首页 > 最新文献

Blockchain-Research and Applications最新文献

英文 中文
WASIF: In-depth detection of vulnerabilities in Wasm smart contracts via information flows and function invocation sequences WASIF:通过信息流和函数调用序列深入检测Wasm智能合约中的漏洞
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-01 DOI: 10.1016/j.bcra.2025.100287
Chu Chen , Xuan Wang , Bin Yu , Yumo Tian , Xiaoyu Lu , Pinghong Ren , Jin Liu
With the widespread adoption of WebAssembly (Wasm) smart contracts in popular blockchain platforms such as EOSIO, vulnerability attacks on Wasm smart contracts have become a serious problem. To protect the legitimate interests of blockchain users, it is necessary to detect vulnerabilities in Wasm smart contracts. However, detection faces a great challenge in that the source code of Wasm smart contracts is rarely released publicly. Although many approaches have made great progress in vulnerability detection, they still suffer from inefficiently generating function invocation sequences to track inter-function dependencies, ineffectively tracking sensitive information flows, and a considerable number of False Positives (FPs). To address these issues, we present a new concolic fuzzing approach for detecting vulnerabilities in Wasm smart contracts via information flows and function invocation sequences, namely, WASIF. Also, we implement the open-source prototype of the WASIF and conduct extensive experiments to evaluate it. The experimental results show that WASIF effectively and efficiently detects vulnerabilities in Wasm smart contracts and outperforms the state-of-the-art concolic fuzzer WASAI on most metrics.
随着WebAssembly (Wasm)智能合约在流行的区块链平台(如EOSIO)上的广泛采用,针对Wasm智能合约的漏洞攻击已经成为一个严重的问题。为了保护区块链用户的合法权益,有必要检测Wasm智能合约中的漏洞。然而,Wasm智能合约的源代码很少公开发布,这给检测带来了很大的挑战。尽管许多方法在漏洞检测方面取得了很大的进展,但它们仍然存在生成函数调用序列以跟踪功能间依赖关系的效率低下、跟踪敏感信息流的效率低下以及大量误报(FPs)的问题。为了解决这些问题,我们提出了一种新的concolic模糊方法,通过信息流和函数调用序列来检测Wasm智能合约中的漏洞,即WASIF。此外,我们实现了WASIF的开源原型,并进行了广泛的实验来评估它。实验结果表明,WASIF有效且高效地检测Wasm智能合约中的漏洞,并且在大多数指标上优于最先进的concolic fuzzer WASAI。
{"title":"WASIF: In-depth detection of vulnerabilities in Wasm smart contracts via information flows and function invocation sequences","authors":"Chu Chen ,&nbsp;Xuan Wang ,&nbsp;Bin Yu ,&nbsp;Yumo Tian ,&nbsp;Xiaoyu Lu ,&nbsp;Pinghong Ren ,&nbsp;Jin Liu","doi":"10.1016/j.bcra.2025.100287","DOIUrl":"10.1016/j.bcra.2025.100287","url":null,"abstract":"<div><div>With the widespread adoption of WebAssembly (Wasm) smart contracts in popular blockchain platforms such as EOSIO, vulnerability attacks on Wasm smart contracts have become a serious problem. To protect the legitimate interests of blockchain users, it is necessary to detect vulnerabilities in Wasm smart contracts. However, detection faces a great challenge in that the source code of Wasm smart contracts is rarely released publicly. Although many approaches have made great progress in vulnerability detection, they still suffer from inefficiently generating function invocation sequences to track inter-function dependencies, ineffectively tracking sensitive information flows, and a considerable number of False Positives (FPs). To address these issues, we present a new concolic fuzzing approach for detecting vulnerabilities in Wasm smart contracts via information flows and function invocation sequences, namely, WASIF. Also, we implement the open-source prototype of the WASIF and conduct extensive experiments to evaluate it. The experimental results show that WASIF effectively and efficiently detects vulnerabilities in Wasm smart contracts and outperforms the state-of-the-art concolic fuzzer WASAI on most metrics.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 3","pages":"Article 100287"},"PeriodicalIF":5.6,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144925056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Layer-2 expansion shared sequencer model for blockchain scalability 区块链可扩展性的第二层扩展共享序列器模型
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-01 DOI: 10.1016/j.bcra.2025.100292
Huijian Han , Mingwei Wang , Feng Yang , Linpeng Jia , Yi Sun , Rui Zhang
Rollup stands out as one of the most effective techniques for blockchain Layer-2 scaling. By processing transactions off-chain, it significantly enhances the throughput. However, the most rollup implementations currently rely on centralized sequencers, exposing the system and users to censorship attacks and risking network paralysis. In contrast, fully decentralized sequencers encounter latency issues and reduced throughput during the consensus phase. We propose a multislot weighted leader election algorithm based on shared sequencers, apply the proposer–builder separation (PBS) model, and use the fuzzy cognitive map (FCM) to analyze and optimize the important influence parameters. With its low trust dependence and high functionality, the probability of selecting malicious nodes is reduced. The sequencing and consensus are separated, so that the transaction can quickly reach soft confirmation. We implement this algorithm in a shared sequencer prototype. The experimental results show that the proposed algorithm parameter settings are in line with the expectations, and the probability of electing malicious nodes is significantly reduced. The transactions per second (TPS) of the network can cope with the throughput requirements of the Layer-2.
Rollup是区块链第2层扩展最有效的技术之一。通过处理链下交易,它显著提高了吞吐量。然而,大多数rollup实现目前依赖于集中式测序器,这将系统和用户暴露于审查攻击之下,并有网络瘫痪的风险。相比之下,完全分散的测序器在共识阶段遇到延迟问题和吞吐量降低。提出了一种基于共享序列的多时隙加权领袖选举算法,采用提议者-构建者分离(PBS)模型,并利用模糊认知图(FCM)对重要影响参数进行分析和优化。该算法具有较低的信任依赖性和较高的功能性,降低了选择恶意节点的概率。排序和共识分离,使交易能够快速达到软确认。我们在一个共享的音序器原型中实现了这个算法。实验结果表明,提出的算法参数设置符合预期,显著降低了恶意节点的当选概率。网络的TPS (transactions per second)可以满足第二层的吞吐量要求。
{"title":"A Layer-2 expansion shared sequencer model for blockchain scalability","authors":"Huijian Han ,&nbsp;Mingwei Wang ,&nbsp;Feng Yang ,&nbsp;Linpeng Jia ,&nbsp;Yi Sun ,&nbsp;Rui Zhang","doi":"10.1016/j.bcra.2025.100292","DOIUrl":"10.1016/j.bcra.2025.100292","url":null,"abstract":"<div><div>Rollup stands out as one of the most effective techniques for blockchain Layer-2 scaling. By processing transactions off-chain, it significantly enhances the throughput. However, the most rollup implementations currently rely on centralized sequencers, exposing the system and users to censorship attacks and risking network paralysis. In contrast, fully decentralized sequencers encounter latency issues and reduced throughput during the consensus phase. We propose a multislot weighted leader election algorithm based on shared sequencers, apply the proposer–builder separation (PBS) model, and use the fuzzy cognitive map (FCM) to analyze and optimize the important influence parameters. With its low trust dependence and high functionality, the probability of selecting malicious nodes is reduced. The sequencing and consensus are separated, so that the transaction can quickly reach soft confirmation. We implement this algorithm in a shared sequencer prototype. The experimental results show that the proposed algorithm parameter settings are in line with the expectations, and the probability of electing malicious nodes is significantly reduced. The transactions per second (TPS) of the network can cope with the throughput requirements of the Layer-2.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 3","pages":"Article 100292"},"PeriodicalIF":5.6,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145120932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corrigendum to “Dynamic exponent market maker: personalized portfolio manager and one pool to trade them all” “动态指数做市商:个性化投资组合经理和一个交易池”的勘误表
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-19 DOI: 10.1016/j.bcra.2025.100358
Wittawat Kositwattanarerk
{"title":"Corrigendum to “Dynamic exponent market maker: personalized portfolio manager and one pool to trade them all”","authors":"Wittawat Kositwattanarerk","doi":"10.1016/j.bcra.2025.100358","DOIUrl":"10.1016/j.bcra.2025.100358","url":null,"abstract":"","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 3","pages":"Article 100358"},"PeriodicalIF":5.6,"publicationDate":"2025-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144865132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zero trust-driven access control delegation using blockchain 零信任驱动访问控制委托使用区块链
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-20 DOI: 10.1016/j.bcra.2025.100319
Rahma Mukta , Shantanu Pal , Kowshik Chowdhury , Michael Hitchens , Hye-young Paik , Salil S. Kanhere
As digital ecosystems become more complex with decentralized technologies like the Internet of Things (IoT) and blockchain, traditional access control models fail to meet the security needs of dynamic, high-risk environments. The need for dynamic, fine-grained access control mechanisms has become critical, particularly in environments where trust must be continuously evaluated, and access decisions must adapt to real-time conditions. Traditional models often rely on static identity management and centralized trust assumptions, which are inadequate for modern, decentralized, and highly dynamic environments such as IoT ecosystems. Consequently, existing solutions lack fine-grained identity management, flexible delegation, and continuous trust evaluation, highlighting the need for a more robust, adaptive, and decentralized access control architecture. To address these gaps, this paper presents a novel access control architecture that integrates self-sovereign identity (SSI) and decentralized identifier (DID)-based access control with zero trust principles, enhanced by a flexible capability-based access control (CapBAC) approach. Leveraging SSI and DID allows entities to manage their identities without relying on a central authority, aligning with zero-trust principles. The integration of CapBAC ensures flexible, context-aware, and attribute-based access control, where access rights are dynamically granted based on the requester's capabilities. This enables fine-grained delegation of access rights, allowing trusted entities to delegate specific privileges to others without compromising overall security. Continuous trust evaluation is employed to assess the authenticity of access requests, mitigating the risks posed by compromised devices or users. The proposed architecture also incorporates blockchain technology to ensure transparent, immutable, and secure management of access logs, providing traceability and accountability for all access events. We demonstrate the feasibility and effectiveness of this solution through performance evaluations and comparisons with existing access control schemes, showing its superior security, scalability, and adaptability in real-world scenarios. Our work demonstrates a comprehensive, decentralized, and scalable solution for secure access control delegation using zero trust-driven principles.
随着物联网(IoT)和区块链等分散技术的发展,数字生态系统变得更加复杂,传统的访问控制模型已无法满足动态、高风险环境的安全需求。对动态、细粒度访问控制机制的需求已经变得至关重要,特别是在必须持续评估信任和访问决策必须适应实时条件的环境中。传统模型通常依赖于静态身份管理和集中式信任假设,这对于现代、分散和高度动态的环境(如物联网生态系统)是不够的。因此,现有的解决方案缺乏细粒度的身份管理、灵活的委托和持续的信任评估,这突出了对更健壮、自适应和分散的访问控制体系结构的需求。为了解决这些差距,本文提出了一种新的访问控制体系结构,该体系结构集成了基于零信任原则的自主身份(SSI)和基于分散标识符(DID)的访问控制,并通过灵活的基于能力的访问控制(CapBAC)方法进行了增强。利用SSI和DID允许实体在不依赖中央权威的情况下管理其身份,符合零信任原则。CapBAC的集成确保了灵活、上下文感知和基于属性的访问控制,其中访问权限是根据请求者的能力动态授予的。这支持细粒度的访问权限委托,允许受信任实体将特定特权委托给其他实体,而不会损害整体安全性。通过持续信任评估来评估访问请求的真实性,降低设备或用户被入侵带来的风险。所建议的体系结构还集成了区块链技术,以确保访问日志的透明、不可变和安全管理,为所有访问事件提供可跟踪性和责任。我们通过性能评估和与现有访问控制方案的比较,证明了该解决方案的可行性和有效性,展示了其在现实场景中优越的安全性、可扩展性和适应性。我们的工作展示了一个全面的、分散的、可扩展的解决方案,用于使用零信任驱动原则的安全访问控制委托。
{"title":"Zero trust-driven access control delegation using blockchain","authors":"Rahma Mukta ,&nbsp;Shantanu Pal ,&nbsp;Kowshik Chowdhury ,&nbsp;Michael Hitchens ,&nbsp;Hye-young Paik ,&nbsp;Salil S. Kanhere","doi":"10.1016/j.bcra.2025.100319","DOIUrl":"10.1016/j.bcra.2025.100319","url":null,"abstract":"<div><div>As digital ecosystems become more complex with decentralized technologies like the Internet of Things (IoT) and blockchain, traditional access control models fail to meet the security needs of dynamic, high-risk environments. The need for dynamic, fine-grained access control mechanisms has become critical, particularly in environments where trust must be continuously evaluated, and access decisions must adapt to real-time conditions. Traditional models often rely on static identity management and centralized trust assumptions, which are inadequate for modern, decentralized, and highly dynamic environments such as IoT ecosystems. Consequently, existing solutions lack fine-grained identity management, flexible delegation, and continuous trust evaluation, highlighting the need for a more robust, adaptive, and decentralized access control architecture. To address these gaps, this paper presents a novel access control architecture that integrates self-sovereign identity (SSI) and decentralized identifier (DID)-based access control with zero trust principles, enhanced by a flexible capability-based access control (CapBAC) approach. Leveraging SSI and DID allows entities to manage their identities without relying on a central authority, aligning with zero-trust principles. The integration of CapBAC ensures flexible, context-aware, and attribute-based access control, where access rights are dynamically granted based on the requester's capabilities. This enables fine-grained delegation of access rights, allowing trusted entities to delegate specific privileges to others without compromising overall security. Continuous trust evaluation is employed to assess the authenticity of access requests, mitigating the risks posed by compromised devices or users. The proposed architecture also incorporates blockchain technology to ensure transparent, immutable, and secure management of access logs, providing traceability and accountability for all access events. We demonstrate the feasibility and effectiveness of this solution through performance evaluations and comparisons with existing access control schemes, showing its superior security, scalability, and adaptability in real-world scenarios. Our work demonstrates a comprehensive, decentralized, and scalable solution for secure access control delegation using zero trust-driven principles.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"7 1","pages":"Article 100319"},"PeriodicalIF":5.6,"publicationDate":"2025-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146024719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault tolerance testing and tuning for consortium blockchain 财团区块链的容错测试和调优
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100267
Taiwu Pang , Zheming Ye , Zhao Zhang , Cheqing Jin
While the potential applications of the consortium blockchain are becoming increasingly evident, the fault tolerance of systems in complex and changeable real environments has become an increasingly important factor. In recent years, many blockchain-oriented fault tolerance testing tools have been proposed. However, the selected fault sets cannot cover all kinds of problems that the consortium blockchain may encounter in real scenarios. Moreover, a rationality analysis of test results is often missing from these tools. In addition, it is also worth considering how to optimize system performance in the fault continuous stage. In this paper, we propose a general full-stack fault injection platform that can support the orderly injection of different kinds of Byzantine and non-Byzantine failures in a distributed scenario. Regarding the unclear underlying principles affecting system performance due to faults, we conduct an attribution analysis of various faults' influences on the consortium blockchain. Based on conclusions drawn form the attribution analysis, we design and implement the test-driven optimization strategy. The experimental results show that the optimization strategy can shorten the system average delay to less than one-third of that before optimization by reducing the throughput by about 15% in most fault scenarios.
随着区块链的潜在应用日益明显,系统在复杂多变的真实环境中的容错能力也日益成为一个重要的因素。近年来,人们提出了许多面向区块链的容错测试工具。然而,所选择的故障集并不能涵盖财团区块链在实际场景中可能遇到的所有问题。此外,这些工具往往缺少对测试结果的合理性分析。此外,如何在故障连续阶段优化系统性能也是值得考虑的问题。在本文中,我们提出了一个通用的全栈故障注入平台,该平台可以支持分布式场景中不同类型的拜占庭和非拜占庭故障的有序注入。针对故障影响系统性能的基本原理不明确的问题,我们对各种故障对联合体区块链的影响进行了归因分析。基于归因分析得出的结论,设计并实现了测试驱动优化策略。实验结果表明,在大多数故障场景下,该优化策略可将吞吐量降低15%左右,使系统平均延迟缩短到优化前的三分之一以下。
{"title":"Fault tolerance testing and tuning for consortium blockchain","authors":"Taiwu Pang ,&nbsp;Zheming Ye ,&nbsp;Zhao Zhang ,&nbsp;Cheqing Jin","doi":"10.1016/j.bcra.2024.100267","DOIUrl":"10.1016/j.bcra.2024.100267","url":null,"abstract":"<div><div>While the potential applications of the consortium blockchain are becoming increasingly evident, the fault tolerance of systems in complex and changeable real environments has become an increasingly important factor. In recent years, many blockchain-oriented fault tolerance testing tools have been proposed. However, the selected fault sets cannot cover all kinds of problems that the consortium blockchain may encounter in real scenarios. Moreover, a rationality analysis of test results is often missing from these tools. In addition, it is also worth considering how to optimize system performance in the fault continuous stage. In this paper, we propose a general full-stack fault injection platform that can support the orderly injection of different kinds of Byzantine and non-Byzantine failures in a distributed scenario. Regarding the unclear underlying principles affecting system performance due to faults, we conduct an attribution analysis of various faults' influences on the consortium blockchain. Based on conclusions drawn form the attribution analysis, we design and implement the test-driven optimization strategy. The experimental results show that the optimization strategy can shorten the system average delay to less than one-third of that before optimization by reducing the throughput by about 15% in most fault scenarios.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100267"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144470083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cardano shared send transactions untangling in numbers 卡尔达诺共享发送交易的数量
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100269
Mostafa Chegenizadeh , Nickolay Larionov , Sina Rafati Niya , Yury Yanovich , Claudio J. Tessone
In this paper, we analyze shared send mixers (SSMs) within Cardano's extended unspent transaction output (EUTXO) model, presenting significant contributions to the understanding of UTXO-based blockchains. Firstly, we define the EUTXO SSM untangling problem and propose an algorithm to address it, along with providing an open-source implementation of the solution. Utilizing real transaction examples, we formulate and solve this problem in a systematic manner, shedding light on the intricacies of coin circulation within the Cardano blockchain. Through our analysis, we reveal some insights into the usage of SSMs, including statistics on their frequency and effectiveness in untangling transactions. With this method, our findings show that 11% of transactions seem to involve SSMs, 83% of which enable unique untangling. Moreover, we discuss the potential application of our algorithm in enhancing the address clustering results of transaction-level heuristics. Overall, our work contributes to a deeper understanding of transactional dynamics within UTXO cryptocurrencies, particularly within the context of Cardano's EUTXO model.
在本文中,我们分析了卡尔达诺扩展未花费交易输出(EUTXO)模型中的共享发送混合器(ssm),为理解基于utxo的区块链做出了重大贡献。首先,我们定义了EUTXO SSM解缠问题,并提出了一种算法来解决该问题,同时提供了该解决方案的开源实现。利用真实的交易实例,我们以系统的方式制定和解决这个问题,揭示了卡尔达诺区块链内硬币流通的复杂性。通过我们的分析,我们揭示了ssm使用的一些见解,包括它们在解开交易中的频率和有效性的统计数据。通过这种方法,我们的研究结果表明,11%的交易似乎涉及ssm,其中83%能够独特地解开缠结。此外,我们还讨论了该算法在增强事务级启发式的地址聚类结果方面的潜在应用。总的来说,我们的工作有助于更深入地了解UTXO加密货币中的交易动态,特别是在卡尔达诺的EUTXO模型的背景下。
{"title":"Cardano shared send transactions untangling in numbers","authors":"Mostafa Chegenizadeh ,&nbsp;Nickolay Larionov ,&nbsp;Sina Rafati Niya ,&nbsp;Yury Yanovich ,&nbsp;Claudio J. Tessone","doi":"10.1016/j.bcra.2024.100269","DOIUrl":"10.1016/j.bcra.2024.100269","url":null,"abstract":"<div><div>In this paper, we analyze shared send mixers (SSMs) within Cardano's extended unspent transaction output (EUTXO) model, presenting significant contributions to the understanding of UTXO-based blockchains. Firstly, we define the EUTXO SSM untangling problem and propose an algorithm to address it, along with providing an open-source implementation of the solution. Utilizing real transaction examples, we formulate and solve this problem in a systematic manner, shedding light on the intricacies of coin circulation within the Cardano blockchain. Through our analysis, we reveal some insights into the usage of SSMs, including statistics on their frequency and effectiveness in untangling transactions. With this method, our findings show that 11% of transactions seem to involve SSMs, 83% of which enable unique untangling. Moreover, we discuss the potential application of our algorithm in enhancing the address clustering results of transaction-level heuristics. Overall, our work contributes to a deeper understanding of transactional dynamics within UTXO cryptocurrencies, particularly within the context of Cardano's EUTXO model.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100269"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144470085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unlocking potential of open source model training in decentralized federated learning environment 在分散的联邦学习环境中释放开源模型训练的潜力
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100264
Ekaterina Pavlova , Grigorii Melnikov , Yury Yanovich , Alexey Frolov
The field of Artificial Intelligence (AI) is rapidly evolving, creating a demand for sophisticated models that rely on substantial data and computational resources for training. However, the high costs associated with training these models have limited accessibility, leading to concerns about transparency, biases, and hidden agendas within AI systems. As AI becomes more integrated into governmental services and the pursuit of Artificial General Intelligence (AGI) advances, the necessity for transparent and reliable AI models becomes increasingly critical. Decentralized Federated Learning (DFL) offers decentralized approaches to model training while safeguarding data privacy and ensuring resilience against adversarial participants. Nonetheless, the guarantees provided are not absolute, and even open-weight AI models do not qualify as truly open source. This paper suggests using blockchain technology, smart contracts, and publicly verifiable secret sharing in DFL environments to bolster trust, cooperation, and transparency in model training processes. Our numerical experiments illustrate that the overhead required to offer robust assurances to all peers regarding the correctness of the training process is relatively small. By incorporating these tools, participants can trust that trained models adhere to specified procedures, addressing accountability issues within AI systems and promoting the development of more ethical and dependable applications of AI.
人工智能(AI)领域正在迅速发展,对依赖大量数据和计算资源进行训练的复杂模型产生了需求。然而,与训练这些模型相关的高成本限制了可访问性,导致人们担心人工智能系统中的透明度、偏见和隐藏议程。随着人工智能越来越多地融入政府服务,以及对通用人工智能(AGI)的追求不断进步,透明、可靠的人工智能模型的必要性变得越来越重要。去中心化联邦学习(DFL)提供去中心化的模型训练方法,同时保护数据隐私并确保对敌对参与者的弹性。尽管如此,所提供的保证并不是绝对的,甚至开放权重的AI模型也不符合真正的开源标准。本文建议在DFL环境中使用区块链技术、智能合约和可公开验证的秘密共享,以加强模型训练过程中的信任、合作和透明度。我们的数值实验表明,向所有同伴提供关于训练过程正确性的鲁棒保证所需的开销相对较小。通过整合这些工具,参与者可以相信经过训练的模型遵守指定的程序,解决人工智能系统内的问责问题,并促进人工智能更道德、更可靠应用的发展。
{"title":"Unlocking potential of open source model training in decentralized federated learning environment","authors":"Ekaterina Pavlova ,&nbsp;Grigorii Melnikov ,&nbsp;Yury Yanovich ,&nbsp;Alexey Frolov","doi":"10.1016/j.bcra.2024.100264","DOIUrl":"10.1016/j.bcra.2024.100264","url":null,"abstract":"<div><div>The field of Artificial Intelligence (AI) is rapidly evolving, creating a demand for sophisticated models that rely on substantial data and computational resources for training. However, the high costs associated with training these models have limited accessibility, leading to concerns about transparency, biases, and hidden agendas within AI systems. As AI becomes more integrated into governmental services and the pursuit of Artificial General Intelligence (AGI) advances, the necessity for transparent and reliable AI models becomes increasingly critical. Decentralized Federated Learning (DFL) offers decentralized approaches to model training while safeguarding data privacy and ensuring resilience against adversarial participants. Nonetheless, the guarantees provided are not absolute, and even open-weight AI models do not qualify as truly open source. This paper suggests using blockchain technology, smart contracts, and publicly verifiable secret sharing in DFL environments to bolster trust, cooperation, and transparency in model training processes. Our numerical experiments illustrate that the overhead required to offer robust assurances to all peers regarding the correctness of the training process is relatively small. By incorporating these tools, participants can trust that trained models adhere to specified procedures, addressing accountability issues within AI systems and promoting the development of more ethical and dependable applications of AI.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100264"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144298441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient Bitcoin network topology discovery algorithm for dynamic display 一种高效的比特币网络拓扑动态显示算法
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100260
Zening Zhao , Jinsong Wang , Miao Yang , Haitao Wang
The Bitcoin network comprises numerous nodes, necessitating users to invest significant network requests and time in comprehending its network topology. In this paper, we propose a Bitcoin network topology discovery algorithm that uses lightweight probe nodes to facilitate rapid transmission of network protocols. Building upon this, we introduce a node layer clustering algorithm based on filtering stable network nodes, enabling parallel discovery of the network topology. Additionally, we present an adaptive method for dynamically displaying the layered structure of the network topology. Experimental results demonstrate that our proposed method reduces communication overhead by approximately 72.16% when achieving a 95% similarity in network topology. Furthermore, the algorithm is applicable for discovering the network topology in other blockchain networks with similar structures.
比特币网络由众多节点组成,用户需要投入大量的网络请求和时间来理解其网络拓扑。在本文中,我们提出了一种比特币网络拓扑发现算法,该算法使用轻量级探测节点来促进网络协议的快速传输。在此基础上,引入了一种基于过滤稳定网络节点的节点层聚类算法,实现了网络拓扑的并行发现。此外,我们还提出了一种动态显示网络拓扑分层结构的自适应方法。实验结果表明,该方法在网络拓扑相似性达到95%的情况下,通信开销降低了约72.16%。此外,该算法也适用于其他结构相似的区块链网络的拓扑发现。
{"title":"An efficient Bitcoin network topology discovery algorithm for dynamic display","authors":"Zening Zhao ,&nbsp;Jinsong Wang ,&nbsp;Miao Yang ,&nbsp;Haitao Wang","doi":"10.1016/j.bcra.2024.100260","DOIUrl":"10.1016/j.bcra.2024.100260","url":null,"abstract":"<div><div>The Bitcoin network comprises numerous nodes, necessitating users to invest significant network requests and time in comprehending its network topology. In this paper, we propose a Bitcoin network topology discovery algorithm that uses lightweight probe nodes to facilitate rapid transmission of network protocols. Building upon this, we introduce a node layer clustering algorithm based on filtering stable network nodes, enabling parallel discovery of the network topology. Additionally, we present an adaptive method for dynamically displaying the layered structure of the network topology. Experimental results demonstrate that our proposed method reduces communication overhead by approximately 72.16% when achieving a 95% similarity in network topology. Furthermore, the algorithm is applicable for discovering the network topology in other blockchain networks with similar structures.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100260"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144307968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SmartZKCP: Towards practical data exchange marketplace against active attacks SmartZKCP:针对主动攻击的实用数据交换市场
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100272
Xuanming Liu , Jiawen Zhang , Yinghao Wang , Xinpeng Yang , Xiaohu Yang
The trading of data is becoming increasingly important as it holds substantial value. A blockchain-based data marketplace can provide a secure and transparent platform for data exchange. To facilitate this, developing a fair data exchange protocol for digital goods has garnered considerable attention in recent decades. The Zero Knowledge Contingent Payment (ZKCP) protocol enables trustless fair exchanges with the aid of blockchain and zero-knowledge proofs. However, applying this protocol in a practical data marketplace is not trivial.
In this paper, several potential attacks are identified when applying the ZKCP protocol in a practical public data marketplace. To address these issues, we propose SmartZKCP, an enhanced solution that offers improved security measures and increased performance. The protocol is formalized to ensure fairness and secure against potential attacks. Moreover, SmartZKCP offers efficiency optimizations and minimized communication costs. Evaluation results show that SmartZKCP is both practical and efficient, making it applicable in a data exchange marketplace.
数据交易正变得越来越重要,因为它具有巨大的价值。基于区块链的数据市场可以为数据交换提供安全透明的平台。为了促进这一点,近几十年来,为数字产品开发公平的数据交换协议已经引起了相当大的关注。零知识或有支付(ZKCP)协议借助区块链和零知识证明实现了无需信任的公平交换。然而,在实际的数据市场中应用该协议并非易事。在本文中,在实际的公共数据市场中应用ZKCP协议时,确定了几种潜在的攻击。为了解决这些问题,我们提出了SmartZKCP,这是一种增强的解决方案,提供了改进的安全措施和更高的性能。该协议是形式化的,以确保公平和安全,防止潜在的攻击。此外,SmartZKCP提供效率优化和最小化通信成本。评估结果表明,SmartZKCP既实用又高效,适用于数据交换市场。
{"title":"SmartZKCP: Towards practical data exchange marketplace against active attacks","authors":"Xuanming Liu ,&nbsp;Jiawen Zhang ,&nbsp;Yinghao Wang ,&nbsp;Xinpeng Yang ,&nbsp;Xiaohu Yang","doi":"10.1016/j.bcra.2024.100272","DOIUrl":"10.1016/j.bcra.2024.100272","url":null,"abstract":"<div><div>The trading of data is becoming increasingly important as it holds substantial value. A blockchain-based data marketplace can provide a secure and transparent platform for data exchange. To facilitate this, developing a fair data exchange protocol for digital goods has garnered considerable attention in recent decades. The Zero Knowledge Contingent Payment (ZKCP) protocol enables trustless fair exchanges with the aid of blockchain and zero-knowledge proofs. However, applying this protocol in a practical data marketplace is not trivial.</div><div>In this paper, several potential attacks are identified when applying the ZKCP protocol in a practical public data marketplace. To address these issues, we propose SmartZKCP, an enhanced solution that offers improved security measures and increased performance. The protocol is formalized to ensure fairness and secure against potential attacks. Moreover, SmartZKCP offers efficiency optimizations and minimized communication costs. Evaluation results show that SmartZKCP is both practical and efficient, making it applicable in a data exchange marketplace.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100272"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144270707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blockchain based efficient incentive mechanism in tripartite cyber threat intelligence service marketplace 基于b区块链的三方网络威胁情报服务市场有效激励机制
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100263
Yuan Zhou , Yaoyao Zhang , Qinglin Yang , Yuan Liu , Chunming Rong , Zhihong Tian
The Cyber Threat Intelligence (CTI) marketplace is an emerging platform for CTI service requesters to countermeasure advanced cyber attacks, where CTI service providers are employed on payment. To create a trustworthy CTI marketplace environment, consortium-blockchain-based CTI service platforms have been widely proposed, where the blockchain system becomes the third role, crucially impacting the CTI service quality. How to sustainably promote CTI service quality in this tripartite marketplace is a challenging issue, which has not been well investigated in the literature. In this study, we propose a two-stage tripartite dynamic game-model-based incentive mechanism, where the participation incentives of the three parties are promoted under the constraints of Individual Rationality (IR) and Incentive Compatibility (IC). The sustainability of CTI service is quantitatively formalized through the CTI market demand, which impacts the future profits of the three parties. The Nash equilibrium of the proposed incentive mechanism is solved, where the CTI requester offers an optimal price to achieve effective defense against cyber attacks, and the blockchain platform and CTI service providers collaboratively contribute high-quality CTI services. Empirical experimental results show that the higher the quality of CTI services provided in the marketplace, the greater the market demand for CTI, resulting in a sustainable CTI marketplace.
CTI (Cyber Threat Intelligence,网络威胁情报)市场是CTI服务请求者对抗高级网络攻击的新兴平台,CTI服务提供商用于支付。为了创造一个值得信赖的CTI市场环境,基于联盟区块链的CTI服务平台被广泛提出,其中区块链系统成为第三个角色,对CTI服务质量产生了至关重要的影响。如何在这个三方市场中持续提升CTI服务质量是一个具有挑战性的问题,文献中尚未有很好的研究。在本研究中,我们提出了一个基于两阶段三方动态博弈模型的激励机制,在个体理性(IR)和激励兼容性(IC)的约束下,三方的参与激励得以提升。CTI业务的可持续性通过CTI市场需求进行量化形式化,影响三方未来的利润。解决了所提激励机制的纳什均衡,即CTI请求方提供最优价格以实现对网络攻击的有效防御,区块链平台和CTI服务提供商协同提供高质量的CTI服务。实证研究结果表明,市场提供的CTI服务质量越高,市场对CTI的需求就越大,从而形成一个可持续的CTI市场。
{"title":"A blockchain based efficient incentive mechanism in tripartite cyber threat intelligence service marketplace","authors":"Yuan Zhou ,&nbsp;Yaoyao Zhang ,&nbsp;Qinglin Yang ,&nbsp;Yuan Liu ,&nbsp;Chunming Rong ,&nbsp;Zhihong Tian","doi":"10.1016/j.bcra.2024.100263","DOIUrl":"10.1016/j.bcra.2024.100263","url":null,"abstract":"<div><div>The Cyber Threat Intelligence (CTI) marketplace is an emerging platform for CTI service requesters to countermeasure advanced cyber attacks, where CTI service providers are employed on payment. To create a trustworthy CTI marketplace environment, consortium-blockchain-based CTI service platforms have been widely proposed, where the blockchain system becomes the third role, crucially impacting the CTI service quality. How to sustainably promote CTI service quality in this tripartite marketplace is a challenging issue, which has not been well investigated in the literature. In this study, we propose a two-stage tripartite dynamic game-model-based incentive mechanism, where the participation incentives of the three parties are promoted under the constraints of Individual Rationality (IR) and Incentive Compatibility (IC). The sustainability of CTI service is quantitatively formalized through the CTI market demand, which impacts the future profits of the three parties. The Nash equilibrium of the proposed incentive mechanism is solved, where the CTI requester offers an optimal price to achieve effective defense against cyber attacks, and the blockchain platform and CTI service providers collaboratively contribute high-quality CTI services. Empirical experimental results show that the higher the quality of CTI services provided in the marketplace, the greater the market demand for CTI, resulting in a sustainable CTI marketplace.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100263"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144307966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Blockchain-Research and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1