Security threat mitigation for smart contracts: A comprehensive survey

N Ivanov, C Li, Q Yan, Z Sun, Z Cao, X Luo - ACM Computing Surveys, 2023 - dl.acm.org
The blockchain technology, initially created for cryptocurrency, has been re-purposed for
recording state transitions of smart contracts—decentralized applications that can be …

Identification and prioritization of the risks in the mass adoption of artificial intelligence-driven stable coins: The quest for optimal resource utilization

K Sood, S Singh, A Behl, R Sindhwani, S Kaur… - Resources Policy, 2023 - Elsevier
Industry 4.0 technologies have been revolutionizing the financial sector over the past few
decades through the emergence of disruptive technologies. These disruptive technologies …

Analyzing the Threats to Blockchain-Based Self-Sovereign Identities by Conducting a Literature Survey

D Pöhn, M Grabatin, W Hommel - Applied Sciences, 2023 - mdpi.com
Self-sovereign identity (SSI) is a digital identity management model managed in a
decentralized manner. It allows identity owners to manage and store their digital identities in …

A comprehensive survey on social engineering attacks, countermeasures, case study, and research challenges

T Rathod, NK Jadav, S Tanwar, A Alabdulatif… - Information Processing …, 2025 - Elsevier
Social engineering attacks are inevitable and imperil the integrity, security, and
confidentiality of the information used on social media platforms. Prominent technologies …

SoK: Design, vulnerabilities and defense of cryptocurrency wallets

Y Erinle, Y Kethepalli, Y Feng, J Xu - arxiv preprint arxiv:2307.12874, 2023 - arxiv.org
The rapid growth of decentralized digital currencies, enabled by blockchain technology, has
ushered in a new era of peer-to-peer transactions, revolutionizing the global economy …

Smart contract vulnerability detection based on a semantic code structure and a self-designed neural network

X Ren, Y Wu, J Li, D Hao, M Alam - Computers and Electrical Engineering, 2023 - Elsevier
Smart contracts are riddled with vulnerabilities due to flaws in programming languages and
the inexperience of developers, causing damage. Nonetheless, the current research on …

Ethclipper: a clipboard meddling attack on hardware wallets with address verification evasion

N Ivanov, Q Yan - 2021 IEEE Conference on Communications …, 2021 - ieeexplore.ieee.org
Hardware wallets are designed to withstand malware attacks by isolating their private keys
from the cyberspace, but they are vulnerable to the attacks that fake an address stored in a …

Dissecting payload-based transaction phishing on Ethereum

Z Chen, Y Hu, B He, D Luo, L Wu, Y Zhou - arxiv preprint arxiv …, 2024 - arxiv.org
In recent years, a more advanced form of phishing has arisen on Ethereum, surpassing early-
stage, simple transaction phishing. This new form, which we refer to as payload-based …

Enabling secure deduplication in encrypted decentralized storage

B Zhang, H Cui, Y Chen, X Liu, Z Yu, B Guo - International Conference on …, 2022 - Springer
With the rapid development of blockchain technology, decentralized cloud storage services
are emerging and have been a storage new option in this era. They aim to leverage the …

[HTML][HTML] Cybersecurity insights gleaned from world religions

K Renaud, M Dupuis - Computers & Security, 2023 - Elsevier
Organisations craft and disseminate security policies, encoding the actions they want
employees to take to preserve and protect organisational information resources. They …