2021
DOI: 10.1002/ett.4341
|View full text |Cite
|
Sign up to set email alerts
|

Security enhancement technologies for smart contracts in the blockchain: A survey

Abstract: Smart contract has shown its potential in cutting down the cost of administration through reshaping conventional business processes and in expanding the application of blockchain to areas that are beyond the cryptocurrency. However, with the rapid development and wide application of smart contracts, security issues have become a serious concern and have thus attracted widespread attention. As the result, a great deal of effort has been spent on improving and supporting secure development and on the application… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 115 publications
0
9
0
Order By: Relevance
“…Although they divide the defenses into proactive and reactive, they are lacking an explanation of how the different tools are designed. Another survey by Wang and He et al [159] reviews 6 kinds of vulnerability detection methods and privacy protection techniques in 3 platforms (i.e., Ethereum, Hyperledger fabric and Corda), and summarizes several commonly used tools for each method. Di Angelo et al [58] investigate 27 analysis tools of Ethereum smart contracts regarding availability, maturity level, methods employed, and detection of security issues.…”
Section: Prior Surveysmentioning
confidence: 99%
“…Although they divide the defenses into proactive and reactive, they are lacking an explanation of how the different tools are designed. Another survey by Wang and He et al [159] reviews 6 kinds of vulnerability detection methods and privacy protection techniques in 3 platforms (i.e., Ethereum, Hyperledger fabric and Corda), and summarizes several commonly used tools for each method. Di Angelo et al [58] investigate 27 analysis tools of Ethereum smart contracts regarding availability, maturity level, methods employed, and detection of security issues.…”
Section: Prior Surveysmentioning
confidence: 99%
“…Surveys exist that focus on pre-deployment analysis methods. Wang et al [213] review symbolic execution, abstract interpretation, fuzz testing, formal verification, deep learning, and privacy enhancement on smart contracts and compare various tools and methods that address security issues. That work does not survey properties verified using these approaches.…”
Section: Studymentioning
confidence: 99%
“…If the given contract criteria are matched, then all the defined operations for that transaction will be executed. 40 Once the transaction is validated, it is authenticated and inserted into a new block using a consensus procedure. The blockchain also stores the transaction and the modified state along with the status of the participants.…”
Section: Smart Contractmentioning
confidence: 99%
“…The miner runs the contract code in the local sandbox environment after getting a call message about the transaction. If the given contract criteria are matched, then all the defined operations for that transaction will be executed 40 . Once the transaction is validated, it is authenticated and inserted into a new block using a consensus procedure.…”
Section: Preliminariesmentioning
confidence: 99%