Results 41 to 50 of about 232,310 (307)

Survey on Vulnerabilities in Blockchain’s Smart Contracts

open access: yesJISR on Computing, 2022
Trustworthy smart contracts is usually challenging due to the multifaceted semantics of essential domain-specific languages and their testability. A vulnerability in smart contracts possibly comprises numerous code-security and may allow an attacker to ...
Huma Jamshed
doaj   +1 more source

Smart Contracts Used in the Blockchain: A Juristic Stud

open access: yesدراسات: علوم الشريعة والقانون, 2022
Objectives: Clarify the ruling on forming smart contracts using the blockchain technology, and the related conditions and pillars of legality. Methods: A descriptive approach to describe smart contracts and the pillars on which they are based, an ...
Saba mohammed mostafa Alboul   +1 more
doaj   +1 more source

Smart Contract Fuzzing Based on Deep Learning and Information Feedback [PDF]

open access: yesJisuanji kexue, 2023
Vulnerabilities of smart contracts caused by insecure programming have been frequently discovered on the mainstream blockchain platform Ethereum.In order to improve the coverage of contracts by fuzzing and detect security vulnerabilities more ...
ZHAO Mingmin, YANG Qiuhui, HONG Mei, CAI Chuang
doaj   +1 more source

Smart Contracts and the Problems Likely to Appear in the Field of Private Law Regarding Its Possible Implementation

open access: yesİstanbul Hukuk Mecmuası, 2022
Smart contracts have emerged as an important technological development, when considering the fast pace with which technology is developing. Nowadays the digital architecture of smart contracts automates the fulfillment of contractual obligations and has ...
Mükerrem Onur Başar
doaj   +1 more source

Blockchain and Smart Contract Engineering [PDF]

open access: yesIEEE Software, 2020
Blockchains help to build trust among a decentralized network of unknown and untrusted peers who need to agree on a common protocol and trust the correctness and compatibility of the corresponding software implementations. The software engineering discipline cannot ignore this trend, as it fundamentally affects the way software is designed, developed ...
Xabier Larrucea, Cesare Pautasso
openaire   +3 more sources

EASYFLOW: Keep Ethereum Away From Overflow

open access: yes, 2019
While Ethereum smart contracts enabled a wide range of blockchain applications, they are extremely vulnerable to different forms of security attacks.
Chen, Zhong   +5 more
core   +1 more source

Adding concurrency to smart contracts [PDF]

open access: yesDistributed Computing, 2017
Modern cryptocurrency systems, such as Ethereum, permit complex financial transactions through scripts called smart contracts. These smart contracts are executed many, many times, always without real concurrency. First, all smart contracts are serially executed by miners before appending them to the blockchain.
Paul Gazzillo   +3 more
openaire   +5 more sources

Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach

open access: yes, 2017
The adoption of blockchain-based distributed computation platforms is growing fast. Some of these platforms, such as Ethereum, provide support for implementing smart contracts, which are envisioned to have novel applications in a broad range of areas ...
A Mavridou   +8 more
core   +1 more source

Smart Contracts in Blockchain Technology: A Critical Review

open access: yesInformation, 2023
By utilizing smart contracts, which are essentially scripts that are anchored in a decentralized manner on blockchains or other similar infrastructures, it is possible to make the execution of predetermined procedures visible to the outside world.
Hamed Taherdoost
doaj   +1 more source

On the Practicality of a Smart Contract PKI [PDF]

open access: yes2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON), 2019
Public key infrastructures (PKIs) are one of the main building blocks for securing communications over the Internet. Currently, PKIs are under the control of centralized authorities, which is problematic as evidenced by numerous incidents where they have been compromised.
Mema Roussopoulos   +3 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy