Smart Contracts Security Application and Challenges: A Review

Fadele Ayotunde Alaba, Hakeem Adewale Sulaimon, Madu Ifeyinwa, Owamoyo Najeem
{"title":"Smart Contracts Security Application and Challenges: A Review","authors":"Fadele Ayotunde Alaba, Hakeem Adewale Sulaimon, Madu Ifeyinwa, Owamoyo Najeem","doi":"10.37256/ccds.5120233271","DOIUrl":null,"url":null,"abstract":"There has been a rise in the demand for blockchain-based smart contract development platforms and language implementations. On the other hand, smart contracts and blockchain applications are generated using non-standard software life cycles, which means that, for example, distributed applications are rarely updated, or bugs are fully addressed by releasing a newer version, leading to security flaws and challenges for users to adopt the technology. Smart contracts have gained significant attention due to their potential to automate and secure various transactions in diverse domains. However, the increasing adoption of smart contracts has also raised concerns about security vulnerabilities and potential risks. In this paper, an overview of smart contracts was discussed in detail. It further distinguished and compared smart contracts security with conventional security regarding security, privacy, communication channel, etc. Different platforms for smart contracts, such as Bitcoin, Ethereum, Counterparty, Stellar, Monax, and Lisk, are also discussed in this paper. Some proposed techniques are used in different areas for handling security threats in smart contracts. In addition, a taxonomy of the smart contracts security application was proposed, which attempts to solve some of the flaws and inadequacies in smart contracts. The study also provides a comprehensive smart contracts security scenario with different techniques. Lastly, the possible attacks posed by threats and vulnerabilities of the smart contracts are provided. The security threats and vulnerabilities addressed in this study are unique to smart contracts.","PeriodicalId":158315,"journal":{"name":"Cloud Computing and Data Science","volume":"83 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cloud Computing and Data Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.37256/ccds.5120233271","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

There has been a rise in the demand for blockchain-based smart contract development platforms and language implementations. On the other hand, smart contracts and blockchain applications are generated using non-standard software life cycles, which means that, for example, distributed applications are rarely updated, or bugs are fully addressed by releasing a newer version, leading to security flaws and challenges for users to adopt the technology. Smart contracts have gained significant attention due to their potential to automate and secure various transactions in diverse domains. However, the increasing adoption of smart contracts has also raised concerns about security vulnerabilities and potential risks. In this paper, an overview of smart contracts was discussed in detail. It further distinguished and compared smart contracts security with conventional security regarding security, privacy, communication channel, etc. Different platforms for smart contracts, such as Bitcoin, Ethereum, Counterparty, Stellar, Monax, and Lisk, are also discussed in this paper. Some proposed techniques are used in different areas for handling security threats in smart contracts. In addition, a taxonomy of the smart contracts security application was proposed, which attempts to solve some of the flaws and inadequacies in smart contracts. The study also provides a comprehensive smart contracts security scenario with different techniques. Lastly, the possible attacks posed by threats and vulnerabilities of the smart contracts are provided. The security threats and vulnerabilities addressed in this study are unique to smart contracts.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
智能合约安全应用与挑战综述
对基于区块链的智能合约开发平台和语言实现的需求有所增加。另一方面,智能合约和区块链应用程序是使用非标准软件生命周期生成的,这意味着,例如,分布式应用程序很少更新,或者通过发布新版本来完全解决错误,从而导致安全漏洞和用户采用该技术的挑战。智能合约因其在不同领域自动化和保护各种交易的潜力而获得了极大的关注。然而,智能合约的日益普及也引发了人们对安全漏洞和潜在风险的担忧。在本文中,详细讨论了智能合约的概述。在安全性、隐私性、通信渠道等方面,对智能合约安全与传统安全进行了进一步的区分和比较。本文还讨论了不同的智能合约平台,如比特币、以太坊、对手方、恒星、Monax和Lisk。一些建议的技术被用于不同的领域来处理智能合约中的安全威胁。此外,提出了一种智能合约安全应用的分类方法,试图解决智能合约的一些缺陷和不足。该研究还提供了一个使用不同技术的全面智能合约安全场景。最后,给出了智能合约的威胁和漏洞可能造成的攻击。本研究中解决的安全威胁和漏洞是智能合约所独有的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
DeepMetaDroid: Real-Time Android Malware Detection Using Deep Learning and Metadata Features Advancing Stock Market Predictions with Time Series Analysis including LSTM and ARIMA Geochemical and Geospatial Distribution of Organic Contaminants in the Flood Plain of Ekpetiama, Niger Delta Region of Nigeria Smart Contracts Security Application and Challenges: A Review A Review on Current Trends and Applications of Social Media Research in Sri Lanka
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1