Security threat mitigation for smart contracts: A comprehensive survey
The blockchain technology, initially created for cryptocurrency, has been re-purposed for
recording state transitions of smart contracts—decentralized applications that can be …
recording state transitions of smart contracts—decentralized applications that can be …
Decentralized finance (DeFi): a paradigm shift in the Fintech
R Xu, J Zhu, L Yang, Y Lu, LD Xu - Enterprise Information Systems, 2024 - Taylor & Francis
The financial landscape is undergoing a revolution with the Decentralized Finance (DeFi),
poised to reshape business value creation. This study provides an overview of research …
poised to reshape business value creation. This study provides an overview of research …
Cobra: interaction-aware bytecode-level vulnerability detector for smart contracts
The detection of vulnerabilities in smart contracts remains a significant challenge. While
numerous tools are available for analyzing smart contracts in source code, only about 1.79 …
numerous tools are available for analyzing smart contracts in source code, only about 1.79 …
Privacy-preserving anomaly detection of encrypted smart contract for blockchain-based data trading
In a blockchain-based data trading platform, data users can purchase data sets and
computing power through encrypted smart contracts. The security of smart contracts is …
computing power through encrypted smart contracts. The security of smart contracts is …
A smart contract vulnerability detection method based on deep learning with opcode sequences
Ethereum is a blockchain network that allows developers to create smart contracts and
programs that run on the blockchain. Smart contracts contain logic to transfer assets based …
programs that run on the blockchain. Smart contracts contain logic to transfer assets based …
A Detection Method Against Selfish Mining-Like Attacks Based On Ensemble Deep Learning in IoT
Cryptojacking is a new type of Internet of Things (IoT) attack, where an attacker hijacks the
computing power of IoT devices, such as wireless routers, smart TVs, set-top boxes, or …
computing power of IoT devices, such as wireless routers, smart TVs, set-top boxes, or …
Security Defense For Smart Contracts: A Comprehensive Survey
The blockchain technology has been used for recording state transitions of smart contracts-
decentralized applications that can be invoked through external transactions. Smart …
decentralized applications that can be invoked through external transactions. Smart …
Ethereum Phishing Scam Detection Based on Data Augmentation Method and Hybrid Graph Neural Network Model
Z Chen, SZ Liu, J Huang, YH **u, H Zhang, HX Long - Sensors, 2024 - mdpi.com
The rapid advancement of blockchain technology has fueled the prosperity of the
cryptocurrency market. Unfortunately, it has also facilitated certain criminal activities …
cryptocurrency market. Unfortunately, it has also facilitated certain criminal activities …
EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention
Recently, smart contracts have been widely applied in security-sensitive fields yet are fragile
to various vulnerabilities and attacks. Regarding this, existing research efforts either …
to various vulnerabilities and attacks. Regarding this, existing research efforts either …
IvyRedaction: Enabling Atomic, Consistent and Accountable Cross-Chain Rewriting
Blockchain rewriting has become widely explored for addressing data deletion
requirements, such as error data deletion, space-saving, and compliance with the “right-to …
requirements, such as error data deletion, space-saving, and compliance with the “right-to …