D. Sebastian-Cardenas, Sri Nikhil Gupta Gourisetti, S. Saha, Komal Khan, Leonard C. Tillman, U. Cali, Tamara Hughes
{"title":"Cybersecurity and Privacy Aspects of Smart Contracts in the Energy Domain","authors":"D. Sebastian-Cardenas, Sri Nikhil Gupta Gourisetti, S. Saha, Komal Khan, Leonard C. Tillman, U. Cali, Tamara Hughes","doi":"10.1109/iGETblockchain56591.2022.10087129","DOIUrl":null,"url":null,"abstract":"Smart contracts (SCs) are a set of logical procedures that can be run by individual peers participating within a Distributed Ledger Technology (DLT) network. By design, smart contracts inherit many of the benefits of DLT, including its immutability, scalability and security properties. Nevertheless, they may introduce additional attack vectors, which can lead to cybersecurity explorations that could jeopardize the end-application’s ability to operate as intended or result in data leaks, and privacy violations. In this work an exploration of known problems, and possible attack scenarios will be presented. This is followed by a set of proposed best practices that are intended to assist developers, researchers and other relevant stakeholders to develop secure SC implementations.","PeriodicalId":186049,"journal":{"name":"2022 IEEE 1st Global Emerging Technology Blockchain Forum: Blockchain & Beyond (iGETblockchain)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 1st Global Emerging Technology Blockchain Forum: Blockchain & Beyond (iGETblockchain)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iGETblockchain56591.2022.10087129","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Smart contracts (SCs) are a set of logical procedures that can be run by individual peers participating within a Distributed Ledger Technology (DLT) network. By design, smart contracts inherit many of the benefits of DLT, including its immutability, scalability and security properties. Nevertheless, they may introduce additional attack vectors, which can lead to cybersecurity explorations that could jeopardize the end-application’s ability to operate as intended or result in data leaks, and privacy violations. In this work an exploration of known problems, and possible attack scenarios will be presented. This is followed by a set of proposed best practices that are intended to assist developers, researchers and other relevant stakeholders to develop secure SC implementations.