Pouyan Jahanbin, Ravi S. Sharma, Stephen T. Wingreen, Nir Kshetri, Kim-Kwang Raymond Choo
The application of Blockchain and augmented technologies such as IoT, AI, and Big Data platforms present a feasible approach for resolving the implementation challenges of trusted, decentralized platforms. This article proposes a DevOps framework for the specification of Blockchain use-cases that enables evaluation, replication, and benchmarking. Specifically, it could be applied to specify the requirements and design characteristics of Blockchain applications in terms of key attributes such as: (i) transparency; (ii) traceability; (iii) tamper-resistance; (iv) immutability; and (v) compliance. The article first introduces the design characteristics of Blockchain as a Platform and then examines successful use-cases for its implementation using the above attributes. It may be conjectured that the 3TIC framework would serve as the basis of a cross industry process for Blockchain. The intended contribution is that such a standard process will support industry-academia collaboration in the development of Blockchain platforms and services of relevance and utility as it can be applied by firms to structure their requirements and design specifications.
{"title":"Towards CRISP-BC: 3TIC specification framework for Blockchain use-cases","authors":"Pouyan Jahanbin, Ravi S. Sharma, Stephen T. Wingreen, Nir Kshetri, Kim-Kwang Raymond Choo","doi":"10.1049/blc2.12038","DOIUrl":"https://doi.org/10.1049/blc2.12038","url":null,"abstract":"<p>The application of Blockchain and augmented technologies such as IoT, AI, and Big Data platforms present a feasible approach for resolving the implementation challenges of trusted, decentralized platforms. This article proposes a DevOps framework for the specification of Blockchain use-cases that enables evaluation, replication, and benchmarking. Specifically, it could be applied to specify the requirements and design characteristics of Blockchain applications in terms of key attributes such as: (i) transparency; (ii) traceability; (iii) tamper-resistance; (iv) immutability; and (v) compliance. The article first introduces the design characteristics of Blockchain as a Platform and then examines successful use-cases for its implementation using the above attributes. It may be conjectured that the 3TIC framework would serve as the basis of a cross industry process for Blockchain. The intended contribution is that such a standard process will support industry-academia collaboration in the development of Blockchain platforms and services of relevance and utility as it can be applied by firms to structure their requirements and design specifications.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 3","pages":"159-168"},"PeriodicalIF":0.0,"publicationDate":"2023-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12038","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50155512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chuntang Yu, Yongzhao Zhan, Pujie Jing, Xiangmei Song
Implementing effective regulation of blockchain transactions has become a research hotspot in recent years. However, most of the current regulatory schemes are customized for specific blockchain applications and lack versatility and scalability. Meanwhile, these schemes cannot guarantee fairness due to the non-disclosure of regulatory policies and regulatory processes. To address these issues, a scalable policy-based regulatory architecture (SPRA) is proposed for blockchain transactions that separates regulation and application to provide sufficient scalability. SPRA is a four-layer model (permission layer, regulation layer, bridge layer, and business layer). A regulatory policy description language (XRPL) is designed to define the regulatory rules and specifications for interoperability between the layers. A decentralized jury mechanism (JuryBC) based on the Shamir threshold secret sharing algorithm and Pedersen commitment is proposed at the regulation layer to avoid regulatory arbitrariness and unfairness. We also construct a secure and efficient regulatory data sharing scheme (RDShare) at the business layer using an attribute-based encryption algorithm. The key parameters in both JuryBC and RDShare can be specified in the regulatory policy to suit different application scenarios. Finally, the security of the architecture is analyzed and the feasibility and scalability of the architecture through simulation experiments are demonstrated.
{"title":"SPRA: Scalable policy-based regulatory architecture for blockchain transactions","authors":"Chuntang Yu, Yongzhao Zhan, Pujie Jing, Xiangmei Song","doi":"10.1049/blc2.12037","DOIUrl":"10.1049/blc2.12037","url":null,"abstract":"<p>Implementing effective regulation of blockchain transactions has become a research hotspot in recent years. However, most of the current regulatory schemes are customized for specific blockchain applications and lack versatility and scalability. Meanwhile, these schemes cannot guarantee fairness due to the non-disclosure of regulatory policies and regulatory processes. To address these issues, a scalable policy-based regulatory architecture (SPRA) is proposed for blockchain transactions that separates regulation and application to provide sufficient scalability. SPRA is a four-layer model (permission layer, regulation layer, bridge layer, and business layer). A regulatory policy description language (XRPL) is designed to define the regulatory rules and specifications for interoperability between the layers. A decentralized jury mechanism (JuryBC) based on the Shamir threshold secret sharing algorithm and Pedersen commitment is proposed at the regulation layer to avoid regulatory arbitrariness and unfairness. We also construct a secure and efficient regulatory data sharing scheme (RDShare) at the business layer using an attribute-based encryption algorithm. The key parameters in both JuryBC and RDShare can be specified in the regulatory policy to suit different application scenarios. Finally, the security of the architecture is analyzed and the feasibility and scalability of the architecture through simulation experiments are demonstrated.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"265-282"},"PeriodicalIF":0.0,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12037","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87572493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Junfeng An, Yuanguang Jing, Mengmeng Lu, Lei Zheng, Yuting Li, Ti Zhang, Jiwei Zhang
As of today, blockchain technology is virtually absent from rail transit applications, however, it has promising potential. For cloud-based systems or conventional systems, there is too much information at the centre, resulting in a high level of data processing. However, if the data processing capability can be provided at the edge station or at the edge equipment, it greatly reduces the operation and maintenance pressure, at the same time, if the edge device takes the form of a blockchain, it is possible to increase the safety protection capability. It is important to reduce operating and maintenance risks for metro equipment systems by installing fault diagnosis and health management capabilities. This paper presents a blockchain-based platform for subway applications. The assistance includes design, construction, operation, and maintenance assistance, energy saving assistance, manpower reduction assistance, fire protection linkage assistance at transfer stations, federal learning analysis and artificial intelligence analysis, as well as specific implementation plans for implementing vent valve equipment as examples.
{"title":"A blockchain database system for a rail transit equipment system","authors":"Junfeng An, Yuanguang Jing, Mengmeng Lu, Lei Zheng, Yuting Li, Ti Zhang, Jiwei Zhang","doi":"10.1049/blc2.12035","DOIUrl":"10.1049/blc2.12035","url":null,"abstract":"<p>As of today, blockchain technology is virtually absent from rail transit applications, however, it has promising potential. For cloud-based systems or conventional systems, there is too much information at the centre, resulting in a high level of data processing. However, if the data processing capability can be provided at the edge station or at the edge equipment, it greatly reduces the operation and maintenance pressure, at the same time, if the edge device takes the form of a blockchain, it is possible to increase the safety protection capability. It is important to reduce operating and maintenance risks for metro equipment systems by installing fault diagnosis and health management capabilities. This paper presents a blockchain-based platform for subway applications. The assistance includes design, construction, operation, and maintenance assistance, energy saving assistance, manpower reduction assistance, fire protection linkage assistance at transfer stations, federal learning analysis and artificial intelligence analysis, as well as specific implementation plans for implementing vent valve equipment as examples.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 1","pages":"83-100"},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12035","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78842252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The use of federated learning to achieve blockchain interoperability has become a hot topic in research, because it enables data exchange without revealing any private information. However, the previous work, such as ScaleSFL (Asia-CCS, 2022), that has implemented federated learning for blockchain interoperability, the throughput of the framework still cannot support the practical applications. Therefore, a federated learning framework based on Directed Acyclic Graph (DAG) is proposed which utilizes sharding mechanism to enhance the blockchain interoperability. By constructing a weighted context graph based on data correlation, reasonable sharding of the dataset is achieved, thereby improving the efficiency of blockchain interoperability. The experimental results show that the federated framework reduces global computation in federated learning by 30% compared with other schemes, while increasing blockchain throughput by nearly 40%.
{"title":"Enhancing the blockchain interoperability through federated learning with directed acyclic graph","authors":"Feng Xia, Li Kaiye, Wu Songze, Xin yan","doi":"10.1049/blc2.12033","DOIUrl":"10.1049/blc2.12033","url":null,"abstract":"<p>The use of federated learning to achieve blockchain interoperability has become a hot topic in research, because it enables data exchange without revealing any private information. However, the previous work, such as ScaleSFL (Asia-CCS, 2022), that has implemented federated learning for blockchain interoperability, the throughput of the framework still cannot support the practical applications. Therefore, a federated learning framework based on Directed Acyclic Graph (DAG) is proposed which utilizes sharding mechanism to enhance the blockchain interoperability. By constructing a weighted context graph based on data correlation, reasonable sharding of the dataset is achieved, thereby improving the efficiency of blockchain interoperability. The experimental results show that the federated framework reduces global computation in federated learning by 30% compared with other schemes, while increasing blockchain throughput by nearly 40%.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"238-248"},"PeriodicalIF":0.0,"publicationDate":"2023-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12033","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89998234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the development of blockchain, cryptocurrencies are also showing a boom. However, due to the decentralized and anonymous nature of blockchain, cryptocurrencies have inevitably become a hotbed for fraudulent crimes. For example, phishing scams are frequent, which not only jeopardize the financial security of blockchain, but also hinder the promotion of blockchain technology. To solve this problem, this paper proposes a graph neural network-based phishing detection method for Ethereum, and validates it using Ethereum datasets. Specifically, this paper proposes a feature learning algorithm named TransWalk, which consists of a random walk strategy for transaction networks and a multi-scale feature extraction method for Ethereum. Then, an Ethereum phishing fraud detection framework is built based on TransWalk, and conduct extensive experiments on the Ethereum dataset to verify the effectiveness of this scheme in identifying Ethereum phishing detection.
{"title":"Ethereum phishing detection based on graph neural networks","authors":"Ao Xiong, Yuanzheng Tong, Chengling Jiang, Shaoyong Guo, Sujie Shao, Jing Huang, Wei Wang, Baozhen Qi","doi":"10.1049/blc2.12031","DOIUrl":"10.1049/blc2.12031","url":null,"abstract":"<p>With the development of blockchain, cryptocurrencies are also showing a boom. However, due to the decentralized and anonymous nature of blockchain, cryptocurrencies have inevitably become a hotbed for fraudulent crimes. For example, phishing scams are frequent, which not only jeopardize the financial security of blockchain, but also hinder the promotion of blockchain technology. To solve this problem, this paper proposes a graph neural network-based phishing detection method for Ethereum, and validates it using Ethereum datasets. Specifically, this paper proposes a feature learning algorithm named TransWalk, which consists of a random walk strategy for transaction networks and a multi-scale feature extraction method for Ethereum. Then, an Ethereum phishing fraud detection framework is built based on TransWalk, and conduct extensive experiments on the Ethereum dataset to verify the effectiveness of this scheme in identifying Ethereum phishing detection.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 3","pages":"226-234"},"PeriodicalIF":0.0,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12031","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89028785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Along with the continuous breakthroughs and innovations in blockchain technology, various blockchain application scenarios are emerging, such as healthcare, e-voting, and Internet of Things. However, in general, these applications need to be supported by blockchain systems with different characteristics. Different blockchain systems have significant differences in architecture, security, efficiency, and so on, which makes the exchange of information between applications have certain barriers. Therefore, the research of blockchain cross-chain technology brings hope for breaking the information barriers between blockchain systems. This paper describes the basic principles and latest research of three mainstream cross-chain technologies; then analyzes three innovative cross-chain solutions of cross-chain routing, smart contracts, and multi-chain consensus; furthermore, discusses the application and security risks of cross-chain technologies, and finally summarizes and outlooks on cross-chain technologies.
{"title":"A review of blockchain cross-chain technology","authors":"Li Li, Jiahao Wu, Wei Cui","doi":"10.1049/blc2.12032","DOIUrl":"https://doi.org/10.1049/blc2.12032","url":null,"abstract":"<p>Along with the continuous breakthroughs and innovations in blockchain technology, various blockchain application scenarios are emerging, such as healthcare, e-voting, and Internet of Things. However, in general, these applications need to be supported by blockchain systems with different characteristics. Different blockchain systems have significant differences in architecture, security, efficiency, and so on, which makes the exchange of information between applications have certain barriers. Therefore, the research of blockchain cross-chain technology brings hope for breaking the information barriers between blockchain systems. This paper describes the basic principles and latest research of three mainstream cross-chain technologies; then analyzes three innovative cross-chain solutions of cross-chain routing, smart contracts, and multi-chain consensus; furthermore, discusses the application and security risks of cross-chain technologies, and finally summarizes and outlooks on cross-chain technologies.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 3","pages":"149-158"},"PeriodicalIF":0.0,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12032","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50126632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Over the past few years, blockchain platforms supporting WebAssembly (Wasm) smart contracts are gaining popularity. However, Wasm smart contracts are often compiled from memory-unsafe languages (e.g. C and C++). And there is a lack of effective defense against integer overflow and stack overflow at the compiler and virtual machine (VM) layers, making Wasm smart contracts even more exploitable than native C and C++ programs. In this paper, the authors propose wasm overflow detector (WASMOD) to address the integer overflow and stack overflow vulnerabilities. The authors’ approach combines bytecode instrumentation, run-time validation, and grey-box fuzzing to detect these vulnerabilities. The authors applied their approach to the popular EOSIO blockchain and evaluated it on 4616 deployed Wasm smart contracts. The authors’ approach detected 13 real-world vulnerable smart contracts.
{"title":"WASMOD: Detecting vulnerabilities in Wasm smart contracts","authors":"Jianfei Zhou, Ting Chen","doi":"10.1049/blc2.12029","DOIUrl":"10.1049/blc2.12029","url":null,"abstract":"<p>Over the past few years, blockchain platforms supporting WebAssembly (Wasm) smart contracts are gaining popularity. However, Wasm smart contracts are often compiled from memory-unsafe languages (e.g. C and C++). And there is a lack of effective defense against integer overflow and stack overflow at the compiler and virtual machine (VM) layers, making Wasm smart contracts even more exploitable than native C and C++ programs. In this paper, the authors propose wasm overflow detector <b>(WASMOD)</b> to address the integer overflow and stack overflow vulnerabilities. The authors’ approach combines bytecode instrumentation, run-time validation, and grey-box fuzzing to detect these vulnerabilities. The authors applied their approach to the popular EOSIO blockchain and evaluated it on 4616 deployed Wasm smart contracts. The authors’ approach detected 13 real-world vulnerable smart contracts.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"172-181"},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12029","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74856433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xinlei Liu, Yang Liu, Xiangyang Li, Haohao Cao, Yaoqi Wang
The Byzantine Fault Tolerant (BFT) consensus algorithms have been widely applied in the blockchain systems because of their fault tolerance capability to determine system consistency in the presence of malicious nodes. However, the BFT consensus algorithms are confronted with low efficiency and scalability problems caused by multiple rounds of handshake communication. In this paper, a pipeline-based Fast Pipeline Byzantine Fault Tolerance consensus algorithm (FP-BFT) is proposed, which adopts a non-leader pipeline framework to process different rounds of transactions in parallel. By means of randomly selecting 2f+1 nodes to form a committee for one round of transactions, consensus agreement can be reached within the committee via nodes broadcasting and voting. Committee nodes participating in the consensus are chosen by chance to avoid the monopoly of which becomes the block producer. Consensus efficiency and the system throughput can be significantly improved with the pipeline framework. Comparison experiments are conducted to verify the superiority of the FP-BFT algorithm, and the theoretical proof is given to guarantee the Byzantine fault-tolerant security. Experimental results show that FP-BFT has improved the consensus efficiency by decreasing communication overhead to make it better applied both in public blockchain and consortium blockchain systems.
{"title":"FP-BFT: A fast pipeline Byzantine consensus algorithm","authors":"Xinlei Liu, Yang Liu, Xiangyang Li, Haohao Cao, Yaoqi Wang","doi":"10.1049/blc2.12030","DOIUrl":"https://doi.org/10.1049/blc2.12030","url":null,"abstract":"<p>The Byzantine Fault Tolerant (BFT) consensus algorithms have been widely applied in the blockchain systems because of their fault tolerance capability to determine system consistency in the presence of malicious nodes. However, the BFT consensus algorithms are confronted with low efficiency and scalability problems caused by multiple rounds of handshake communication. In this paper, a pipeline-based Fast Pipeline Byzantine Fault Tolerance consensus algorithm (FP-BFT) is proposed, which adopts a non-leader pipeline framework to process different rounds of transactions in parallel. By means of randomly selecting 2<i>f</i>+1 nodes to form a committee for one round of transactions, consensus agreement can be reached within the committee via nodes broadcasting and voting. Committee nodes participating in the consensus are chosen by chance to avoid the monopoly of which becomes the block producer. Consensus efficiency and the system throughput can be significantly improved with the pipeline framework. Comparison experiments are conducted to verify the superiority of the FP-BFT algorithm, and the theoretical proof is given to guarantee the Byzantine fault-tolerant security. Experimental results show that FP-BFT has improved the consensus efficiency by decreasing communication overhead to make it better applied both in public blockchain and consortium blockchain systems.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 3","pages":"123-135"},"PeriodicalIF":0.0,"publicationDate":"2023-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12030","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50141719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cyber security in the banking sector is of high importance nowadays. The rate of cyberattacks is spiking every year, and the implementation of strong cybersecurity models is required to ensure the confidentiality and integrity of data. Since protecting a bank requires a wide range of security practices, this paper focuses on protecting the bank resources from malicious actors and securing the transactions using a blockchain consensus mechanism that uses a zero-trust security approach among the participants in the transaction. In addition to the framework, an algorithm for blockchain-based online transactions was designed to make use of practical implementation in the future. The ideas formulated during the research and literature review were integrated to design the framework and the algorithm. The proposed framework ensures that the security of the banking sector can be enhanced by adopting the zero-trust concept and blockchain technology. The consensus algorithms used for the transaction make it immutable and decentralized. Zero-trust principles adopted in the model ensure the confidentiality and integrity of the banking system.
{"title":"Zero-trust-based security model against data breaches in the banking sector: A blockchain consensus algorithm","authors":"Umair B. Chaudhry, Aysha K. M. Hydros","doi":"10.1049/blc2.12028","DOIUrl":"https://doi.org/10.1049/blc2.12028","url":null,"abstract":"<p>Cyber security in the banking sector is of high importance nowadays. The rate of cyberattacks is spiking every year, and the implementation of strong cybersecurity models is required to ensure the confidentiality and integrity of data. Since protecting a bank requires a wide range of security practices, this paper focuses on protecting the bank resources from malicious actors and securing the transactions using a blockchain consensus mechanism that uses a zero-trust security approach among the participants in the transaction. In addition to the framework, an algorithm for blockchain-based online transactions was designed to make use of practical implementation in the future. The ideas formulated during the research and literature review were integrated to design the framework and the algorithm. The proposed framework ensures that the security of the banking sector can be enhanced by adopting the zero-trust concept and blockchain technology. The consensus algorithms used for the transaction make it immutable and decentralized. Zero-trust principles adopted in the model ensure the confidentiality and integrity of the banking system.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 2","pages":"98-115"},"PeriodicalIF":0.0,"publicationDate":"2023-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12028","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50142222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Can Zhao, Qin Liu, Zonghua Hu, Ze Yu, Dejun Wang, Bo Meng
Go is a relatively new programming language and has become one of the most important programming languages used widely in blockchain. A formal semantics plays an important role in program synthesis, analysis and verification. The existed formal semantics of Go are not executable and do not cover the core features, hence, this paper presents an executable formal semantics for Go, called K-Go, using rewriting logic in