Results 331 to 340 of about 1,554,184 (382)
Some of the next articles are maybe not open access.
Detection of Vulnerabilities of Blockchain Smart Contracts
IEEE Internet of Things Journal, 2023With the wide application of Internet of Things and blockchain, research on smart contracts has received increased attention, and security threat detection for smart contracts is one of the main focuses.
Daojing He+4 more
semanticscholar +1 more source
Smart Contracts and Decentralized Finance
Social Science Research Network, 2023We explain the mechanics of smart contracts. We then highlight the benefits of smart contracts, such as overcoming commitment problems. We also discuss limitations, such as the difficulty for smart contracts to access information external to the ...
Kose John, L. Kogan, Fahad Saleh
semanticscholar +1 more source
On the Formal Verification of Smart Contracts
2023 11th International Conference in Software Engineering Research and Innovation (CONISOFT), 2023In recent years, Blockchain-based systems have experienced rapid growth. Although these systems are in production, they are not exempt from presenting defects in the design of their elements such as Smart Contracts. Design defects in Smart Contracts lead
René Dávila+2 more
semanticscholar +1 more source
Securing Deployed Smart Contracts and DeFi With Distributed TEE Cluster
IEEE Transactions on Parallel and Distributed Systems, 2023Smart contract technologies can be used to implement almost arbitrary business logic. They can revolutionize many businesses such as payments, insurance, and crowdfunding.
Zecheng Li+3 more
semanticscholar +1 more source
ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs
IEEE Symposium on Security and Privacy, 2022Data privacy is a key concern for smart contracts handling sensitive data. The existing work zkay addresses this concern by allowing developers without cryptographic expertise to enforce data privacy. However, while zkay avoids fundamental limitations of
Samuel Steffen+3 more
semanticscholar +1 more source
Finding permission bugs in smart contracts with role mining
International Symposium on Software Testing and Analysis, 2022Smart contracts deployed on permissionless blockchains, such as Ethereum, are accessible to any user in a trustless environment. Therefore, most smart contract applications implement access control policies to protect their valuable assets from ...
Ye Liu+3 more
semanticscholar +1 more source
eTainter: detecting gas-related vulnerabilities in smart contracts
International Symposium on Software Testing and Analysis, 2022The execution of smart contracts on the Ethereum blockchain consumes gas paid for by users submitting contracts' invocation requests. A contract execution proceeds as long as the users dedicate enough gas, within the limit set by Ethereum.
Asem Ghaleb, J. Rubin, K. Pattabiraman
semanticscholar +1 more source
Formal Methods for the Verification of Smart Contracts: A Review
International Conference on Security of Information and Networks, 2022Smart contracts are digital contracts that rely on Blockchain technology to make their terms and execution conditions unforgeable. The purpose of a smart contract is to eliminate the need for a middleman in business and trade between anonymous and ...
M. Krichen+2 more
semanticscholar +1 more source
Smart contracts and over-enforcement: Analytical considerations on Smart Contracts as Legal Contracts [PDF]
Smart contracts are a common topic in scientific discussions held by computer scientists. Due to the dynamic nature of its applications, smart contracts must be considerably more adaptable, responsive and controllable. Yet the longstanding focus on security issues has affected negatively the development of smart contracts in the transfer of ownership ...
Abdelilah Maach+2 more
openaire +1 more source
Securify: Practical Security Analysis of Smart Contracts
Conference on Computer and Communications Security, 2018Permissionless blockchains allow the execution of arbitrary programs (called smart contracts), enabling mutually untrusted entities to interact without relying on trusted third parties.
Petar Tsankov+5 more
semanticscholar +1 more source