首页 > 最新文献

2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)最新文献

英文 中文
A Relational Network Framework for Interoperability in Distributed Energy Trading 分布式能源交易中互操作性的关系网络框架
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169462
Samuel Karumba, S. Kanhere, R. Jurdak
Blockchain-based approaches are increasingly being used to provide distributed trust and security in Distributed Energy Trading (DET). However, the state-of-the-art solutions lack scalability, privacy, interoperability, and often have large computational overheads hindering their mainstream adoption for sustainable development. To address these challenges, this paper proposes a multi-relationship network framework (RNF) that uses hypergraphs to organise participants in energy trading networks based on high-order relationships (rather than pairwise) for flexibility, interoperability, data privacy, and reduced resource consumption. Results indicate that the proposed framework outperforms the baseline in terms of: enabling value transfer across multiple blockchain-based DET systems; reducing computational costs and achieving energy efficiency for sustainable development.
基于区块链的方法越来越多地被用于在分布式能源交易(DET)中提供分布式信任和安全性。然而,最先进的解决方案缺乏可伸缩性、隐私性、互操作性,并且通常具有大量的计算开销,阻碍了它们在可持续发展中的主流采用。为了解决这些挑战,本文提出了一个多关系网络框架(RNF),该框架使用超图来组织基于高阶关系(而不是两两关系)的能源交易网络中的参与者,以实现灵活性、互操作性、数据隐私和减少资源消耗。结果表明,所提出的框架在以下方面优于基线:实现跨多个基于区块链的DET系统的价值转移;降低计算成本,提高能源效率,促进可持续发展。
{"title":"A Relational Network Framework for Interoperability in Distributed Energy Trading","authors":"Samuel Karumba, S. Kanhere, R. Jurdak","doi":"10.1109/ICBC48266.2020.9169462","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169462","url":null,"abstract":"Blockchain-based approaches are increasingly being used to provide distributed trust and security in Distributed Energy Trading (DET). However, the state-of-the-art solutions lack scalability, privacy, interoperability, and often have large computational overheads hindering their mainstream adoption for sustainable development. To address these challenges, this paper proposes a multi-relationship network framework (RNF) that uses hypergraphs to organise participants in energy trading networks based on high-order relationships (rather than pairwise) for flexibility, interoperability, data privacy, and reduced resource consumption. Results indicate that the proposed framework outperforms the baseline in terms of: enabling value transfer across multiple blockchain-based DET systems; reducing computational costs and achieving energy efficiency for sustainable development.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117183237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vote Delegation and Malicious Parties 投票委托和恶意方
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169391
H. Gersbach, A. Mamageishvili, Manvir Schneider
We initiate the study of vote delegation in a costly voting setting and compare its performance to conventional voting. Our central insight is that if the number of malicious voters is comparatively low, delegation dominates conventional voting. If the number of malicious voters is moderate, then conventional voting tends to be better than vote delegation. If the number of malicious voters is high, both voting methods fail to deliver a positive outcome.
我们开始研究在昂贵的投票环境下的投票授权,并将其与传统投票的表现进行比较。我们的核心观点是,如果恶意选民的数量相对较少,那么授权就会主导传统投票。如果恶意选民的数量适中,那么传统投票往往比投票授权更好。如果恶意选民的人数很多,两种投票方式都无法产生积极的结果。
{"title":"Vote Delegation and Malicious Parties","authors":"H. Gersbach, A. Mamageishvili, Manvir Schneider","doi":"10.1109/ICBC48266.2020.9169391","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169391","url":null,"abstract":"We initiate the study of vote delegation in a costly voting setting and compare its performance to conventional voting. Our central insight is that if the number of malicious voters is comparatively low, delegation dominates conventional voting. If the number of malicious voters is moderate, then conventional voting tends to be better than vote delegation. If the number of malicious voters is high, both voting methods fail to deliver a positive outcome.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133557300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EcoBoost: Efficient Bootstrapping for Confidential Transactions EcoBoost:机密交易的有效引导
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169416
Chenggang Wang, Boyang Wang, Xinxin Fan
One of the major challenges of cryptocurrendes is the lack of confidentiality, Without confidentiality, the amount of each transaction on a blockchain is not private. While confidential transactions can hide transaction amounts, its storage overhead is extremely high (e.g., 10~20X). This substantial overhead significantly raises users’ overheads in bootstrapping and impedes new nodes, especially for resource-limited devices.We devise a new method, referred to as EcoBoost, to advance the effidency of bootstrapping for blockchains supporting confidential transactions. Specifically, we harness random sampling to verify the correctness of confidential transactions with high probability. As a result, the verification overhead is sublinear with regard to the number of transactions (compared to linear in current solutions). Our experiment results show that, if Bitcoin implements confidential transactions, EcoBoost can save over 86% storage and verification time in bootstrapping but still detect bogus transactions with a probability of 99%.
加密货币的主要挑战之一是缺乏保密性,没有保密性,区块链上的每笔交易的金额都不是私有的。虽然机密事务可以隐藏交易金额,但其存储开销非常高(例如10~20倍)。这种巨大的开销大大增加了用户在引导方面的开销,并阻碍了新节点的创建,特别是对于资源有限的设备。我们设计了一种新方法,称为EcoBoost,以提高支持机密交易的区块链的引导效率。具体来说,我们利用随机抽样来验证高概率保密交易的正确性。因此,与事务数量相比,验证开销是次线性的(与当前解决方案中的线性相比)。我们的实验结果表明,如果比特币实现保密交易,EcoBoost可以在引导中节省超过86%的存储和验证时间,但仍然以99%的概率检测到虚假交易。
{"title":"EcoBoost: Efficient Bootstrapping for Confidential Transactions","authors":"Chenggang Wang, Boyang Wang, Xinxin Fan","doi":"10.1109/ICBC48266.2020.9169416","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169416","url":null,"abstract":"One of the major challenges of cryptocurrendes is the lack of confidentiality, Without confidentiality, the amount of each transaction on a blockchain is not private. While confidential transactions can hide transaction amounts, its storage overhead is extremely high (e.g., 10~20X). This substantial overhead significantly raises users’ overheads in bootstrapping and impedes new nodes, especially for resource-limited devices.We devise a new method, referred to as EcoBoost, to advance the effidency of bootstrapping for blockchains supporting confidential transactions. Specifically, we harness random sampling to verify the correctness of confidential transactions with high probability. As a result, the verification overhead is sublinear with regard to the number of transactions (compared to linear in current solutions). Our experiment results show that, if Bitcoin implements confidential transactions, EcoBoost can save over 86% storage and verification time in bootstrapping but still detect bogus transactions with a probability of 99%.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131535737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance and Fault Tolerance Trade-offs in Sharded Permissioned Blockchains 分片许可区块链中的性能和容错权衡
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169425
Chunyu Mao, Anh-Duong Nguyen, W. Golab
Blockchain has become a promising technology in distributed systems in recent years, but scalability remains a major problem. The traditional approach to scalability, namely sharding, does not solve the problem easily because the process of interleaving blocks stored in different shards to create a unified master ledger introduces overhead. This paper examines two techniques for interleaving the shards of permissioned blockchains, which we refer to as strong temporal coupling and weak temporal coupling. We implement these techniques in a prototype system with a Bitcoin-like transaction structure, using the EPaxos consensus protocol for transaction ordering. Our experimental results show that strong coupling can achieve lower latency as compared to weak coupling but same level of peak throughput. However, strong coupling requires all shards to grow at the same rate, and cannot tolerate any shard failure. In contrast, the higher latency of weak coupling is because of the consensus strategy it uses to order the blocks. However, if shard failure occurs, weak coupling can still make progress without stalling the whole system.
近年来,区块链已经成为分布式系统中很有前途的技术,但可扩展性仍然是一个主要问题。传统的可扩展性方法,即分片,并不能轻易解决这个问题,因为将存储在不同分片中的块交叉存储以创建统一的主分类账的过程引入了开销。本文研究了两种用于交叉许可区块链分片的技术,我们称之为强时间耦合和弱时间耦合。我们在一个具有类似比特币交易结构的原型系统中实现这些技术,使用EPaxos共识协议进行交易排序。我们的实验结果表明,与弱耦合相比,强耦合可以在相同的峰值吞吐量水平下实现更低的延迟。然而,强耦合要求所有分片以相同的速度增长,并且不能容忍任何分片失败。相比之下,弱耦合的较高延迟是因为它使用共识策略对块进行排序。但是,如果发生分片故障,弱耦合仍然可以在不使整个系统停滞的情况下继续进行。
{"title":"Performance and Fault Tolerance Trade-offs in Sharded Permissioned Blockchains","authors":"Chunyu Mao, Anh-Duong Nguyen, W. Golab","doi":"10.1109/ICBC48266.2020.9169425","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169425","url":null,"abstract":"Blockchain has become a promising technology in distributed systems in recent years, but scalability remains a major problem. The traditional approach to scalability, namely sharding, does not solve the problem easily because the process of interleaving blocks stored in different shards to create a unified master ledger introduces overhead. This paper examines two techniques for interleaving the shards of permissioned blockchains, which we refer to as strong temporal coupling and weak temporal coupling. We implement these techniques in a prototype system with a Bitcoin-like transaction structure, using the EPaxos consensus protocol for transaction ordering. Our experimental results show that strong coupling can achieve lower latency as compared to weak coupling but same level of peak throughput. However, strong coupling requires all shards to grow at the same rate, and cannot tolerate any shard failure. In contrast, the higher latency of weak coupling is because of the consensus strategy it uses to order the blocks. However, if shard failure occurs, weak coupling can still make progress without stalling the whole system.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"54 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116332453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wallet Contracts on Ethereum 以太坊上的钱包合约
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169467
Monika di Angelo, Gernot Slazer
On the blockchain, cryptocurrencies play a role similar to cash, while cryptographic tokens are a universal tool for handling rights and assets. Software wallets interact with blockchains in general and with smart contracts (on-chain programs) in particular. Some wallets are realized (partly) as smart contracts with the intent to increase trust and security by being transparent and by offering features like daily limits, approvals, multiple signatures, and recovery mechanisms.Ethereum is the most prominent platform for both, tokens and smart contracts, and thus also for wallet contracts. We discuss several methods for identifying wallet contracts in a semi-automatic manner by looking at the deployed bytecodes and their interaction patterns. Furthermore, we differentiate characteristics of wallets in use, and group them into six types.
在区块链上,加密货币扮演着类似于现金的角色,而加密令牌是处理权利和资产的通用工具。软件钱包通常与区块链交互,特别是与智能合约(链上程序)交互。一些钱包(部分地)被实现为智能合约,目的是通过透明和提供每日限制、批准、多重签名和恢复机制等功能来增加信任和安全性。以太坊是令牌和智能合约最突出的平台,因此也适用于钱包合约。我们通过查看已部署的字节码及其交互模式,讨论了几种以半自动方式识别钱包合约的方法。此外,我们区分了使用中的钱包的特征,并将其分为六种类型。
{"title":"Wallet Contracts on Ethereum","authors":"Monika di Angelo, Gernot Slazer","doi":"10.1109/ICBC48266.2020.9169467","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169467","url":null,"abstract":"On the blockchain, cryptocurrencies play a role similar to cash, while cryptographic tokens are a universal tool for handling rights and assets. Software wallets interact with blockchains in general and with smart contracts (on-chain programs) in particular. Some wallets are realized (partly) as smart contracts with the intent to increase trust and security by being transparent and by offering features like daily limits, approvals, multiple signatures, and recovery mechanisms.Ethereum is the most prominent platform for both, tokens and smart contracts, and thus also for wallet contracts. We discuss several methods for identifying wallet contracts in a semi-automatic manner by looking at the deployed bytecodes and their interaction patterns. Furthermore, we differentiate characteristics of wallets in use, and group them into six types.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121861058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Decentralized Identity and Trust Management Framework for Internet of Things 物联网去中心化身份与信任管理框架
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169411
Markus Luecking, Christian Fries, Robin Lamberti, W. Stork
Today, Internet of Things (IoT) devices mostly operate in enclosed, proprietary environments. To unfold the full potential of IoT applications, a unifying and permissionless environment is crucial. All IoT devices, even unknown to each other, would be able to trade services and assets across various domains. In order to realize those applications, uniquely resolvable identities are essential. However, quantifiable trust in identities and their authentication are not trivially provided in such an environment due to the absence of a trusted authority. This research presents a new identity and trust framework for IoT devices, based on Distributed Ledger Technology (DLT). IoT devices assign identities to themselves, which are managed publicly and decentralized on the DLT’s network as Self Sovereign Identities (SSI). In addition to the Identity Management System (IdMS), the framework provides a Web of Trust (WoT) approach to enable automatic trust rating of arbitrary identities. For the framework we used the IOTA Tangle to access and store data, achieving high scalability and low computational overhead. To demonstrate the feasibility of our framework, we provide a proof-of-concept implementation and evaluate the set objectives for real world applicability as well as the vulnerability against common threats in IdMSs and WoTs.
如今,物联网(IoT)设备大多在封闭的专有环境中运行。为了充分发挥物联网应用的潜力,一个统一的、无需许可的环境至关重要。所有物联网设备,即使彼此不认识,也能够跨不同领域交易服务和资产。为了实现这些应用程序,唯一可解析的标识是必不可少的。然而,在这种环境中,由于缺乏可信的权威,无法轻易地提供身份及其身份验证的可量化信任。本研究提出了一种基于分布式账本技术(DLT)的物联网设备的新身份和信任框架。物联网设备为自己分配身份,这些身份在DLT网络上作为自我主权身份(SSI)进行公开和分散管理。除了身份管理系统(IdMS)之外,该框架还提供了一种信任网络(WoT)方法来实现对任意身份的自动信任评级。对于该框架,我们使用IOTA Tangle来访问和存储数据,实现了高可扩展性和低计算开销。为了证明我们的框架的可行性,我们提供了一个概念验证实现,并评估了现实世界适用性的设定目标,以及针对IdMSs和wot中常见威胁的脆弱性。
{"title":"Decentralized Identity and Trust Management Framework for Internet of Things","authors":"Markus Luecking, Christian Fries, Robin Lamberti, W. Stork","doi":"10.1109/ICBC48266.2020.9169411","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169411","url":null,"abstract":"Today, Internet of Things (IoT) devices mostly operate in enclosed, proprietary environments. To unfold the full potential of IoT applications, a unifying and permissionless environment is crucial. All IoT devices, even unknown to each other, would be able to trade services and assets across various domains. In order to realize those applications, uniquely resolvable identities are essential. However, quantifiable trust in identities and their authentication are not trivially provided in such an environment due to the absence of a trusted authority. This research presents a new identity and trust framework for IoT devices, based on Distributed Ledger Technology (DLT). IoT devices assign identities to themselves, which are managed publicly and decentralized on the DLT’s network as Self Sovereign Identities (SSI). In addition to the Identity Management System (IdMS), the framework provides a Web of Trust (WoT) approach to enable automatic trust rating of arbitrary identities. For the framework we used the IOTA Tangle to access and store data, achieving high scalability and low computational overhead. To demonstrate the feasibility of our framework, we provide a proof-of-concept implementation and evaluate the set objectives for real world applicability as well as the vulnerability against common threats in IdMSs and WoTs.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129247584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Software Architecture for Blockchain-based Trade Certificate Systems 基于区块链的贸易证书系统软件架构
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169390
Q. Lu, M. Staples, Hugo O'Connor, Shiping Chen, Adnene Guabtni
Various kinds of certificates are used in international trade, and it is important for trade participants to know about their authenticity and status. One example are phytosanitary certificates, which record that exported plant-based materials meet biosecurity requirements of destination countries. An electronic "ePhyto" certificate system is being developed to be operated by the United Nations (UN). An ePhyto certificate is transmitted from the national plant protection organisation (NPPO) of the exporting country to the NPPO of the importing country. The UN system provides a secure communication channel between pre-registered NPPOs. However, industry participants who are not connected to the UN system are not able to confirm the authenticity of an ePhyto certificate, and whether that ePhyto certificate has been revoked or reissued. In this paper, we describe a blockchain-based system and its software architecture that could augment the emerging ePhyto certificate system by adding a tamper-proof for public users to check the authenticity and status of ePhyto certificates.
在国际贸易中使用各种各样的证书,对贸易参与者来说,了解证书的真实性和地位是很重要的。其中一个例子是植物检疫证书,它记录了出口的植物基材料符合目的地国家的生物安全要求。目前正在开发一个由联合国操作的电子“电子植物”证书系统。ePhyto证书由出口国的国家植物保护组织(NPPO)传递给进口国的国家植物保护组织。联合国系统在预先登记的国家专业人员之间提供安全的通信渠道。然而,没有连接到联合国系统的行业参与者无法确认ePhyto证书的真实性,以及该ePhyto证书是否已被撤销或重新颁发。在本文中,我们描述了一个基于区块链的系统及其软件架构,该系统可以通过为公共用户添加防篡改功能来检查ePhyto证书的真实性和状态,从而增强新兴的ePhyto证书系统。
{"title":"Software Architecture for Blockchain-based Trade Certificate Systems","authors":"Q. Lu, M. Staples, Hugo O'Connor, Shiping Chen, Adnene Guabtni","doi":"10.1109/ICBC48266.2020.9169390","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169390","url":null,"abstract":"Various kinds of certificates are used in international trade, and it is important for trade participants to know about their authenticity and status. One example are phytosanitary certificates, which record that exported plant-based materials meet biosecurity requirements of destination countries. An electronic \"ePhyto\" certificate system is being developed to be operated by the United Nations (UN). An ePhyto certificate is transmitted from the national plant protection organisation (NPPO) of the exporting country to the NPPO of the importing country. The UN system provides a secure communication channel between pre-registered NPPOs. However, industry participants who are not connected to the UN system are not able to confirm the authenticity of an ePhyto certificate, and whether that ePhyto certificate has been revoked or reissued. In this paper, we describe a blockchain-based system and its software architecture that could augment the emerging ePhyto certificate system by adding a tamper-proof for public users to check the authenticity and status of ePhyto certificates.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128274746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Profiling of Malicious Users Using Simple Honeypots on the Ethereum Blockchain Network 在以太坊区块链网络上使用简单蜜罐的恶意用户分析
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169469
Kazuki Hara, Teppei Sato, Mitsuyoshi Imamura, Kazumasa Omote
Blockchain is a service operated by a peer-to-peer type distributed network, and protocol control such as JSON-RPC is implemented as the interface for flexibility and operability. However, attacks that use protocol control against vulnerable and unmanaged interfaces have been reported. One of the methods to track cyber attacks on such a malicious user’s network service is a honeypot that imitates the service and acquires attacker’s behavior information. In this research, focusing on the Ethereum network, the behavior of malicious users is clarified using malicious communication history sent to simple honeypots installed in nine countries, Ethereum network information and darknet arrival packets. By analyzing these, the behavior of attackers and the tendency of requests were elucidated, and primary safety measures were established.
区块链是一种由点对点类型的分布式网络运行的服务,JSON-RPC等协议控制作为接口实现,具有灵活性和可操作性。然而,利用协议控制攻击易受攻击和未受管理接口的攻击已经被报道过。跟踪对此类恶意用户的网络服务的网络攻击的方法之一是利用蜜罐来模拟服务并获取攻击者的行为信息。本研究以以太坊网络为研究对象,利用发送到9个国家安装的简单蜜罐的恶意通信历史记录、以太坊网络信息和暗网到达数据包来澄清恶意用户的行为。通过分析,阐明了攻击者的行为和请求倾向,并制定了初步的安全措施。
{"title":"Profiling of Malicious Users Using Simple Honeypots on the Ethereum Blockchain Network","authors":"Kazuki Hara, Teppei Sato, Mitsuyoshi Imamura, Kazumasa Omote","doi":"10.1109/ICBC48266.2020.9169469","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169469","url":null,"abstract":"Blockchain is a service operated by a peer-to-peer type distributed network, and protocol control such as JSON-RPC is implemented as the interface for flexibility and operability. However, attacks that use protocol control against vulnerable and unmanaged interfaces have been reported. One of the methods to track cyber attacks on such a malicious user’s network service is a honeypot that imitates the service and acquires attacker’s behavior information. In this research, focusing on the Ethereum network, the behavior of malicious users is clarified using malicious communication history sent to simple honeypots installed in nine countries, Ethereum network information and darknet arrival packets. By analyzing these, the behavior of attackers and the tendency of requests were elucidated, and primary safety measures were established.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132669804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Domain Specific Language for Smart Contract Development 智能合约开发的领域特定语言
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169399
Maximilian Wöhrer, Uwe Zdun
The notion to digitally articulate, execute, and enforce agreements with smart contracts has become a feasible reality today. Smart contracts have the potential to vastly improve the efficiency and security of traditional contracts through their self-executing autonomy. To realize smart contracts several blockchain-based ecosystems exist. Today a prominent representative is Ethereum. Its programming language Solidity is used to capture and express contractual clauses in the form of code. However, due to the conceptual discrepancy between contractual clauses and corresponding code, it is hard for domain stakeholders to easily understand contracts, and for developers to write code efficiently without errors. Our research addresses these issues by the design and study of a domain-specific smart contract language based on higher level of abstraction that can be automatically transformed to an implementation. In particular, we propose a clause grammar close to natural language, helpful coding abstractions, and the automatic integration of commonly occurring design patterns during code generation. Through these measures, our approach can reduce the design complexity leading to an increased comprehensibility and reduced error susceptibility. Several implementations of exemplary smart contract scenarios, mostly taken from the Solidity documentation, are used to demonstrate the applicability of our approach.
通过智能合约以数字方式表达、执行和执行协议的概念在今天已经成为一个可行的现实。智能合约通过其自我执行的自主性,有可能极大地提高传统合约的效率和安全性。为了实现智能合约,存在几个基于区块链的生态系统。今天一个突出的代表是以太坊。它的编程语言Solidity用于以代码的形式捕获和表达合同条款。然而,由于合同条款与相应代码之间的概念差异,领域利益相关者很难轻松理解合同,开发人员也很难高效地编写代码而不出错。我们的研究通过设计和研究基于更高抽象级别的领域特定智能合约语言来解决这些问题,该语言可以自动转换为实现。特别是,我们提出了一种接近自然语言的子句语法、有用的编码抽象,以及在代码生成过程中对常见设计模式的自动集成。通过这些措施,我们的方法可以降低设计的复杂性,从而提高可理解性和降低错误敏感性。几个典型的智能合约场景的实现,主要取自Solidity文档,用于演示我们方法的适用性。
{"title":"Domain Specific Language for Smart Contract Development","authors":"Maximilian Wöhrer, Uwe Zdun","doi":"10.1109/ICBC48266.2020.9169399","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169399","url":null,"abstract":"The notion to digitally articulate, execute, and enforce agreements with smart contracts has become a feasible reality today. Smart contracts have the potential to vastly improve the efficiency and security of traditional contracts through their self-executing autonomy. To realize smart contracts several blockchain-based ecosystems exist. Today a prominent representative is Ethereum. Its programming language Solidity is used to capture and express contractual clauses in the form of code. However, due to the conceptual discrepancy between contractual clauses and corresponding code, it is hard for domain stakeholders to easily understand contracts, and for developers to write code efficiently without errors. Our research addresses these issues by the design and study of a domain-specific smart contract language based on higher level of abstraction that can be automatically transformed to an implementation. In particular, we propose a clause grammar close to natural language, helpful coding abstractions, and the automatic integration of commonly occurring design patterns during code generation. Through these measures, our approach can reduce the design complexity leading to an increased comprehensibility and reduced error susceptibility. Several implementations of exemplary smart contract scenarios, mostly taken from the Solidity documentation, are used to demonstrate the applicability of our approach.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132735028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Discover DaVinci – A Gamified Blockchain Learning App 发现达芬奇-一个游戏化的区块链学习应用程序
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169470
Marko Suvajdzic, James C. Oliverio, Angelos Barmpoutis, Liam Wood, Paul Burgermeister
Discover DaVinci is a novel augmented reality system that incorporates blockchain technology with experiential learning to engage participants in an interactive discovery of Leonardo da Vinci’s ouvre. In the true spirit of this "Renaissance man", Discover DaVinci explores new ideas and technologies "ahead of their time".
“发现达芬奇”是一个新型的增强现实系统,它将区块链技术与体验式学习结合在一起,让参与者参与到对达芬奇作品的互动发现中。在这位“文艺复兴时期的人”的真正精神中,《发现达芬奇》探索了“超越时代”的新思想和新技术。
{"title":"Discover DaVinci – A Gamified Blockchain Learning App","authors":"Marko Suvajdzic, James C. Oliverio, Angelos Barmpoutis, Liam Wood, Paul Burgermeister","doi":"10.1109/ICBC48266.2020.9169470","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169470","url":null,"abstract":"Discover DaVinci is a novel augmented reality system that incorporates blockchain technology with experiential learning to engage participants in an interactive discovery of Leonardo da Vinci’s ouvre. In the true spirit of this \"Renaissance man\", Discover DaVinci explores new ideas and technologies \"ahead of their time\".","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"468 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133431960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1