Smart contract vulnerabilities: Vulnerable does not imply exploited

D Perez, B Livshits - … USENIX Security Symposium (USENIX Security 21 …, 2021 - usenix.org
In recent years, we have seen a great deal of both academic and practical interest in the
topic of vulnerabilities in smart contracts, particularly those developed for the Ethereum …

Security threat mitigation for smart contracts: A comprehensive survey

N Ivanov, C Li, Q Yan, Z Sun, Z Cao, X Luo - ACM Computing Surveys, 2023 - dl.acm.org
The blockchain technology, initially created for cryptocurrency, has been re-purposed for
recording state transitions of smart contracts—decentralized applications that can be …

Security vulnerabilities in ethereum smart contracts

A Mense, M Flatscher - Proceedings of the 20th international conference …, 2018 - dl.acm.org
Smart contracts (SC) are one of the most appealing features of blockchain technologies
facilitating, executing, and enforcing predefined terms of coded contracts without …

The security reference architecture for blockchains: Toward a standardized model for studying vulnerabilities, threats, and defenses

I Homoliak, S Venugopalan… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Blockchains are distributed systems, in which security is a critical factor for their success.
However, despite their increasing popularity and adoption, there is a lack of standardized …

zkay: Specifying and enforcing data privacy in smart contracts

S Steffen, B Bichsel, M Gersbach, N Melchior… - Proceedings of the …, 2019 - dl.acm.org
Privacy concerns of smart contracts are a major roadblock preventing their wider adoption. A
promising approach to protect private data is hiding it with cryptographic primitives and then …

Exploiting the laws of order in smart contracts

A Kolluri, I Nikolic, I Sergey, A Hobor… - Proceedings of the 28th …, 2019 - dl.acm.org
We investigate a family of bugs in blockchain-based smart contracts, which we dub event-
ordering (or EO) bugs. These bugs are intimately related to the dynamic ordering of contract …

A formal verification tool for Ethereum VM bytecode

D Park, Y Zhang, M Saxena, P Daian… - … of the 2018 26th ACM joint …, 2018 - dl.acm.org
In this paper, we present a formal verification tool for the Ethereum Virtual Machine (EVM)
bytecode. To precisely reason about all possible behaviors of the EVM bytecode, we …

Blockchain-based decentralized application: A survey

P Zheng, Z Jiang, J Wu, Z Zheng - IEEE Open Journal of the …, 2023 - ieeexplore.ieee.org
Blockchain-based decentralized applications (DApp) draw more attention with the
increasing development and wide application of blockchain technologies. A wealth of funds …

Smartpulse: Automated checking of temporal properties in smart contracts

J Stephens, K Ferles, B Mariano… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
Smart contracts are programs that run on the blockchain and digitally enforce the execution
of contracts between parties. Because bugs in smart contracts can have serious monetary …

Towards safer smart contracts: A survey of languages and verification methods

D Harz, W Knottenbelt - arXiv preprint arXiv:1809.09805, 2018 - arxiv.org
With a market capitalisation of over USD 205 billion in just under ten years, public distributed
ledgers have experienced significant adoption. Apart from novel consensus mechanisms …