Security threat mitigation for smart contracts: A comprehensive survey
The blockchain technology, initially created for cryptocurrency, has been re-purposed for
recording state transitions of smart contracts—decentralized applications that can be …
recording state transitions of smart contracts—decentralized applications that can be …
Identification and prioritization of the risks in the mass adoption of artificial intelligence-driven stable coins: The quest for optimal resource utilization
Industry 4.0 technologies have been revolutionizing the financial sector over the past few
decades through the emergence of disruptive technologies. These disruptive technologies …
decades through the emergence of disruptive technologies. These disruptive technologies …
Analyzing the Threats to Blockchain-Based Self-Sovereign Identities by Conducting a Literature Survey
Self-sovereign identity (SSI) is a digital identity management model managed in a
decentralized manner. It allows identity owners to manage and store their digital identities in …
decentralized manner. It allows identity owners to manage and store their digital identities in …
A comprehensive survey on social engineering attacks, countermeasures, case study, and research challenges
Social engineering attacks are inevitable and imperil the integrity, security, and
confidentiality of the information used on social media platforms. Prominent technologies …
confidentiality of the information used on social media platforms. Prominent technologies …
SoK: Design, vulnerabilities and defense of cryptocurrency wallets
The rapid growth of decentralized digital currencies, enabled by blockchain technology, has
ushered in a new era of peer-to-peer transactions, revolutionizing the global economy …
ushered in a new era of peer-to-peer transactions, revolutionizing the global economy …
Smart contract vulnerability detection based on a semantic code structure and a self-designed neural network
X Ren, Y Wu, J Li, D Hao, M Alam - Computers and Electrical Engineering, 2023 - Elsevier
Smart contracts are riddled with vulnerabilities due to flaws in programming languages and
the inexperience of developers, causing damage. Nonetheless, the current research on …
the inexperience of developers, causing damage. Nonetheless, the current research on …
Ethclipper: a clipboard meddling attack on hardware wallets with address verification evasion
Hardware wallets are designed to withstand malware attacks by isolating their private keys
from the cyberspace, but they are vulnerable to the attacks that fake an address stored in a …
from the cyberspace, but they are vulnerable to the attacks that fake an address stored in a …
Dissecting payload-based transaction phishing on Ethereum
In recent years, a more advanced form of phishing has arisen on Ethereum, surpassing early-
stage, simple transaction phishing. This new form, which we refer to as payload-based …
stage, simple transaction phishing. This new form, which we refer to as payload-based …
Enabling secure deduplication in encrypted decentralized storage
With the rapid development of blockchain technology, decentralized cloud storage services
are emerging and have been a storage new option in this era. They aim to leverage the …
are emerging and have been a storage new option in this era. They aim to leverage the …
[HTML][HTML] Cybersecurity insights gleaned from world religions
Organisations craft and disseminate security policies, encoding the actions they want
employees to take to preserve and protect organisational information resources. They …
employees to take to preserve and protect organisational information resources. They …