An empirical study of blockchain system vulnerabilities: modules, types, and patterns
Blockchain, as a distributed ledger technology, becomes increasingly popular, especially for enabling valuable cryptocurrencies and smart contracts. However, the blockchain software systems inevitably have many bugs. Although bugs in smart contracts have been extensively investigated, security bugs...
Saved in:
Main Authors: | YI, Xiao, WU, Daoyuan, JIANG, Lingxiao, FANG, Yuzhou, ZHANG, Kehuan, ZHANG, Wei |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2022
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7643 https://ink.library.smu.edu.sg/context/sis_research/article/8646/viewcontent/fse22BlkVuln.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities
by: SHAR, Lwin Khin, et al.
Published: (2012) -
Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns
by: SHAR, Lwin Khin, et al.
Published: (2013) -
TOWARDS SECURE PUBLIC BLOCKCHAIN PROTOCOLS AT SCALE
by: LUU THE LOI
Published: (2018) -
BlockScope: Detecting and investigating propagated vulnerabilities in forked blockchain projects
by: YI, Xiao, et al.
Published: (2023) -
Towards a hybrid framework for detecting input manipulation vulnerabilities
by: DING, Sun, et al.
Published: (2013)