Security threat mitigation for smart contracts: A comprehensive survey

N Ivanov, C Li, Q Yan, Z Sun, Z Cao, X Luo - ACM Computing Surveys, 2023 - dl.acm.org
The blockchain technology, initially created for cryptocurrency, has been re-purposed for
recording state transitions of smart contracts—decentralized applications that can be …

Decentralized finance (DeFi): a paradigm shift in the Fintech

R Xu, J Zhu, L Yang, Y Lu, LD Xu - Enterprise Information Systems, 2024 - Taylor & Francis
The financial landscape is undergoing a revolution with the Decentralized Finance (DeFi),
poised to reshape business value creation. This study provides an overview of research …

Cobra: interaction-aware bytecode-level vulnerability detector for smart contracts

W Li, X Li, Z Li, Y Zhang - Proceedings of the 39th IEEE/ACM …, 2024 - dl.acm.org
The detection of vulnerabilities in smart contracts remains a significant challenge. While
numerous tools are available for analyzing smart contracts in source code, only about 1.79 …

Privacy-preserving anomaly detection of encrypted smart contract for blockchain-based data trading

D Chen, Z Liao, R Chen, H Wang, C Yu… - … on Dependable and …, 2024 - ieeexplore.ieee.org
In a blockchain-based data trading platform, data users can purchase data sets and
computing power through encrypted smart contracts. The security of smart contracts is …

A smart contract vulnerability detection method based on deep learning with opcode sequences

P Li, G Wang, X **ng, J Zhu, W Gu, G Zhai - Peer-to-Peer Networking and …, 2024 - Springer
Ethereum is a blockchain network that allows developers to create smart contracts and
programs that run on the blockchain. Smart contracts contain logic to transfer assets based …

A Detection Method Against Selfish Mining-Like Attacks Based On Ensemble Deep Learning in IoT

Y Wang, C Li, Y Zhang, T Li, J Ning… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Cryptojacking is a new type of Internet of Things (IoT) attack, where an attacker hijacks the
computing power of IoT devices, such as wireless routers, smart TVs, set-top boxes, or …

Security Defense For Smart Contracts: A Comprehensive Survey

N Ivanov, C Li, Q Yan, Z Sun, Z Cao, X Luo - arxiv preprint arxiv …, 2023 - arxiv.org
The blockchain technology has been used for recording state transitions of smart contracts-
decentralized applications that can be invoked through external transactions. Smart …

Ethereum Phishing Scam Detection Based on Data Augmentation Method and Hybrid Graph Neural Network Model

Z Chen, SZ Liu, J Huang, YH **u, H Zhang, HX Long - Sensors, 2024 - mdpi.com
The rapid advancement of blockchain technology has fueled the prosperity of the
cryptocurrency market. Unfortunately, it has also facilitated certain criminal activities …

EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention

X Zhang, W Sun, Z Xu, H Cheng, C Cai… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Recently, smart contracts have been widely applied in security-sensitive fields yet are fragile
to various vulnerabilities and attacks. Regarding this, existing research efforts either …

IvyRedaction: Enabling Atomic, Consistent and Accountable Cross-Chain Rewriting

S Hu, M Li, J Weng, JN Liu, J Weng… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Blockchain rewriting has become widely explored for addressing data deletion
requirements, such as error data deletion, space-saving, and compliance with the “right-to …