首页 > 最新文献

Blockchain-Research and Applications最新文献

英文 中文
Promoting rigor in blockchain energy and environmental footprint research: A systematic literature review 促进区块链能源和环境足迹研究的严谨性:系统文献综述
IF 5.6 3区 计算机科学 Pub Date : 2023-11-10 DOI: 10.1016/j.bcra.2023.100169
Ashish Rajendra Sai , Harald Vranken

There is a growing interest in understanding the energy and environmental footprint of digital currencies, specifically in cryptocurrencies such as Bitcoin and Ethereum. These cryptocurrencies are operated by a geographically distributed network of computing nodes, making it hard to estimate their energy consumption accurately. Existing studies, both in academia and industry, attempt to model cryptocurrency energy consumption often based on a number of assumptions, for instance, about the hardware in use or the geographic distribution of the computing nodes. A number of these studies have already been widely criticized for their design choices and subsequent over- or under-estimation of energy use.

In this study, we evaluate the reliability of prior models and estimates by leveraging existing scientific literature from fields cognizant of blockchain, such as social energy sciences and information systems. We first design a quality assessment framework based on existing research, and we then conduct a systematic literature review examining scientific and non-academic literature demonstrating common issues and potential avenues of addressing these issues.

Our goal with this article is to advance the field by promoting scientific rigor in studies focusing on blockchain energy footprint. To that end, we provide a novel set of codes of conduct for the five most widely used research methodologies: Quantitative energy modeling, literature reviews, data analysis and statistics, case studies, and experiments. We envision that this code of conduct would assist in standardizing the design and assessment of studies focusing on blockchain-based systems' energy and environmental footprint.

人们对了解数字货币,特别是比特币和以太坊等加密货币的能源和环境足迹越来越感兴趣。这些加密货币由分布在各地的计算节点网络运行,因此很难准确估算其能耗。学术界和工业界的现有研究都试图对加密货币的能耗进行建模,但往往基于一些假设,例如使用的硬件或计算节点的地理分布。在本研究中,我们利用社会能源科学和信息系统等区块链认知领域的现有科学文献,对先前模型和估计的可靠性进行评估。我们首先在现有研究的基础上设计了一个质量评估框架,然后对科学和非学术文献进行了系统的文献综述,展示了常见问题和解决这些问题的潜在途径。为此,我们为五种最广泛使用的研究方法提供了一套新颖的行为准则:定量能源建模、文献综述、数据分析和统计、案例研究和实验。我们设想,该行为准则将有助于规范基于区块链系统的能源和环境足迹研究的设计和评估。
{"title":"Promoting rigor in blockchain energy and environmental footprint research: A systematic literature review","authors":"Ashish Rajendra Sai ,&nbsp;Harald Vranken","doi":"10.1016/j.bcra.2023.100169","DOIUrl":"10.1016/j.bcra.2023.100169","url":null,"abstract":"<div><p>There is a growing interest in understanding the energy and environmental footprint of digital currencies, specifically in cryptocurrencies such as Bitcoin and Ethereum. These cryptocurrencies are operated by a geographically distributed network of computing nodes, making it hard to estimate their energy consumption accurately. Existing studies, both in academia and industry, attempt to model cryptocurrency energy consumption often based on a number of assumptions, for instance, about the hardware in use or the geographic distribution of the computing nodes. A number of these studies have already been widely criticized for their design choices and subsequent over- or under-estimation of energy use.</p><p>In this study, we evaluate the reliability of prior models and estimates by leveraging existing scientific literature from fields cognizant of blockchain, such as social energy sciences and information systems. We first design a quality assessment framework based on existing research, and we then conduct a systematic literature review examining scientific and non-academic literature demonstrating common issues and potential avenues of addressing these issues.</p><p>Our goal with this article is to advance the field by promoting scientific rigor in studies focusing on blockchain energy footprint. To that end, we provide a novel set of codes of conduct for the five most widely used research methodologies: Quantitative energy modeling, literature reviews, data analysis and statistics, case studies, and experiments. We envision that this code of conduct would assist in standardizing the design and assessment of studies focusing on blockchain-based systems' energy and environmental footprint.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000441/pdfft?md5=ec518e8f1a94419b79ef4c284293228d&pid=1-s2.0-S2096720923000441-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135615189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Governance of decentralized autonomous organizations that produce open source software 管理生产开放源码软件的分散自治组织
IF 5.6 3区 计算机科学 Pub Date : 2023-11-09 DOI: 10.1016/j.bcra.2023.100166
Paul van Vulpen , Jozef Siu , Slinger Jansen

Decentralized autonomous organizations (DAOs) have found use in the governance of open source software (OSS) projects. However, the governance of an OSS producing DAO should match the particularities of OSS production while also overcoming the existing challenges of decentralized governance. The existing decentralized governance frameworks do not include all the governance activities of OSS projects. Therefore, this study presents a governance framework for DAOs that produce OSS. The framework is built upon a total of 34 articles on DAO and OSS governance. The framework was evaluated in three leading DAOs that produce OSS. The evaluation underscores the significance of the framework and proves the potential of the systematic categorization of governance mechanisms. Finally, we list emerging governance practices in various governance domains in this developing field.

在开放源码软件(OSS)项目的管理中,已经发现了分散自治组织(DAOs)的应用。然而,开放源码软件生产 DAO 的治理应与开放源码软件生产的特殊性相匹配,同时还要克服现有的分散治理挑战。现有的分散治理框架并不包括开放源码软件项目的所有治理活动。因此,本研究为生产开放源码软件的 DAOs 提出了一个治理框架。该框架建立在总共 34 篇关于 DAO 和开放源码软件治理的文章之上。该框架在三个领先的生产开放源码软件的 DAO 中进行了评估。评估强调了该框架的重要性,并证明了对治理机制进行系统分类的潜力。最后,我们列出了这一发展中领域中各个治理领域的新兴治理实践。
{"title":"Governance of decentralized autonomous organizations that produce open source software","authors":"Paul van Vulpen ,&nbsp;Jozef Siu ,&nbsp;Slinger Jansen","doi":"10.1016/j.bcra.2023.100166","DOIUrl":"10.1016/j.bcra.2023.100166","url":null,"abstract":"<div><p>Decentralized autonomous organizations (DAOs) have found use in the governance of open source software (OSS) projects. However, the governance of an OSS producing DAO should match the particularities of OSS production while also overcoming the existing challenges of decentralized governance. The existing decentralized governance frameworks do not include all the governance activities of OSS projects. Therefore, this study presents a governance framework for DAOs that produce OSS. The framework is built upon a total of 34 articles on DAO and OSS governance. The framework was evaluated in three leading DAOs that produce OSS. The evaluation underscores the significance of the framework and proves the potential of the systematic categorization of governance mechanisms. Finally, we list emerging governance practices in various governance domains in this developing field.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720923000416/pdfft?md5=c52dda3836a3c81f10a1c9da2144a0f6&pid=1-s2.0-S2096720923000416-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135566440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conditions for advantageous quantum Bitcoin mining 有利的量子比特币挖矿条件
IF 5.6 3区 计算机科学 Pub Date : 2023-09-01 DOI: 10.1016/j.bcra.2023.100141
Robert R. Nerem , Daya R. Gaur

Our aim is to determine the conditions for quantum computing technology to give rise to the security risks associated with quantum Bitcoin mining. Specifically, we determine the speed and energy efficiency a quantum computer needs to offer an advantage over classical mining. We analyze the setting in which the Bitcoin network is entirely classical except for a single quantum miner with a small hash rate compared to the network. We develop a closed-form approximation for the probability that the quantum miner successfully mines a block, with this probability dependent on the number of Grover iterations the quantum miner applies before making a measurement. Next, we show that for a quantum miner that is “peaceful”, this success probability is maximized if the quantum miner applies Grover iterations for 16 ​min before measuring, which is surprising, as the network mines blocks every 10 ​min on average. Using this optimal mining procedure, we show that the quantum miner outperforms a classical computer in efficiency (cost per block) if the condition Q ​< ​Crb is satisfied, where Q is the cost of a Grover iteration, C is the cost of a classical hash, r is the quantum miner's speed in Grover iterations per second, and b is a factor that attains its maximum if the quantum miner uses our optimal mining procedure. This condition lays the foundation for determining when quantum mining and the known security risks associated with it will arise.

我们的目标是确定量子计算技术产生与量子比特币挖矿相关的安全风险的条件。具体来说,我们确定了量子计算机所需的速度和能效,以提供优于经典采矿的优势。我们分析了比特币网络完全经典的设置,除了与网络相比哈希率较小的单个量子矿工。我们为量子矿工成功挖掘区块的概率开发了一个闭式近似,该概率取决于量子矿工在进行测量之前应用的Grover迭代次数。接下来,我们展示了对于“和平”的量子矿工,如果量子矿工应用Grover迭代16次,则成功概率最大化​测量前的分钟,这令人惊讶,因为网络每10分钟就会挖掘一次区块​平均分钟。使用这个最优挖掘过程,我们证明了如果条件Q,量子矿工在效率(每块成本)方面优于经典计算机​<;​Crb是满足的,其中Q是Grover迭代的成本,C是经典散列的成本,r是每秒Grover迭代中量子矿工的速度,b是如果量子矿工使用我们的最优挖掘过程,则达到其最大值的因子。这一条件为确定量子采矿及其相关的已知安全风险何时出现奠定了基础。
{"title":"Conditions for advantageous quantum Bitcoin mining","authors":"Robert R. Nerem ,&nbsp;Daya R. Gaur","doi":"10.1016/j.bcra.2023.100141","DOIUrl":"https://doi.org/10.1016/j.bcra.2023.100141","url":null,"abstract":"<div><p>Our aim is to determine the conditions for quantum computing technology to give rise to the security risks associated with quantum Bitcoin mining. Specifically, we determine the speed and energy efficiency a quantum computer needs to offer an advantage over classical mining. We analyze the setting in which the Bitcoin network is entirely classical except for a single quantum miner with a small hash rate compared to the network. We develop a closed-form approximation for the probability that the quantum miner successfully mines a block, with this probability dependent on the number of Grover iterations the quantum miner applies before making a measurement. Next, we show that for a quantum miner that is “peaceful”, this success probability is maximized if the quantum miner applies Grover iterations for 16 ​min before measuring, which is surprising, as the network mines blocks every 10 ​min on average. Using this optimal mining procedure, we show that the quantum miner outperforms a classical computer in efficiency (cost per block) if the condition <em>Q</em> ​&lt; ​<em>Crb</em> is satisfied, where <em>Q</em> is the cost of a Grover iteration, <em>C</em> is the cost of a classical hash, <em>r</em> is the quantum miner's speed in Grover iterations per second, and <em>b</em> is a factor that attains its maximum if the quantum miner uses our optimal mining procedure. This condition lays the foundation for determining when quantum mining and the known security risks associated with it will arise.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49809824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identifying malicious accounts in blockchains using domain names and associated temporal properties 使用域名和相关的临时属性识别区块链中的恶意帐户
IF 5.6 3区 计算机科学 Pub Date : 2023-09-01 DOI: 10.1016/j.bcra.2023.100136
Rohit Kumar Sachan , Rachit Agarwal , Sandeep Kumar Shukla

The rise in the adoption of blockchain technology has led to increased illegal activities by cybercriminals costing billions of dollars. Many machine learning algorithms are applied to detect such illegal behavior. These algorithms are often trained on the transaction behavior and, in some cases, trained on the vulnerabilities that exist in the system. In our approach, we study the feasibility of using the Domain Name (DN) associated with the account in the blockchain and identify whether an account should be tagged malicious or not. Here, we leverage the temporal aspects attached to the DN. Our approach achieves 89.53% balanced-accuracy in detecting malicious blockchain DNs. While our results identify 73769 blockchain DNs that show malicious behavior at least once, out of these, 34171 blockchain DNs show persistent malicious behavior, resulting in 2479 malicious blockchain DNs over time. Nonetheless, none of these identified malicious DNs were reported in new officially tagged malicious blockchain DNs.

区块链技术的普及导致网络犯罪分子的非法活动增加,耗资数十亿美元。许多机器学习算法被应用于检测这种非法行为。这些算法通常针对事务行为进行训练,在某些情况下,还针对系统中存在的漏洞进行训练。在我们的方法中,我们研究了在区块链中使用与帐户关联的域名(DN)的可行性,并确定帐户是否应被标记为恶意。在这里,我们利用DN附带的时间方面。我们的方法在检测恶意区块链DN方面实现了89.53%的平衡准确率。虽然我们的结果确定了73769个区块链DN至少表现出一次恶意行为,但其中34171个区块链DNs表现出持续的恶意行为,随着时间的推移,导致2479个恶意区块链DN。尽管如此,这些已识别的恶意DN都没有在新的官方标记的恶意区块链DN中报告。
{"title":"Identifying malicious accounts in blockchains using domain names and associated temporal properties","authors":"Rohit Kumar Sachan ,&nbsp;Rachit Agarwal ,&nbsp;Sandeep Kumar Shukla","doi":"10.1016/j.bcra.2023.100136","DOIUrl":"https://doi.org/10.1016/j.bcra.2023.100136","url":null,"abstract":"<div><p>The rise in the adoption of blockchain technology has led to increased illegal activities by cybercriminals costing billions of dollars. Many machine learning algorithms are applied to detect such illegal behavior. These algorithms are often trained on the transaction behavior and, in some cases, trained on the vulnerabilities that exist in the system. In our approach, we study the feasibility of using the Domain Name (DN) associated with the account in the blockchain and identify whether an account should be tagged malicious or not. Here, we leverage the temporal aspects attached to the DN. Our approach achieves 89.53% balanced-accuracy in detecting malicious blockchain DNs. While our results identify 73769 blockchain DNs that show malicious behavior at least once, out of these, 34171 blockchain DNs show persistent malicious behavior, resulting in 2479 malicious blockchain DNs over time. Nonetheless, none of these identified malicious DNs were reported in new officially tagged malicious blockchain DNs.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49809868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The ins and outs of decentralized autonomous organizations (DAOs) unraveling the definitions, characteristics, and emerging developments of DAOs 分散自治组织(dao)的来龙去脉,揭示了dao的定义、特征和新兴发展
IF 5.6 3区 计算机科学 Pub Date : 2023-09-01 DOI: 10.1016/j.bcra.2023.100143
Olivier Rikken , Marijn Janssen , Zenlin Kwee

Despite the increase in the number of blockchain-based Decentralized Autonomous Organizations (DAOs), there is no consensus on what constitutes a DAO. This paper provides an in-depth study of DAOs by analyzing their definitions, characteristics, and emerging developments. Existing definitions in the literature hardly recognize common functionalities and intermingle coded DAOs, DAO deployment platforms, and blockchain DAOs. We developed a comprehensive DAO definition by reviewing the literature and empirically analyzing 1,859 DAOs. The findings show that many DAOs were inactive and that a threshold of 20 tokenholders is a tipping point for DAOs to survive over time and maintain sustained levels of activity. Finally, based on an empirical analysis of 9,845 perceived DAOs, we identified the emerging development of off-chain voting. This emerging development challenges the autonomous nature of DAOs. We recommend further research to investigate the effect of governance structures on their long-term sustainability and viability for both on-chain and off-chain DAOs.

尽管基于区块链的去中心化自治组织(DAO)的数量有所增加,但对于什么是DAO还没有达成共识。本文通过分析dao的定义、特征和新兴发展,对dao进行了深入的研究。文献中现有的定义很难识别常见的功能,并且混合了编码的DAO、DAO部署平台和区块链DAO。通过回顾文献并对1859个DAO进行实证分析,我们开发了一个全面的DAO定义。研究结果表明,许多dao都不活跃,20个代币持有者的阈值是dao随着时间的推移生存并保持持续活动水平的临界点。最后,基于对9845个感知到的dao的实证分析,我们确定了链下投票的新兴发展。这种新兴的发展挑战了dao的自治性质。我们建议进一步研究治理结构对链上和链下dao的长期可持续性和可行性的影响。
{"title":"The ins and outs of decentralized autonomous organizations (DAOs) unraveling the definitions, characteristics, and emerging developments of DAOs","authors":"Olivier Rikken ,&nbsp;Marijn Janssen ,&nbsp;Zenlin Kwee","doi":"10.1016/j.bcra.2023.100143","DOIUrl":"10.1016/j.bcra.2023.100143","url":null,"abstract":"<div><p>Despite the increase in the number of blockchain-based Decentralized Autonomous Organizations (DAOs), there is no consensus on what constitutes a DAO. This paper provides an in-depth study of DAOs by analyzing their definitions, characteristics, and emerging developments. Existing definitions in the literature hardly recognize common functionalities and intermingle coded DAOs, DAO deployment platforms, and blockchain DAOs. We developed a comprehensive DAO definition by reviewing the literature and empirically analyzing 1,859 DAOs. The findings show that many DAOs were inactive and that a threshold of 20 tokenholders is a tipping point for DAOs to survive over time and maintain sustained levels of activity. Finally, based on an empirical analysis of 9,845 perceived DAOs, we identified the emerging development of off-chain voting. This emerging development challenges the autonomous nature of DAOs. We recommend further research to investigate the effect of governance structures on their long-term sustainability and viability for both on-chain and off-chain DAOs.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42967823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart contract-enabled consortium blockchains for the control of supply chain information distortion 智能合约支持联盟区块链控制供应链信息失真
IF 5.6 3区 计算机科学 Pub Date : 2023-09-01 DOI: 10.1016/j.bcra.2023.100134
Corban Allenbrand

Conflicts between supply chain members emerge because individual strategic actions may not be jointly optimal. Efforts to forecast consumer demand represent a source of conflict. The coordination of forecasts requires a powerful incentive alignment approach. This work proposes a smart contract equipped consortium blockchain system that creates an incentive structure that makes coordination with respect to forecasts economically appealing. Distortions of demand information due to uncoordinated forecasting are captured by a bullwhip measure that factors both forecast error and variance. Cooperation under the system is shown to help minimize this bullwhip measure, thus generating new outcomes for the participants that allow for a higher reward. Under a fixed payout structure, the system achieves credibility of continued cooperation, thus promoting an optimally coordinated equilibrium between the retailer and supplier. Blockchain technology represents a novel information system and consensus formation mechanism that can intermediate the behavior of a supply chain network.

供应链成员之间的冲突是因为个体的战略行动可能不是共同最优的。预测消费者需求的努力是冲突的一个来源。预测的协调需要强有力的激励对齐方法。这项工作提出了一个配备智能合约的联盟区块链系统,该系统创建了一种激励结构,使预测方面的协调在经济上具有吸引力。由于不协调的预测而导致的需求信息失真可以通过牛鞭测量来捕获,该测量将预测误差和方差都考虑在内。该系统下的合作被证明有助于最小化这种牛鞭措施,从而为参与者产生新的结果,从而获得更高的奖励。在固定支付结构下,系统实现了持续合作的可信度,从而促进了零售商和供应商之间的最优协调均衡。区块链技术代表了一种新的信息系统和共识形成机制,可以中介供应链网络的行为。
{"title":"Smart contract-enabled consortium blockchains for the control of supply chain information distortion","authors":"Corban Allenbrand","doi":"10.1016/j.bcra.2023.100134","DOIUrl":"10.1016/j.bcra.2023.100134","url":null,"abstract":"<div><p>Conflicts between supply chain members emerge because individual strategic actions may not be jointly optimal. Efforts to forecast consumer demand represent a source of conflict. The coordination of forecasts requires a powerful incentive alignment approach. This work proposes a smart contract equipped consortium blockchain system that creates an incentive structure that makes coordination with respect to forecasts economically appealing. Distortions of demand information due to uncoordinated forecasting are captured by a bullwhip measure that factors both forecast error and variance. Cooperation under the system is shown to help minimize this bullwhip measure, thus generating new outcomes for the participants that allow for a higher reward. Under a fixed payout structure, the system achieves credibility of continued cooperation, thus promoting an optimally coordinated equilibrium between the retailer and supplier. Blockchain technology represents a novel information system and consensus formation mechanism that can intermediate the behavior of a supply chain network.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45701827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security challenges and defense approaches for blockchain-based services from a full-stack architecture perspective 从全栈架构的角度看基于区块链的服务的安全挑战和防御方法
IF 5.6 3区 计算机科学 Pub Date : 2023-09-01 DOI: 10.1016/j.bcra.2023.100135
Hongsong Chen , Xietian Luo , Lei Shi , Yongrui Cao , Yongpeng Zhang

As an advantageous technique and service, the blockchain has shown great development and application prospects. However, its security has also met great challenges, and many security vulnerabilities and attack issues in blockchain-based services have emerged. Recently, security issues of blockchain have attracted extensive attention. However, there is still a lack of blockchain security research from a full-stack architecture perspective, as well as representative quantitative experimental reproduction and analysis. We aim to provide a security architecture to solve security risks in blockchain services from a full-stack architecture perspective. Meanwhile, we propose a formal definition of the full-stack security architecture for blockchain-based services, and we also propose a formal expression of security issues and defense solutions from a full-stack security perspective. We use ConCert to conduct a smart contract formal verification experiment by property-based testing. The security vulnerabilities of blockchain services in the Common Vulnerabilities and Exposures (CVE) and China Nation Vulnerability Database (CNVD) are selected and enumerated. Additionally, three real contract-layer real attack events are reproduced by an experimental approach. Using Alibaba's blockchain services and Identity Mixer in Hyperledger Fabric as a case study, the security problems and defense techniques are analyzed and researched. At last, the future research directions are proposed.

区块链作为一项优势技术和服务,显示出巨大的发展和应用前景。然而,其安全性也遇到了很大的挑战,基于区块链的服务中出现了许多安全漏洞和攻击问题。最近,区块链的安全问题引起了广泛关注。然而,目前还缺乏全栈架构视角下的区块链安全研究,以及有代表性的定量实验再现与分析。我们的目标是提供一个安全架构,从全栈架构的角度解决区块链服务中的安全风险。同时,我们提出了基于区块链服务的全栈安全架构的正式定义,并从全栈安全的角度提出了安全问题和防御解决方案的正式表达。我们使用ConCert通过基于属性的测试进行智能合约形式化验证实验。选取并列举了CVE (Common vulnerabilities and Exposures)和CNVD (China national Vulnerability Database)中区块链服务的安全漏洞。此外,通过实验方法再现了三个真实的合约层真实攻击事件。以阿里巴巴的区块链服务和Hyperledger Fabric中的身份混合器为例,分析和研究了安全问题和防御技术。最后,提出了今后的研究方向。
{"title":"Security challenges and defense approaches for blockchain-based services from a full-stack architecture perspective","authors":"Hongsong Chen ,&nbsp;Xietian Luo ,&nbsp;Lei Shi ,&nbsp;Yongrui Cao ,&nbsp;Yongpeng Zhang","doi":"10.1016/j.bcra.2023.100135","DOIUrl":"10.1016/j.bcra.2023.100135","url":null,"abstract":"<div><p>As an advantageous technique and service, the blockchain has shown great development and application prospects. However, its security has also met great challenges, and many security vulnerabilities and attack issues in blockchain-based services have emerged. Recently, security issues of blockchain have attracted extensive attention. However, there is still a lack of blockchain security research from a full-stack architecture perspective, as well as representative quantitative experimental reproduction and analysis. We aim to provide a security architecture to solve security risks in blockchain services from a full-stack architecture perspective. Meanwhile, we propose a formal definition of the full-stack security architecture for blockchain-based services, and we also propose a formal expression of security issues and defense solutions from a full-stack security perspective. We use ConCert to conduct a smart contract formal verification experiment by property-based testing. The security vulnerabilities of blockchain services in the Common Vulnerabilities and Exposures (CVE) and China Nation Vulnerability Database (CNVD) are selected and enumerated. Additionally, three real contract-layer real attack events are reproduced by an experimental approach. Using Alibaba's blockchain services and Identity Mixer in Hyperledger Fabric as a case study, the security problems and defense techniques are analyzed and researched. At last, the future research directions are proposed.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47364378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Digital assets rights management through smart legal contracts and smart contracts 通过智能法律合同和智能合约进行数字资产权益管理
IF 5.6 3区 计算机科学 Pub Date : 2023-09-01 DOI: 10.1016/j.bcra.2023.100142
Enrico Ferro , Marco Saltarella , Domenico Rotondi , Marco Giovanelli , Giacomo Corrias , Roberto Moncada , Andrea Cavallaro , Alfredo Favenza

Intellectual property rights (IPR) management needs to evolve in a digital world where not only companies but also many independent content creators contribute to our culture with their art, music, and videos. In this respect, blockchain has recently emerged as a promising infrastructure, providing a trustworthy and immutable environment through the use of smart contracts, which may enable more agile management of digital rights and streamline royalty payments. However, no widespread consensus has been reached on the ability of this technology to adequately manage and transfer IPR. This paper presents an innovative approach to digital rights management developed within the scope of an international research endeavour co-financed by the European Commission named MediaVerse. The approach proposes the combined usage of smart legal contracts and blockchain smart contracts to take care of the legally binding contractual aspects of IPR and, at the same time, the need for notarization, rights transfer, and royalty payments. The work being conducted represents a contribution to advancing the current literature on IPR management that may lead to an improved and fairer monetization process for content creators as a means of individual empowerment.

知识产权管理需要在数字世界中发展,因为不仅是公司,而且许多独立的内容创作者也通过他们的艺术、音乐和视频为我们的文化做出贡献。在这方面,区块链最近成为一个有前途的基础设施,通过使用智能合约提供一个值得信赖和不可变的环境,这可能使数字版权的管理更加灵活,并简化版税支付。然而,对于这项技术是否能够充分管理和转让知识产权,尚未达成广泛的共识。本文提出了一种创新的数字版权管理方法,该方法是由欧洲委员会共同资助的一项名为MediaVerse的国际研究项目开发的。该方法提出了智能法律合同和区块链智能合同的结合使用,以处理知识产权具有法律约束力的合同方面,同时还需要公证、权利转让和特许权使用费支付。正在进行的工作代表了对推进当前知识产权管理文献的贡献,这可能会导致内容创作者作为个人赋权手段的改进和更公平的货币化过程。
{"title":"Digital assets rights management through smart legal contracts and smart contracts","authors":"Enrico Ferro ,&nbsp;Marco Saltarella ,&nbsp;Domenico Rotondi ,&nbsp;Marco Giovanelli ,&nbsp;Giacomo Corrias ,&nbsp;Roberto Moncada ,&nbsp;Andrea Cavallaro ,&nbsp;Alfredo Favenza","doi":"10.1016/j.bcra.2023.100142","DOIUrl":"10.1016/j.bcra.2023.100142","url":null,"abstract":"<div><p>Intellectual property rights (IPR) management needs to evolve in a digital world where not only companies but also many independent content creators contribute to our culture with their art, music, and videos. In this respect, blockchain has recently emerged as a promising infrastructure, providing a trustworthy and immutable environment through the use of smart contracts, which may enable more agile management of digital rights and streamline royalty payments. However, no widespread consensus has been reached on the ability of this technology to adequately manage and transfer IPR. This paper presents an innovative approach to digital rights management developed within the scope of an international research endeavour co-financed by the European Commission named MediaVerse. The approach proposes the combined usage of smart legal contracts and blockchain smart contracts to take care of the legally binding contractual aspects of IPR and, at the same time, the need for notarization, rights transfer, and royalty payments. The work being conducted represents a contribution to advancing the current literature on IPR management that may lead to an improved and fairer monetization process for content creators as a means of individual empowerment.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42901488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The cost of privacy on blockchain: A study on sealed-bid auctions 区块链上的隐私成本:密封竞价拍卖研究
IF 5.6 3区 计算机科学 Pub Date : 2023-09-01 DOI: 10.1016/j.bcra.2023.100133
Menelaos Kokaras , Magda Foti

In order to preserve privacy in a blockchain ecosystem, the main objective is to keep a transaction's data private, such as the sender, the receiver, and the amount transferred. The current work studies the cryptographic tools commonly used to achieve this type of privacy, primarily focusing on the Ethereum blockchain. Such tools usually require many computational and storage resources, leading to additional fees. An anonymous auction protocol was developed as a case study to explore these costs, where hiding the identity and the amount of the bids utilizes a variety of cryptographic primitives. The proposed implementation was compared against three sealed-bid auction protocols, which utilize similar cryptographic tools for preserving privacy throughout the auction process. The results show that providing an additional level of anonymity, such as hiding someone's identity, can increase the gas cost significantly, up to 2.5 times, depending on the choice of the cryptographic tools, which determine the usage of the blockchain's storage and computational resources. By adjusting the level of decentralization on the application level by moving some operations off-chain and maintaining the role of the auctioneer, we show that we can maintain anonymity while reducing the gas cost by 40%.

为了在区块链生态系统中保护隐私,主要目标是保持交易数据的私密性,例如发送方,接收方和转移的金额。目前的工作研究了通常用于实现这种隐私的加密工具,主要集中在以太坊区块链上。这些工具通常需要大量的计算和存储资源,从而导致额外的费用。开发了一个匿名拍卖协议作为案例研究,以探索这些成本,其中隐藏身份和投标金额使用各种加密原语。将提议的实现与三种密封竞标协议进行了比较,这三种协议利用类似的加密工具在整个拍卖过程中保护隐私。结果表明,提供额外的匿名级别,例如隐藏某人的身份,可以显着增加gas成本,最高可达2.5倍,这取决于加密工具的选择,加密工具决定了区块链存储和计算资源的使用情况。通过在应用程序层面调整去中心化水平,将一些操作移出链下,并保持拍卖商的角色,我们表明我们可以在保持匿名的同时降低40%的gas成本。
{"title":"The cost of privacy on blockchain: A study on sealed-bid auctions","authors":"Menelaos Kokaras ,&nbsp;Magda Foti","doi":"10.1016/j.bcra.2023.100133","DOIUrl":"10.1016/j.bcra.2023.100133","url":null,"abstract":"<div><p>In order to preserve privacy in a blockchain ecosystem, the main objective is to keep a transaction's data private, such as the sender, the receiver, and the amount transferred. The current work studies the cryptographic tools commonly used to achieve this type of privacy, primarily focusing on the Ethereum blockchain. Such tools usually require many computational and storage resources, leading to additional fees. An anonymous auction protocol was developed as a case study to explore these costs, where hiding the identity and the amount of the bids utilizes a variety of cryptographic primitives. The proposed implementation was compared against three sealed-bid auction protocols, which utilize similar cryptographic tools for preserving privacy throughout the auction process. The results show that providing an additional level of anonymity, such as hiding someone's identity, can increase the gas cost significantly, up to 2.5 times, depending on the choice of the cryptographic tools, which determine the usage of the blockchain's storage and computational resources. By adjusting the level of decentralization on the application level by moving some operations off-chain and maintaining the role of the auctioneer, we show that we can maintain anonymity while reducing the gas cost by 40%.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45589467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ADEFGuard: Anomaly detection framework based on Ethereum smart contracts behaviours ADEFGuard:基于以太坊智能合约行为的异常检测框架
IF 5.6 3区 计算机科学 Pub Date : 2023-09-01 DOI: 10.1016/j.bcra.2023.100148
Malaw Ndiaye , Thierno Ahmadou Diallo , Karim Konate

Smart contracts are the building blocks of blockchain systems that enable automated peer-to-peer transactions and decentralized services. Smart contracts certainly provide a powerful functional surplus for maintaining the consistency of transactions in applications governed by blockchain technology. Smart contracts have become lucrative and profitable targets for attackers because they can hold a large amount of money. Formal verification and symbolic analysis have been employed to combat these destructive scams by analysing the codes and function calls, yet each scam's vulnerability should be discreetly predefined. In this work, we introduce ADEFGuard, a new anomaly detection framework based on the behaviour of smart contracts, as a new feature. We design a learning and monitoring module to determine fraudulent smart contract behaviours.

Our framework is advantageous over basic algorithms in three aspects. First, ADEFGuard provides a unified solution to different genres of scams, relieving the need for code analysis skills. Second, ADEFGuard's inference is orders of magnitude faster than code analysis. Third, the experimental results show that ADEFGuard achieves high accuracy (85%), precision (75%), and recall (90%) for malicious contracts and is potentially useful in detecting new malicious behaviours of smart contracts.

智能合约是区块链系统的构建模块,可以实现自动化的点对点交易和分散的服务。智能合约当然为维护由区块链技术管理的应用程序中的交易一致性提供了强大的功能剩余。智能合约已经成为攻击者有利可图的目标,因为它们可以持有大量资金。通过分析代码和函数调用,已经采用了形式验证和符号分析来打击这些破坏性骗局,但每个骗局的漏洞都应该谨慎地预先定义。在这项工作中,我们引入了ADEFGuard,这是一个基于智能合约行为的新的异常检测框架,作为一个新功能。我们设计了一个学习和监控模块来确定欺诈智能合约行为。我们的框架在三个方面优于基本算法。首先,ADEFGuard为不同类型的诈骗提供了统一的解决方案,减轻了对代码分析技能的需求。其次,ADEFGuard的推理比代码分析要快几个数量级。第三,实验结果表明,ADEFGuard对恶意合约达到了很高的准确率(85%)、精确度(75%)和召回率(90%),在检测智能合约的新恶意行为方面可能有用。
{"title":"ADEFGuard: Anomaly detection framework based on Ethereum smart contracts behaviours","authors":"Malaw Ndiaye ,&nbsp;Thierno Ahmadou Diallo ,&nbsp;Karim Konate","doi":"10.1016/j.bcra.2023.100148","DOIUrl":"10.1016/j.bcra.2023.100148","url":null,"abstract":"<div><p>Smart contracts are the building blocks of blockchain systems that enable automated peer-to-peer transactions and decentralized services. Smart contracts certainly provide a powerful functional surplus for maintaining the consistency of transactions in applications governed by blockchain technology. Smart contracts have become lucrative and profitable targets for attackers because they can hold a large amount of money. Formal verification and symbolic analysis have been employed to combat these destructive scams by analysing the codes and function calls, yet each scam's vulnerability should be discreetly predefined. In this work, we introduce ADEFGuard, a new anomaly detection framework based on the behaviour of smart contracts, as a new feature. We design a learning and monitoring module to determine fraudulent smart contract behaviours.</p><p>Our framework is advantageous over basic algorithms in three aspects. First, ADEFGuard provides a unified solution to different genres of scams, relieving the need for code analysis skills. Second, ADEFGuard's inference is orders of magnitude faster than code analysis. Third, the experimental results show that ADEFGuard achieves high accuracy (85%), precision (75%), and recall (90%) for malicious contracts and is potentially useful in detecting new malicious behaviours of smart contracts.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43158165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Blockchain-Research and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1