Blockchain technology: security issues, healthcare applications, challenges and future trends

Z Wenhua, F Qamar, TAN Abdali, R Hassan, STA Jafri… - Electronics, 2023 - mdpi.com
Blockchain technology provides a data structure with inherent security properties that
include cryptography, decentralization, and consensus, which ensure trust in transactions. It …

Fuzzing: a survey for roadmap

X Zhu, S Wen, S Camtepe, Y **ang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Fuzz testing (fuzzing) has witnessed its prosperity in detecting security flaws recently. It
generates a large number of test cases and monitors the executions for defects. Fuzzing has …

[HTML][HTML] A survey on blockchain technology and its security

H Guo, X Yu - Blockchain: research and applications, 2022 - Elsevier
Blockchain is a technology that has desirable features of decentralization, autonomy,
integrity, immutability, verification, fault-tolerance, anonymity, auditability, and transparency …

Sok: Decentralized finance (defi) attacks

L Zhou, X **ong, J Ernstberger… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Within just four years, the blockchain-based Decentralized Finance (DeFi) ecosystem has
accumulated a peak total value locked (TVL) of more than 253 billion USD. This surge in …

Blockchain smart contracts: Applications, challenges, and future trends

SN Khan, F Loukil, C Ghedira-Guegan… - Peer-to-peer Networking …, 2021 - Springer
In recent years, the rapid development of blockchain technology and cryptocurrencies has
influenced the financial industry by creating a new crypto-economy. Then, next-generation …

Systematic review of security vulnerabilities in ethereum blockchain smart contract

SS Kushwaha, S Joshi, D Singh, M Kaur, HN Lee - Ieee Access, 2022 - ieeexplore.ieee.org
Blockchain is a revolutionary technology that enables users to communicate in a trust-less
manner. It revolutionizes the modes of business between organizations without the need for …

The roadmap to 6G security and privacy

P Porambage, G Gür, DPM Osorio… - IEEE Open Journal …, 2021 - ieeexplore.ieee.org
Although the fifth generation (5G) wireless networks are yet to be fully investigated, the
visionaries of the 6th generation (6G) echo systems have already come into the discussion …

Combining graph neural networks with expert knowledge for smart contract vulnerability detection

Z Liu, P Qian, X Wang, Y Zhuang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Smart contract vulnerability detection draws extensive attention in recent years due to the
substantial losses caused by hacker attacks. Existing efforts for contract security analysis …

Survey on blockchain based smart contracts: Applications, opportunities and challenges

T Hewa, M Ylianttila, M Liyanage - Journal of network and computer …, 2021 - Elsevier
Blockchain is one of the disruptive technical innovation in the recent computing paradigm.
Many applications already notoriously hard and complex are fortunate to ameliorate the …

Understanding security issues in the NFT ecosystem

D Das, P Bose, N Ruaro, C Kruegel… - Proceedings of the 2022 …, 2022 - dl.acm.org
Non-Fungible Tokens (NFTs) have emerged as a way to collect digital art as well as an
investment vehicle. Despite having been popularized only recently, NFT markets have …