首页 > 最新文献

2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)最新文献

英文 中文
A Simulation-Based Analysis of Multiplayer Selfish Mining 基于仿真的多人自私采矿分析
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169446
Shiquan Zhang, Kaiwen Zhang, Bettina Kemme
Proof-of-Work (PoW) is the core of the most popular consensus protocol among current mainstream blockchain systems including Bitcoin. Selfish mining attacks are a possible threat towards PoW-based systems and recent works have shown that a miner can profit using selfish mining if it has more than 25% of the overall mining power. In this paper, we present a simulator based on a Markov Process model that can analyze scenarios where there are multiple, independently working selfish miners. In our evaluations, we present detailed results with two attackers showing that the threshold for profitable selfish mining decreases to 21% in this case.
工作量证明(PoW)是包括比特币在内的当前主流区块链系统中最流行的共识协议的核心。自私挖矿攻击是对基于pow的系统的潜在威胁,最近的研究表明,如果一个矿工拥有超过25%的总挖矿能力,那么他就可以利用自私挖矿获利。在本文中,我们提出了一个基于马尔可夫过程模型的模拟器,可以分析存在多个独立工作的自私矿工的场景。在我们的评估中,我们提供了两个攻击者的详细结果,表明在这种情况下,有利可图的自私挖矿的阈值降低到21%。
{"title":"A Simulation-Based Analysis of Multiplayer Selfish Mining","authors":"Shiquan Zhang, Kaiwen Zhang, Bettina Kemme","doi":"10.1109/ICBC48266.2020.9169446","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169446","url":null,"abstract":"Proof-of-Work (PoW) is the core of the most popular consensus protocol among current mainstream blockchain systems including Bitcoin. Selfish mining attacks are a possible threat towards PoW-based systems and recent works have shown that a miner can profit using selfish mining if it has more than 25% of the overall mining power. In this paper, we present a simulator based on a Markov Process model that can analyze scenarios where there are multiple, independently working selfish miners. In our evaluations, we present detailed results with two attackers showing that the threshold for profitable selfish mining decreases to 21% in this case.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131034091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
FabricUnit: A Framework for Faster Execution of Unit Tests on Hyperledger Fabric FabricUnit:一个在超级分类账结构上更快执行单元测试的框架
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169430
Shashank Motepalli, Patrícia Vilain, H. Jacobsen
Enterprises and Governments, alike, are leveraging distributed ledger technologies to solve traditional problems across domains. They consider private blockchains such as Hyperledger Fabric as a safe bet for the obvious security and privacy reasons. However, the tools for software reliability are not yet matured. In this work, we propose FabricUnit, a unit testing framework for Hyperledger Fabric clients. FabricUnit identifies the safe methods that do not alter the state and re-uses the setup execution (deleting any stale data and reinitializes the data). Our experiment shows a reduction of approximately 30% in the tests execution time.
企业和政府都在利用分布式账本技术来解决跨领域的传统问题。出于明显的安全和隐私原因,他们认为Hyperledger Fabric等私有区块链是一个安全的选择。然而,软件可靠性的工具还不成熟。在这项工作中,我们提出了FabricUnit,一个用于Hyperledger Fabric客户端的单元测试框架。FabricUnit识别不改变状态的安全方法,并重用设置执行(删除任何陈旧的数据并重新初始化数据)。我们的实验显示测试执行时间减少了大约30%。
{"title":"FabricUnit: A Framework for Faster Execution of Unit Tests on Hyperledger Fabric","authors":"Shashank Motepalli, Patrícia Vilain, H. Jacobsen","doi":"10.1109/ICBC48266.2020.9169430","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169430","url":null,"abstract":"Enterprises and Governments, alike, are leveraging distributed ledger technologies to solve traditional problems across domains. They consider private blockchains such as Hyperledger Fabric as a safe bet for the obvious security and privacy reasons. However, the tools for software reliability are not yet matured. In this work, we propose FabricUnit, a unit testing framework for Hyperledger Fabric clients. FabricUnit identifies the safe methods that do not alter the state and re-uses the setup execution (deleting any stale data and reinitializes the data). Our experiment shows a reduction of approximately 30% in the tests execution time.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114678605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Criticality Aware Orderer for Heterogeneous Transactions in Blockchain b区块链中异构事务的临界感知排序
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169439
Umang Goel, Rahul Sonanis, Ishan Rastogi, S. Lal, Aloknath De
Blockchain enabled systems are becoming increasingly popular in recent times, spreading across variety of domains such as finance, supply chain management, healthcare, etc. These systems usually involve homogeneous transactions with similar latency requirements. However, as increasingly complex systems are enabled through blockchain, they will include a variety of heterogeneous transactions having different latency requirements. For example, an IoT system such as smart building may include transactions corresponding to varied services like payment, biometric registration, etc. Present blockchain systems are transaction metadata agnostic in their ordering step i.e. during ordering and bundling of transactions into blocks. Since transactions in complex systems are heterogeneous in nature, a framework that prioritizes transactions having low latency requirements would be more suitable. In this work, we propose various transaction criticality aware ordering services and comprehensively evaluate them on a handcrafted smart building scenario. Our experiments demonstrate that a single ordering service is not suitable (in terms of number of transactions missing their latency requirement) for all practical scenarios. We demonstrate that selection of a suitable ordering service may give up to 58.25% improvement over other ordering services.
近年来,支持区块链的系统越来越受欢迎,遍布金融、供应链管理、医疗保健等各个领域。这些系统通常涉及具有类似延迟需求的同构事务。然而,随着越来越复杂的系统通过区块链实现,它们将包括具有不同延迟需求的各种异构事务。例如,智能建筑等物联网系统可能包括与支付、生物识别注册等各种服务相对应的交易。目前的区块链系统在其排序步骤中是事务元数据不可知的,即在将事务排序和捆绑到块中。由于复杂系统中的事务本质上是异构的,因此优先考虑具有低延迟需求的事务的框架可能更合适。在这项工作中,我们提出了各种事务临界感知订购服务,并在手工制作的智能建筑场景中对它们进行了全面评估。我们的实验表明,单个排序服务并不适合所有实际场景(就错过延迟需求的事务数量而言)。我们证明,选择合适的订购服务可能会比其他订购服务提高58.25%。
{"title":"Criticality Aware Orderer for Heterogeneous Transactions in Blockchain","authors":"Umang Goel, Rahul Sonanis, Ishan Rastogi, S. Lal, Aloknath De","doi":"10.1109/ICBC48266.2020.9169439","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169439","url":null,"abstract":"Blockchain enabled systems are becoming increasingly popular in recent times, spreading across variety of domains such as finance, supply chain management, healthcare, etc. These systems usually involve homogeneous transactions with similar latency requirements. However, as increasingly complex systems are enabled through blockchain, they will include a variety of heterogeneous transactions having different latency requirements. For example, an IoT system such as smart building may include transactions corresponding to varied services like payment, biometric registration, etc. Present blockchain systems are transaction metadata agnostic in their ordering step i.e. during ordering and bundling of transactions into blocks. Since transactions in complex systems are heterogeneous in nature, a framework that prioritizes transactions having low latency requirements would be more suitable. In this work, we propose various transaction criticality aware ordering services and comprehensively evaluate them on a handcrafted smart building scenario. Our experiments demonstrate that a single ordering service is not suitable (in terms of number of transactions missing their latency requirement) for all practical scenarios. We demonstrate that selection of a suitable ordering service may give up to 58.25% improvement over other ordering services.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122374857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Usable Protection Against Honeypots 迈向可用的蜜罐防护
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169460
C. F. Torres, Mathis Baden, R. State
The Ethereum blockchain enables the execution of so-called smart contracts. These are programs that facilitate the automated transfer of funds according to a given business logic without the participants requiring to trust one another. However, recently attackers started using smart contracts to lure users into traps by deploying contracts that pretend to give away funds but in fact contain hidden traps. This new type of scam is commonly referred to as honeypots. In this paper, we propose a system that aims to protect users from falling into these traps. The system consists of a plugin for MetaMask and a back-end service that continuously scans the Ethereum blockchain for honeypots. Whenever a user is about to perform a transaction through MetaMask, our plugin sends a request to the back-end and warns the user if the target contract is a honeypot.
以太坊区块链允许执行所谓的智能合约。这些程序可以根据给定的业务逻辑促进资金的自动转移,而不需要参与者相互信任。然而,最近攻击者开始使用智能合约,通过部署假装赠送资金但实际上包含隐藏陷阱的合约来引诱用户进入陷阱。这种新型骗局通常被称为蜜罐骗局。在本文中,我们提出了一个旨在保护用户不落入这些陷阱的系统。该系统由MetaMask插件和后端服务组成,该后端服务持续扫描以太坊区块链以寻找蜜罐。每当用户准备通过MetaMask执行交易时,我们的插件都会向后端发送请求,并警告用户目标合约是否为蜜罐。
{"title":"Towards Usable Protection Against Honeypots","authors":"C. F. Torres, Mathis Baden, R. State","doi":"10.1109/ICBC48266.2020.9169460","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169460","url":null,"abstract":"The Ethereum blockchain enables the execution of so-called smart contracts. These are programs that facilitate the automated transfer of funds according to a given business logic without the participants requiring to trust one another. However, recently attackers started using smart contracts to lure users into traps by deploying contracts that pretend to give away funds but in fact contain hidden traps. This new type of scam is commonly referred to as honeypots. In this paper, we propose a system that aims to protect users from falling into these traps. The system consists of a plugin for MetaMask and a back-end service that continuously scans the Ethereum blockchain for honeypots. Whenever a user is about to perform a transaction through MetaMask, our plugin sends a request to the back-end and warns the user if the target contract is a honeypot.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125441946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Data Science Approach for Detecting Honeypots in Ethereum 在以太坊中检测蜜罐的数据科学方法
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169396
R. Camino, C. F. Torres, Mathis Baden, R. State
Ethereum smart contracts have recently drawn a considerable amount of attention from the media, the financial industry and academia. With the increase in popularity, malicious users found new opportunities to profit by deceiving newcomers. Consequently, attackers started luring other attackers into contracts that seem to have exploitable flaws, but that actually contain a complex hidden trap that in the end benefits the contract creator. In the blockchain community, these contracts are known as honeypots. A recent study presented a tool called HONEYBADGER that uses symbolic execution to detect honeypots by analyzing contract bytecode. In this paper, we present a data science detection approach based foremost on the contract transaction behavior. We create a partition of all the possible cases of fund movements between the contract creator, the contract, the transaction sender and other participants. To this end, we add transaction aggregated features, such as the number of transactions and the corresponding mean value and other contract features, for example compilation information and source code length. We find that all aforementioned categories of features contain useful information for the detection of honeypots. Moreover, our approach allows us to detect new, previously undetected honeypots of already known techniques. We furthermore employ our method to test the detection of unknown honeypot techniques by sequentially removing one technique from the training set. We show that our method is capable of discovering the removed honeypot techniques. Finally, we discovered two new techniques that were previously not known.
以太坊智能合约最近引起了媒体、金融行业和学术界的广泛关注。随着人气的增加,恶意用户通过欺骗新手找到了新的获利机会。因此,攻击者开始引诱其他攻击者进入合同,这些合同似乎有可利用的缺陷,但实际上包含一个复杂的隐藏陷阱,最终使合同创建者受益。在区块链社区中,这些合约被称为蜜罐。最近的一项研究提出了一个名为HONEYBADGER的工具,它通过分析合约字节码来使用符号执行来检测蜜罐。本文提出了一种基于契约交易行为的数据科学检测方法。我们创建了合约创建者、合约、交易发送方和其他参与者之间所有可能的资金流动情况的分区。为此,我们添加了交易聚合特征,如交易数量和相应的均值,以及其他合约特征,如编译信息和源代码长度。我们发现上述所有类别的特征都包含了蜜罐检测的有用信息。此外,我们的方法允许我们检测新的,以前未检测到的已知技术的蜜罐。我们进一步利用我们的方法,通过顺序地从训练集中删除一种技术来测试未知蜜罐技术的检测。我们证明了我们的方法能够发现被移除的蜜罐技术。最后,我们发现了两种以前不知道的新技术。
{"title":"A Data Science Approach for Detecting Honeypots in Ethereum","authors":"R. Camino, C. F. Torres, Mathis Baden, R. State","doi":"10.1109/ICBC48266.2020.9169396","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169396","url":null,"abstract":"Ethereum smart contracts have recently drawn a considerable amount of attention from the media, the financial industry and academia. With the increase in popularity, malicious users found new opportunities to profit by deceiving newcomers. Consequently, attackers started luring other attackers into contracts that seem to have exploitable flaws, but that actually contain a complex hidden trap that in the end benefits the contract creator. In the blockchain community, these contracts are known as honeypots. A recent study presented a tool called HONEYBADGER that uses symbolic execution to detect honeypots by analyzing contract bytecode. In this paper, we present a data science detection approach based foremost on the contract transaction behavior. We create a partition of all the possible cases of fund movements between the contract creator, the contract, the transaction sender and other participants. To this end, we add transaction aggregated features, such as the number of transactions and the corresponding mean value and other contract features, for example compilation information and source code length. We find that all aforementioned categories of features contain useful information for the detection of honeypots. Moreover, our approach allows us to detect new, previously undetected honeypots of already known techniques. We furthermore employ our method to test the detection of unknown honeypot techniques by sequentially removing one technique from the training set. We show that our method is capable of discovering the removed honeypot techniques. Finally, we discovered two new techniques that were previously not known.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126395675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Blockchain-based Decentralized Data Sharing Infrastructure for Off-grid Networking 一种基于区块链的离网分布式数据共享基础设施
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169441
H. Niavis, Nikolaos Papadis, L. Tassiulas
Off-grid networks are recently emerging as a solution to connect the unconnected or provide alternative services to networks of possibly untrusted participants. The systems currently used, however, exhibit limitations due to their centralized nature and thus prove inadequate to secure trust. Blockchain technology can be the tool that will enable trust and transparency in such networks. In this paper, we introduce a platform for secure and privacy-respecting decentralized data sharing among untrusted participants in off-grid networks. The proposed architecture realizes this goal via the integration of existing blockchain frameworks (Hyperledger Fabric, Indy, Aries) with an off-grid network device and a distributed file system. We evaluate the proposed platform through experiments and show results for its throughput and latency, which indicate its adequate performance for supporting off-grid decentralized applications.
离网网络是最近出现的一种解决方案,用于连接未连接的网络或为可能不受信任的参与者的网络提供替代服务。然而,目前使用的系统由于其集中的性质而表现出局限性,因此不足以确保信任。区块链技术可以成为在此类网络中实现信任和透明度的工具。在本文中,我们引入了一个平台,用于在离网网络中不受信任的参与者之间安全且尊重隐私的分散数据共享。提出的架构通过将现有的区块链框架(Hyperledger Fabric、Indy、Aries)与离网网络设备和分布式文件系统集成来实现这一目标。我们通过实验评估了所提出的平台,并展示了其吞吐量和延迟的结果,这表明它具有足够的性能来支持离网分散应用程序。
{"title":"A Blockchain-based Decentralized Data Sharing Infrastructure for Off-grid Networking","authors":"H. Niavis, Nikolaos Papadis, L. Tassiulas","doi":"10.1109/ICBC48266.2020.9169441","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169441","url":null,"abstract":"Off-grid networks are recently emerging as a solution to connect the unconnected or provide alternative services to networks of possibly untrusted participants. The systems currently used, however, exhibit limitations due to their centralized nature and thus prove inadequate to secure trust. Blockchain technology can be the tool that will enable trust and transparency in such networks. In this paper, we introduce a platform for secure and privacy-respecting decentralized data sharing among untrusted participants in off-grid networks. The proposed architecture realizes this goal via the integration of existing blockchain frameworks (Hyperledger Fabric, Indy, Aries) with an off-grid network device and a distributed file system. We evaluate the proposed platform through experiments and show results for its throughput and latency, which indicate its adequate performance for supporting off-grid decentralized applications.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125833464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Correlated Equilibrium based Transaction Pricing Mechanism in Blockchain 区块链中基于关联均衡的交易定价机制
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169475
Qin Hu, Yash Nigam, Zhilin Wang, Yawei Wang, Yinhao Xiao
Although transaction fees are not obligatory in most of the current blockchain systems, extensive studies confirm their importance in maintaining the security and sustainability of blockchain. To enhance blockchain in the long term, it is crucial to design effective transaction pricing mechanisms. Different from the existing schemes based on auctions with more consideration about the profit of miners, we resort to game theory and propose a correlated equilibrium based transaction pricing mechanism through solving a pricing game among users with transactions, which can achieve both the individual and global optimum. To avoid the computational complexity exponentially increasing with the number of transactions, we further improve the game-theoretic solution with an approximate algorithm, which can derive almost the same results as the original one but costs significantly reduced time. Experimental results demonstrate the effectiveness and efficiency of our proposed mechanism.
虽然交易费在当前大多数区块链系统中不是强制性的,但广泛的研究证实了它们在维护区块链的安全性和可持续性方面的重要性。为了长期增强区块链,设计有效的交易定价机制至关重要。与现有的基于拍卖、更多考虑矿工利益的方案不同,本文利用博弈论,通过求解用户与交易之间的定价博弈,提出了一种基于关联均衡的交易定价机制,既能实现个体最优,又能实现全局最优。为了避免计算复杂度随着交易数量的增加呈指数增长,我们进一步用近似算法改进了博弈论解,该算法可以得到与原始解几乎相同的结果,但大大缩短了时间。实验结果证明了该机制的有效性和高效性。
{"title":"A Correlated Equilibrium based Transaction Pricing Mechanism in Blockchain","authors":"Qin Hu, Yash Nigam, Zhilin Wang, Yawei Wang, Yinhao Xiao","doi":"10.1109/ICBC48266.2020.9169475","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169475","url":null,"abstract":"Although transaction fees are not obligatory in most of the current blockchain systems, extensive studies confirm their importance in maintaining the security and sustainability of blockchain. To enhance blockchain in the long term, it is crucial to design effective transaction pricing mechanisms. Different from the existing schemes based on auctions with more consideration about the profit of miners, we resort to game theory and propose a correlated equilibrium based transaction pricing mechanism through solving a pricing game among users with transactions, which can achieve both the individual and global optimum. To avoid the computational complexity exponentially increasing with the number of transactions, we further improve the game-theoretic solution with an approximate algorithm, which can derive almost the same results as the original one but costs significantly reduced time. Experimental results demonstrate the effectiveness and efficiency of our proposed mechanism.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126661678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
From Curved Bonding to Configuration Spaces 从弯曲键合到构形空间
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169474
Michael Zargham, J. Shorish, Krzysztof Paruch
Bonding curves are continuous liquidity mechanisms which are used in market design for cryptographically- supported token economies. Bonding curves are an example of an enforceable mechanism through which participating agents influence this state. By designing such mechanisms, an engineer may establish the topological structure of a token economy without presupposing the utilities or associated actions of the agents within that economy. This is accomplished by introducing configuration spaces, which are proper subsets of the global state space representing all achievable states under the designed mechanisms. This paper generalizes the notion of a bonding curve to formalize the relationship between cryptographically enforced mechanisms and their associated configuration spaces, using invariant properties of conservation functions.
绑定曲线是连续的流动性机制,用于加密支持的代币经济的市场设计。结合曲线是可执行机制的一个例子,参与的代理通过它影响这种状态。通过设计这样的机制,工程师可以建立代币经济的拓扑结构,而无需预先假设该经济中的代理的效用或相关行为。这是通过引入配置空间来实现的,配置空间是全局状态空间的适当子集,表示在所设计的机制下所有可实现的状态。本文利用守恒函数的不变性质,推广了键合曲线的概念,从而形式化了加密强制机制与其相关构形空间之间的关系。
{"title":"From Curved Bonding to Configuration Spaces","authors":"Michael Zargham, J. Shorish, Krzysztof Paruch","doi":"10.1109/ICBC48266.2020.9169474","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169474","url":null,"abstract":"Bonding curves are continuous liquidity mechanisms which are used in market design for cryptographically- supported token economies. Bonding curves are an example of an enforceable mechanism through which participating agents influence this state. By designing such mechanisms, an engineer may establish the topological structure of a token economy without presupposing the utilities or associated actions of the agents within that economy. This is accomplished by introducing configuration spaces, which are proper subsets of the global state space representing all achievable states under the designed mechanisms. This paper generalizes the notion of a bonding curve to formalize the relationship between cryptographically enforced mechanisms and their associated configuration spaces, using invariant properties of conservation functions.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127020529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Put Your Money Where Your Mouth Is – Towards Blockchain-based Consent Violation Detection 把你的钱放在你的嘴巴上——迈向基于区块链的同意违规检测
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169455
Jonathan Heiss, Max-Robert Ulbricht, Jacob Eberhardt
Faulty access control in API-based multi-service setups can lead to violations of consent declarations through unauthorized Third Parties. This threatens Service Providers to lose the trust of their Service Consumers and to be exposed to sensitive fines as defined by the GDPR.Addressing this problem, in this paper, we propose a novel, blockchain-based approach for enabling economically motivated and technically mediated detection of violations of consent declarations in multi-service setups and derive its legal viability from a thorough analysis of the GDPR. The herein introduced Violation Detection mechanism allows for a censorship-resistant and publicly verifiable detection of violations to registered Consent Policies based on off-chain computed violation claims utilizing non-interactive zero-knowledge proofs. The corresponding System Design specifies all required roles and artifacts to integrate the Violation Detection mechanism with standard procedures for consent-based access control. The integration of our system supports Service Providers to fulfill legal requirements and, therefore, paves the way towards automated policy violation detection within GDPR-compliant consent-based access control solutions.
基于api的多服务设置中的错误访问控制可能导致未经授权的第三方违反同意声明。这可能会使服务提供商失去其服务消费者的信任,并面临GDPR规定的敏感罚款。为了解决这个问题,在本文中,我们提出了一种新颖的、基于区块链的方法,用于在多服务设置中对违反同意声明的行为进行经济动机和技术中介的检测,并从对GDPR的彻底分析中得出其法律可行性。本文引入的违规检测机制允许对注册同意策略的违规行为进行抗审查和公开可验证的检测,该检测基于链下计算的违规声明,利用非交互式零知识证明。相应的系统设计指定了将违例检测机制与基于同意的访问控制的标准过程集成所需的所有角色和构件。我们的系统集成支持服务提供商满足法律要求,因此,为在符合gdpr的基于同意的访问控制解决方案中实现自动策略违规检测铺平了道路。
{"title":"Put Your Money Where Your Mouth Is – Towards Blockchain-based Consent Violation Detection","authors":"Jonathan Heiss, Max-Robert Ulbricht, Jacob Eberhardt","doi":"10.1109/ICBC48266.2020.9169455","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169455","url":null,"abstract":"Faulty access control in API-based multi-service setups can lead to violations of consent declarations through unauthorized Third Parties. This threatens Service Providers to lose the trust of their Service Consumers and to be exposed to sensitive fines as defined by the GDPR.Addressing this problem, in this paper, we propose a novel, blockchain-based approach for enabling economically motivated and technically mediated detection of violations of consent declarations in multi-service setups and derive its legal viability from a thorough analysis of the GDPR. The herein introduced Violation Detection mechanism allows for a censorship-resistant and publicly verifiable detection of violations to registered Consent Policies based on off-chain computed violation claims utilizing non-interactive zero-knowledge proofs. The corresponding System Design specifies all required roles and artifacts to integrate the Violation Detection mechanism with standard procedures for consent-based access control. The integration of our system supports Service Providers to fulfill legal requirements and, therefore, paves the way towards automated policy violation detection within GDPR-compliant consent-based access control solutions.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122264295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Cost-efficient IoT Forensics Framework with Blockchain 具有区块链的成本效益的物联网取证框架
Pub Date : 2020-04-30 DOI: 10.1109/ICBC48266.2020.9169397
Suat Mercan, Mumin Cebe, Ege Tekiner, K. Akkaya, Melissa Chang, Selcuk Uluagac
IoT devices have been adopted widely in the last decade which enabled collection of various data from different environments. Data storage poses challenges since the data may be compromised during the storage and the integrity might be violated without being noticed. In such cases, integrity and data provenance are required in order to be able to detect the source of any incident and prove it in legal cases. To address these issues, blockchain provides excellent opportunities since it can protect the integrity of the data thanks to its distributed structure. However, it comes with certain costs as storing huge amount of data in a public blockchain will come with significant transaction fees. In this paper, we propose a highly cost effective and reliable digital forensics framework by exploiting multiple inexpensive blockchain networks as a temporary storage before the data is committed to Ethereum. To reduce Ethereum costs, we utilize Merkle trees which hierarchically stores hashes of the collected event data from IoT devices. We evaluated the approach on popular blockchains such as EOS, Stellar, and Ethereum by presenting a cost and security analysis. The results indicate that we can achieve significant cost savings without compromising the integrity of the data.
在过去的十年中,物联网设备被广泛采用,可以从不同的环境中收集各种数据。数据存储带来了挑战,因为数据可能在存储过程中被破坏,完整性可能在不被注意的情况下被破坏。在这种情况下,需要完整性和数据来源,以便能够发现任何事件的来源并在法律案件中证明这一点。为了解决这些问题,区块链提供了很好的机会,因为它可以保护数据的完整性,这要归功于它的分布式结构。然而,它带来了一定的成本,因为在公共区块链中存储大量数据将带来可观的交易费用。在本文中,我们提出了一个高成本效益和可靠的数字取证框架,通过利用多个廉价的区块链网络作为数据提交给以太坊之前的临时存储。为了降低以太坊的成本,我们利用Merkle树分层存储从物联网设备收集的事件数据的哈希值。我们通过提出成本和安全性分析来评估流行区块链(如EOS, Stellar和以太坊)的方法。结果表明,我们可以在不损害数据完整性的情况下实现显著的成本节约。
{"title":"A Cost-efficient IoT Forensics Framework with Blockchain","authors":"Suat Mercan, Mumin Cebe, Ege Tekiner, K. Akkaya, Melissa Chang, Selcuk Uluagac","doi":"10.1109/ICBC48266.2020.9169397","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169397","url":null,"abstract":"IoT devices have been adopted widely in the last decade which enabled collection of various data from different environments. Data storage poses challenges since the data may be compromised during the storage and the integrity might be violated without being noticed. In such cases, integrity and data provenance are required in order to be able to detect the source of any incident and prove it in legal cases. To address these issues, blockchain provides excellent opportunities since it can protect the integrity of the data thanks to its distributed structure. However, it comes with certain costs as storing huge amount of data in a public blockchain will come with significant transaction fees. In this paper, we propose a highly cost effective and reliable digital forensics framework by exploiting multiple inexpensive blockchain networks as a temporary storage before the data is committed to Ethereum. To reduce Ethereum costs, we utilize Merkle trees which hierarchically stores hashes of the collected event data from IoT devices. We evaluated the approach on popular blockchains such as EOS, Stellar, and Ethereum by presenting a cost and security analysis. The results indicate that we can achieve significant cost savings without compromising the integrity of the data.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130692794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1