Security threat mitigation for smart contracts: A comprehensive survey

N Ivanov, C Li, Q Yan, Z Sun, Z Cao, X Luo - ACM Computing Surveys, 2023 - dl.acm.org
The blockchain technology, initially created for cryptocurrency, has been re-purposed for
recording state transitions of smart contracts—decentralized applications that can be …

EtherShield: Time-interval Analysis for Detection of Malicious Behavior on Ethereum

B Pan, N Stakhanova, Z Zhu - ACM Transactions on Internet Technology, 2024 - dl.acm.org
Advances in blockchain technology have attracted significant attention across the world. The
practical blockchain applications emerging in various domains, ranging from finance …

Unknown threats detection methods of smart contracts

D He, K Ding, S Chan, M Guizani - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the explosive growth of blockchain platforms and applications, security threats of
blockchain also occur frequently. As a decentralized application deployed on the …

Provenance verification of smart contracts: Analysing the cost of ensuring authenticity over the logic hosted in blockchain networks

M García-Valls, AM Chirivella-Ciruelos - Information, 2023 - mdpi.com
The lack of sufficient guarantee about the authenticity of running smart contracts is a major
entry barrier to blockchain networks. By authenticity, we refer to the smart contract ownership …

Chaos engineering of ethereum blockchain clients

L Zhang, J Ron, B Baudry, M Monperrus - … Technologies: Research and …, 2023 - dl.acm.org
In this article, we present ChaosETH, a chaos engineering approach for resilience
assessment of Ethereum blockchain clients. ChaosETH operates in the following manner …

Authenticated multi-version index for blockchain-based range queries on historical data

S Linoy, S Ray, N Stakhanova - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
With the rapid growth in emerging applications driven by blockchains, there is an increasing
need to support efficient ad hoc querying of authenticated historical data to enable rigorous …

A systematic literature review of undiscovered vulnerabilities and tools in smart contract technology

O Zaazaa, H El Bakkali - Journal of Intelligent Systems, 2023 - degruyter.com
In recent years, smart contract technology has garnered significant attention due to its ability
to address trust issues that traditional technologies have long struggled with. However, like …

Management of blockchain-based data provenance and addressing smart contract security issues

S Linoy - 2023 - unbscholar.lib.unb.ca
Blockchain gained massive popularity in recent years in industry as well as academia due to
its specific properties that enable distrusting parties to mutually and pseudo-anonymously …

[PDF][PDF] Exploring the Anatomy of Ethereum Based Phishing

J Kimber - 2023 - harvest.usask.ca
The increasing numbers of Ethereum scams are causing significant concerns within the
blockchain community. Yet, our understanding of how these scams work is limited. In this …

Trusted Provenance with Blockchain-A Blockchain-based Provenance Tracking System for Virtual Aircraft Component Manufacturing

S Kocadag - 2023 - elib.dlr.de
The importance of provenance in the digital age has led to significant interest in utilizing
blockchain technology for tamper-proof storage of provenance data. This thesis proposes a …