020). Research on formal verification techniques for Ethereum token smart contracts. Lecture Notes in Computer Science(), vol 12470. Springer, Cham.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献