2020 International Symposium on Reliable Distributed Systems (SRDS) 2020
DOI: 10.1109/srds51746.2020.00014
|View full text |Cite
|
Sign up to set email alerts
|

Protect Your Smart Contract Against Unfair Payment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…(b) The currency transfer instructions: Arbitrary access to currency transfer functions creates several vulnerabilities, including unfair payment [123], leaking Ether [96,204], unprotected ether withdrawal and vulnerable access control [196,207,233]. These issues can be addressed by establishing the preservation of owner information property.…”
Section: Information Flow-relatedmentioning
confidence: 99%
See 1 more Smart Citation
“…(b) The currency transfer instructions: Arbitrary access to currency transfer functions creates several vulnerabilities, including unfair payment [123], leaking Ether [96,204], unprotected ether withdrawal and vulnerable access control [196,207,233]. These issues can be addressed by establishing the preservation of owner information property.…”
Section: Information Flow-relatedmentioning
confidence: 99%
“…Double-spending is a vulnerability that arises when the same transaction occurs more than once without reducing the balance [27]. Another vulnerability, unfair payment, arises due to a costless trade, which happens when a user can exchange the same token more than once, whereas once that token is spent, the user is no longer the owner of that token, and thus not eligible to spend it again without getting it back first [123].…”
Section: Preservation Of Assets In Transactionsmentioning
confidence: 99%
“…For contract call, where the recipient is the called smart contract, the input uniquely identifies the callee function through the hash digest algorithm, and the bytecode associated with the called smart contract account is loaded into the Ethereum virtual machine for execution. (6) Miners solve the problem of workload proof by looking for a random nonce value. e hash value of metadata of this new block needs to be smaller than a certain value, which reflects the difficulty of creating the block.…”
Section: Transaction Process Of Ethereummentioning
confidence: 99%
“…Blockchain technology, as a new technology, technically ensures transaction security through encryption algorithm and digital signature, and relies on consensus mechanism to generate blocks to form a chain structure to ensure that data cannot be tampered with. Nevertheless, blockchain is still facing great security threats [6], especially in smart contracts. Because of the differences in the programming ability of smart contract developers, security problems are inevitable.…”
Section: Introductionmentioning
confidence: 99%
“…We assume the trustworthiness of the blockchain. There are technologies to enhance security at the ledger layer [28], [29] and the smart contract layer [30]- [33]. We also see this as a topic complementary to Argus.…”
Section: B Trust Assumptionsmentioning
confidence: 99%