期刊文献+
共找到272篇文章
< 1 2 14 >
每页显示 20 50 100
融合Ethereum和IPFS加密算法的分布式数据存储传输研究 被引量:5
1
作者 刘张榕 余根坚 《佳木斯大学学报(自然科学版)》 CAS 2022年第6期47-50,133,共5页
现阶段分布式网络出现可靠性低、安全性低等问题,构建相应的存储运输保障机制具有积极的意义。研究提出CP-ABE数据加密方案,该方案以Ethereum网络作为分布式网络系统架构,将IPFS作为数据存储网络,通过密文半解密算法和密钥转换算法改进C... 现阶段分布式网络出现可靠性低、安全性低等问题,构建相应的存储运输保障机制具有积极的意义。研究提出CP-ABE数据加密方案,该方案以Ethereum网络作为分布式网络系统架构,将IPFS作为数据存储网络,通过密文半解密算法和密钥转换算法改进CP-ABE算法实现第三方加密。研究结果表明,相较于其他数据加密方案,CP-ABE数据加密方案在属性组数为90时,加密时间和解密时间分别最短和最长,相应数值分别为1.68s和2.62s,且CP-ABE数据加密方案的解密时间不会随着请求者数量的增加而增加。研究所提出的CP-ABE数据加密方案能够大幅度提升分布式存储运输的数据安全。 展开更多
关键词 ethereum 分布式系统 IPFS CP-ABE
在线阅读 下载PDF
A Measurement Study of the Ethereum Underlying P2P Network
2
作者 Mohammad ZMasoud Yousef Jaradat +3 位作者 Ahmad Manasrah Mohammad Alia Khaled Suwais Sally Almanasra 《Computers, Materials & Continua》 SCIE EI 2024年第1期515-532,共18页
This work carried out a measurement study of the Ethereum Peer-to-Peer(P2P)network to gain a better understanding of the underlying nodes.Ethereum was applied because it pioneered distributed applications,smart contra... This work carried out a measurement study of the Ethereum Peer-to-Peer(P2P)network to gain a better understanding of the underlying nodes.Ethereum was applied because it pioneered distributed applications,smart contracts,and Web3.Moreover,its application layer language“Solidity”is widely used in smart contracts across different public and private blockchains.To this end,we wrote a new Ethereum client based on Geth to collect Ethereum node information.Moreover,various web scrapers have been written to collect nodes’historical data fromthe Internet Archive and the Wayback Machine project.The collected data has been compared with two other services that harvest the number of Ethereumnodes.Ourmethod has collectedmore than 30% more than the other services.The data trained a neural network model regarding time series to predict the number of online nodes in the future.Our findings show that there are less than 20% of the same nodes daily,indicating thatmost nodes in the network change frequently.It poses a question of the stability of the network.Furthermore,historical data shows that the top ten countries with Ethereum clients have not changed since 2016.The popular operating system of the underlying nodes has shifted from Windows to Linux over time,increasing node security.The results have also shown that the number of Middle East and North Africa(MENA)Ethereum nodes is neglected compared with nodes recorded from other regions.It opens the door for developing new mechanisms to encourage users from these regions to contribute to this technology.Finally,the model has been trained and demonstrated an accuracy of 92% in predicting the future number of nodes in the Ethereum network. 展开更多
关键词 ethereum MEASUREMENT ethereum client neural network time series forecasting web-scarping wayback machine blockchain
在线阅读 下载PDF
“Half of the Node Records Are Forged?”: The Problemof Node Records Forgery in Ethereum Network
3
作者 Yang Liu Zhiyuan Lin +2 位作者 Yuxi Zhang Lin Jiang Xuan Wang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1713-1729,共17页
Ethereum, currently the most widely utilized smart contracts platform, anchors the security of myriad smartcontracts upon its own robustness. Its foundational peer-to-peer network facilitates a dependable node connect... Ethereum, currently the most widely utilized smart contracts platform, anchors the security of myriad smartcontracts upon its own robustness. Its foundational peer-to-peer network facilitates a dependable node connectionmechanism, whereas an efficient data-sharing protocol constitutes as the bedrock of Blockchain network security.In this paper, we propose NodeHunter, an Ethereum network detector implemented through the application ofsimulation technology, which is capable of aggregating all node records within the network and the interconnectednessbetween them. Utilizing this connection information, NodeHunter can procure more comprehensive insightsfor network status analysis compared to preceding detection methodologies. Throughout a three-month period ofunbroken surveillance of the Ethereum network, we obtained an excess of two million node records along with overone hundred million node acquaintances. Analysis of the gathered data revealed that an alarming 49% or more ofthese node records were maliciously forged. 展开更多
关键词 Blockchain ethereum peer-to-peer networks node discovery protocol malicious behavior
在线阅读 下载PDF
Enhancement of UAV Data Security and Privacy via Ethereum Blockchain Technology
4
作者 Sur Singh Rawat Youseef Alotaibi +1 位作者 Nitima Malsa Vimal Gupta 《Computers, Materials & Continua》 SCIE EI 2023年第8期1797-1815,共19页
Unmanned aerial vehicles(UAVs),or drones,have revolutionized a wide range of industries,including monitoring,agriculture,surveillance,and supply chain.However,their widespread use also poses significant challenges,suc... Unmanned aerial vehicles(UAVs),or drones,have revolutionized a wide range of industries,including monitoring,agriculture,surveillance,and supply chain.However,their widespread use also poses significant challenges,such as public safety,privacy,and cybersecurity.Cyberattacks,targetingUAVs have become more frequent,which highlights the need for robust security solutions.Blockchain technology,the foundation of cryptocurrencies has the potential to address these challenges.This study suggests a platform that utilizes blockchain technology tomanage drone operations securely and confidentially.By incorporating blockchain technology,the proposed method aims to increase the security and privacy of drone data.The suggested platform stores information on a public blockchain located on Ethereum and leverages the Ganache platform to ensure secure and private blockchain transactions.TheMetaMask wallet for Ethbalance is necessary for BCT transactions.The present research finding shows that the proposed approach’s efficiency and security features are superior to existing methods.This study contributes to the development of a secure and efficient system for managing drone operations that could have significant applications in various industries.The proposed platform’s security measures could mitigate privacy concerns,minimize cyber security risk,and enhance public safety,ultimately promoting the widespread adoption of UAVs.The results of the study demonstrate that the blockchain can ensure the fulfillment of core security needs such as authentication,privacy preservation,confidentiality,integrity,and access control. 展开更多
关键词 Unmanned aerial vehicles(UAVs) blockchain data privacy network security smart contract ethereum
在线阅读 下载PDF
Blockchain Merkle-Tree Ethereum Approach in Enterprise Multitenant Cloud Environment
5
作者 Pooja Dhiman Santosh Kumar Henge +3 位作者 Sartaj Singh Avinash Kaur Parminder Singh Mustapha Hadabou 《Computers, Materials & Continua》 SCIE EI 2023年第2期3297-3313,共17页
This research paper puts emphasis on using cloud computing with Blockchain(BC)to improve the security and privacy in a cloud.The security of data is not guaranteed as there is always a risk of leakage of users’data.B... This research paper puts emphasis on using cloud computing with Blockchain(BC)to improve the security and privacy in a cloud.The security of data is not guaranteed as there is always a risk of leakage of users’data.Blockchain can be used in a multi-tenant cloud environment(MTCE)to improve the security of data,as it is a decentralized approach.Data is saved in unaltered form.Also,Blockchain is not owned by a single organization.The encryption process can be done using a Homomorphic encryption(HE)algorithm along with hashing technique,hereby allowing computations on encrypted data without the need for decryption.This research paper is composed of four objectives:Analysis of cloud security using Blockchain technology;Exceptional scenario of Blockchain architecture in an enterprise-level MTCE;Implementation of cipher-text policy attribute-based encryption(CPABE)algorithm;Implementation of Merkle tree using Ethereum(MTuE)in a Multi-tenant system.Out of these four objectives,the main focus is on the implementation of CP-ABE algorithm.CP-ABE parameters are proposed for different levels of tenants.The levels include inner tenant,outer tenant,Inner-Outer-Tenant,Inner-Outer-External-Tenant,Outer-Inner-Tenant,External-Outer-Inner-Tenant and the parameters such as token,private key,public key,access tree,message,attribute set,node-level,cipher-text,salting which will help in providing better security using CP-ABE algorithm in a multitenant environment(MTE)where tenants can be provided with different levels of security and achieved 92 percentage of authenticity and access-control of the data. 展开更多
关键词 Blockchain(BC) merkle tree using ethereum(MTuE) multi-tenant environment(MTE) homomorphic encryption(HE) ciphertext policy attribute-based encryption(CP-ABE)
在线阅读 下载PDF
基于Ethereum的房地产供应链系统设计与实现 被引量:13
6
作者 张亮 张翰林 +1 位作者 孔凡玉 于佳 《计算机工程与应用》 CSCD 北大核心 2020年第3期214-223,共10页
以太坊区块链技术是当今互联网时代的一项具有创新性、革命性的综合型分布式数据库账本技术,具有去中介化、自治性、数据不可篡改、可追溯、可编程等特点。分析了传统房地产供应链存在的不足,运用新兴的区块链技术,设计了基于以太坊智... 以太坊区块链技术是当今互联网时代的一项具有创新性、革命性的综合型分布式数据库账本技术,具有去中介化、自治性、数据不可篡改、可追溯、可编程等特点。分析了传统房地产供应链存在的不足,运用新兴的区块链技术,设计了基于以太坊智能合约的房地产供应链系统。给出了该系统的系统模型,包括系统流程和系统架构两部分。具体说明了系统所涉及到的四个功能模块。展示了系统的工作流程,并讨论了区块链+房地产供应链存在的问题。对区块链应用于房地产供应链领域进行总结,旨在为未来更好地将区块链应用于房地产供应链提供参考。 展开更多
关键词 区块链 以太坊 智能合约 房地产 供应链
在线阅读 下载PDF
Popular cryptoassets(Bitcoin,Ethereum,and Dogecoin),Gold,and their relationships:volatility and correlation modeling
7
作者 Stephen Zhang Ganesh Mani 《Data Science and Management》 2021年第4期30-39,共10页
Cryptoassets have experienced dramatic volatility in their prices,especially during the COVID-19 pandemic era.This pilot study explores the volatility asymmetry and correlations among three popular cryptoassets(Bitcoi... Cryptoassets have experienced dramatic volatility in their prices,especially during the COVID-19 pandemic era.This pilot study explores the volatility asymmetry and correlations among three popular cryptoassets(Bitcoin,Ethereum,and Dogecoin)as well as Gold.Multiple Generalized Autoregressive Conditional Heteroskedasticity(GARCH)models are analyzed.We find that positive shocks have a greater impact on the volatility of these financial assets than negative shocks of the same magnitude,perhaps a manifestation of the fear of missing out(FOMO)effect.Our research is one of the first to use COVID-19-period volatility of financial assets(in-sample data)to forecast their later COVID-19-period volatility(out-of-sample data).This forecast accuracy is compared to that produced by forecasts using the same out-of-sample data and a longer in-sample data.Our results indicate that generally,the larger in-sample dataset gives a higher forecast accuracy though the smaller in-sample dataset is from the same regime as the out-of-sample data.We also evaluate the correlations among the assets using the Dynamic Conditional Correlation(DCC)framework and find that there is an elevated positive correlation between Gold and Bitcoin during the past two years.The Gold-Bitcoin correlation hit its peak during the peak of the COVID-19 pandemic and then fell back to around zero in July 2021 when the pandemic crisis eased.Unsurprisingly,there is a strong positive correlation among the cryptocurrencies.Pairwise correlation among all four assets was stronger during the COVID-19 pandemic.Such continuing analysis can inform portfolio asset allocation as well as general financial policy decisions. 展开更多
关键词 Cryptocurrencies Bitcoin ethereum Dogecoin GOLD Correlation Leverage effect EGARCH GJR-GARCH MGARCH DCC
在线阅读 下载PDF
On the efficiency and its drivers in the cryptocurrency market:the case of Bitcoin and Ethereum
8
作者 Khaled Mokni Ghassen El Montasser +1 位作者 Ahdi Noomen Ajmi Elie Bouri 《Financial Innovation》 2024年第1期3842-3866,共25页
Most previous studies on the market efficiency of cryptocurrencies consider time evolution but do not provide insights into the potential driving factors.This study addresses this limitation by examining the time-vary... Most previous studies on the market efficiency of cryptocurrencies consider time evolution but do not provide insights into the potential driving factors.This study addresses this limitation by examining the time-varying efficiency of the two largest cryptocurrencies,Bitcoin and Ethereum,and the factors that drive efficiency.It uses daily data from August 7,2016,to February 15,2023,the adjusted market inefficiency magnitude(AMIMs)measure,and quantile regression.The results show evidence of time variation in the levels of market(in)efficiency for Bitcoin and Ethereum.Interestingly,the quantile regressions indicate that global financial stress negatively affects the AMIMs measures across all quantiles.Notably,cryptocurrency liquidity positively and significantly affects AMIMs irrespective of the level of(in)efficiency,whereas the positive effect of money flow is significant when the markets of both cryptocurrencies are efficient.Finally,the COVID-19 pandemic positively and significantly affected cryptocurrency market inefficiencies across most quantiles. 展开更多
关键词 Bitcoin ethereum Time-varying efficiency AMIMs Quantile regression Drivers of efficiency
在线阅读 下载PDF
基于Ethereum全链构建的大数据测量分析与研究
9
作者 黄福鸿 李高翔 +1 位作者 卓采标 叶宇中 《广东通信技术》 2024年第1期51-55,共5页
Ethereum区块链作为分布式数据存储、点对点网络、共识算法、密码学科、智能合约等传统技术的集成创新,在全球数字经济发展中扮演重要角色的同时也带来了新的风险与挑战。通过建立本地节点实现Ethereum大数据构建,从而实现对Ethereum全... Ethereum区块链作为分布式数据存储、点对点网络、共识算法、密码学科、智能合约等传统技术的集成创新,在全球数字经济发展中扮演重要角色的同时也带来了新的风险与挑战。通过建立本地节点实现Ethereum大数据构建,从而实现对Ethereum全链数据进行测量与分析,包括交易数据、区块数据、去中心化程度、TPS等维度分析。在风险内容分析方面,对相关内容风险内容实现了精确定位,并进行定性和定量分析。 展开更多
关键词 区块链 ethereum 大数据 测量分析 内容安全
在线阅读 下载PDF
基于Ethereum智能合约的安全策略分析 被引量:8
10
作者 张登记 赵相福 +1 位作者 陈中育 童向荣 《应用科学学报》 CAS CSCD 北大核心 2021年第1期151-163,共13页
智能合约是代码和数据的集合,一旦部署便无法更改,且其自身持有金融属性,若出现安全漏洞问题将会造成巨大损失,可见编写出安全可靠的智能合约是至关重要的。为此,基于Ethereum平台研究并分析智能合约的安全漏洞,总结了几种易见的安全漏... 智能合约是代码和数据的集合,一旦部署便无法更改,且其自身持有金融属性,若出现安全漏洞问题将会造成巨大损失,可见编写出安全可靠的智能合约是至关重要的。为此,基于Ethereum平台研究并分析智能合约的安全漏洞,总结了几种易见的安全漏洞,包括可重入漏洞、整数溢出漏洞、拒绝服务(denial of service,DoS)漏洞、时间戳依赖漏洞、交易序列依赖漏洞等;针对上述合约的漏洞进行详细的原理分析和场景复现,提出了相应的预防安全策略并通过实验进行有效性验证;最后分析并比较了几种主流的智能合约安全漏洞检测工具。 展开更多
关键词 区块链 以太坊 智能合约 漏洞分析 预防策略
在线阅读 下载PDF
基于Ethereum的风电能源交易方案
11
作者 张利华 白甲义 《计算机应用与软件》 北大核心 2024年第2期49-55,共7页
现有风电能源交易市场化面临着难题,如传统管理中心面对交易数量大、交易额度不确定、运营成本高、资金结算时差、交易不透明等缺陷。提出基于Ethereum的风电能源交易方案。通过风电成本利润控制算法和购电最优算法实现风电成本最小化... 现有风电能源交易市场化面临着难题,如传统管理中心面对交易数量大、交易额度不确定、运营成本高、资金结算时差、交易不透明等缺陷。提出基于Ethereum的风电能源交易方案。通过风电成本利润控制算法和购电最优算法实现风电成本最小化和用户最优购电价。通过Ethereum交易处按照撮合最优算法实现双方去中心化交易。通过联盟链搭建智能合约实现区域风电成本管控、用户购电价格市场化机制、撮合交易管控机制三部分。仿真结果表明该方案具有良好的管理性、可控性、高效性。 展开更多
关键词 风电能源交易 区块链 智能合约 以太坊
在线阅读 下载PDF
A Random Mixing Scheme for Protecting Transaction Privacy on Ethereum 被引量:1
12
作者 Dong-Yu Cao Hao Yin Bi-Xin Li 《Journal of Computer Science & Technology》 2025年第3期731-747,共17页
The blockchain technology allows participants to establish pseudonymous addresses, decoupling their real-world identities from their activities on the blockchain network. However, pseudonymity is not completely anonym... The blockchain technology allows participants to establish pseudonymous addresses, decoupling their real-world identities from their activities on the blockchain network. However, pseudonymity is not completely anonymous and several attacks pose a growing threat to transaction privacy between users. We propose a privacy protection scheme utilizing random mixing on Ethereum, which includes three strategies: RandomMix, TRandomMix, and VRandomMix. The three strategies can protect the sender accounts, the receiver accounts, and the transaction values for one transaction, two transactions, and some equal-value transactions, respectively. We conduct experiments to evaluate both security and performance. The security evaluation results indicate that RandomMix and TRandomMix can resist account clustering attacks, transaction fingerprinting analysis attacks, and Sybil attacks, while VRandomMix can safeguard against account clustering attacks, and is weak against the latter two attacks. In terms of performance, VRandomMix acquires fewer on-chain transactions than RandomMix and TRandomMix. Furthermore, all of them need no off-chain communication and low gas consumption. 展开更多
关键词 blockchain privacy protection MIXING ethereum
原文传递
New Ethereum-based distributed PKI with a reward-and-punishment mechanism
13
作者 Chong-Gee Koa Swee-Huay Heng Ji-Jian Chin 《Blockchain(Research and Applications)》 2025年第1期14-26,共13页
This paper explores the critical role of Public Key Infrastructure(PKI)in ensuring the security of electronic transactions,particularly in validating the authenticity of websites in online environments.Traditional Cen... This paper explores the critical role of Public Key Infrastructure(PKI)in ensuring the security of electronic transactions,particularly in validating the authenticity of websites in online environments.Traditional Centralised PKIs(CPKIs)relying on Certificate Authorities(CAs)face a significant drawback due to their susceptibility to a single point of failure.To address this concern,Decentralised PKIs(DPKIs)have emerged as an alternative.However,both centralised and decentralised approaches encounter specific challenges.Researchers have made several attempts using blockchain-based PKI,which implements a reward and punishment mechanism to enhance the security of traditional PKI.Most of the attempts are focused on CA-based PKI,which still suffers from the risk of a single point of failure.Inspired by ETHERST,which is a blockchainbased PKI that implements Web of Trust(WoT)with reward and punishment,we introduce ETHERST version 3.0,with improvements in its secure level algorithm that enhances trustworthiness measurement.Comparative simulations between ETHERST version 2.0 and ETHERST version 3.0 reveal the superior performance of the latter in trustworthiness measurement and ensure the higher security of a virtual community.The new simulation algorithm with different node type definitions and assumptions presents results through tables and graphs,showing that ETHERST version 3.0 outperforms ETHERST version 2.0.This research contributes to advancing the field by introducing an innovative PKI solution with enhanced trustworthiness and security features. 展开更多
关键词 Blockchain ethereum PKI SECURITY
原文传递
EtherClue:Digital investigation of attacks on Ethereum smart contracts 被引量:2
14
作者 Simon Joseph Aquilina Fran Casino +2 位作者 Mark Vella Joshua Ellul Constantinos Patsakis 《Blockchain(Research and Applications)》 2021年第4期12-29,共18页
Programming errors in Ethereum smart contracts can result in catastrophic financial losses from stolen cryptocurrency.While vulnerability detectors can prevent vulnerable contracts from being deployed,this does not me... Programming errors in Ethereum smart contracts can result in catastrophic financial losses from stolen cryptocurrency.While vulnerability detectors can prevent vulnerable contracts from being deployed,this does not mean that such contracts will not be deployed.Once a vulnerable contract is instantiated on the blockchain and becomes the target of attacks,the identification of exploit transactions becomes indispensable in assessing whether it has been actually exploited and identifying which malicious or subverted accounts were involved.In this work,we study the problem of post-factum investigation of Ethereum attacks using Indicators of Compromise(IoC)specially crafted for use in the blockchain.IoC definitions need to capture the side-effects of successful exploitation in the context of the Ethereum blockchain.Therefore,we define a model for smart contract execution,comprising multiple abstraction levels that mirror the multiple views of code execution on a blockchain.Subsequently,we compare IoCs defined across the different levels in terms of their effectiveness and practicality through EtherClue,a prototype tool for investigating Ethereum security incidents.Our results illustrate that coarse-grained IoCs defined over blocks of transactions can detect exploit transactions with less computation.However,they are contract-specific and suffer from false negatives.On the other hand,fine-grained IoCs defined over virtual machine instructions can avoid these pitfalls at the expense of increased computation,which is nevertheless applicable for practical use. 展开更多
关键词 Blockchain forensics ethereum attacks Indicators of compromise ethereum operational semantics
原文传递
面向通用数字对象的Web3扩展域名系统
15
作者 李旭东 程子果 +1 位作者 黄宇豪 任文 《计算机工程与设计》 北大核心 2026年第1期88-95,共8页
为了解决传统域名系统不支持数字对象及服务的问题,提出面向通用数字对象的Web3扩展域名系统架构,并实现通用域名系统(GNS)。将数字对象定义进一步丰富拓展为通用数字对象,并细分为简单数字对象和复合数字对象。提出一种全新的域名服务... 为了解决传统域名系统不支持数字对象及服务的问题,提出面向通用数字对象的Web3扩展域名系统架构,并实现通用域名系统(GNS)。将数字对象定义进一步丰富拓展为通用数字对象,并细分为简单数字对象和复合数字对象。提出一种全新的域名服务系统架构与GNSP协议,设计链上、链下业务数据相结合的系统模式,以弥补纯链上模式的性能缺陷。针对海量数字对象所带来的性能和访问压力较大的问题,引入基于LRU-K的数字对象缓存模块,提高系统性能。通过实验性能评估,验证了GNS的有效性与高效性。 展开更多
关键词 域名系统 Web3互联网 数字对象 Web3域名系统 区块链 智能合约 以太坊
在线阅读 下载PDF
Secured-FL:Blockchain-Based Defense against Adversarial Attacks on Federated Learning Models
16
作者 Bello Musa Yakubu Nor Shahida Mohd Jamail +1 位作者 Rabia Latif Seemab Latif 《Computers, Materials & Continua》 2026年第3期734-757,共24页
Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work pr... Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work proposes Secured-FL,a blockchain-based defensive framework that combines smart contract-based authentication,clustering-driven outlier elimination,and dynamic threshold adjustment to defend against adversarial attacks.The framework was implemented on a private Ethereum network with a Proof-of-Authority consensus algorithm to ensure tamper-resistant and auditable model updates.Large-scale simulation on the Cyber Data dataset,under up to 50%malicious client settings,demonstrates Secured-FL achieves 6%-12%higher accuracy,9%-15%lower latency,and approximately 14%less computational expense compared to the PPSS benchmark framework.Additional tests,including confusion matrices,ROC and Precision-Recall curves,and ablation tests,confirm the interpretability and robustness of the defense.Tests for scalability also show consistent performance up to 500 clients,affirming appropriateness to reasonably large deployments.These results make Secured-FL a feasible,adversarially resilient FL paradigm with promising potential for application in smart cities,medicine,and other mission-critical IoT deployments. 展开更多
关键词 Federated learning(FL) blockchain FL based privacy model defense FL model security ethereum smart contract
在线阅读 下载PDF
Mutation Testing for Integer Overflow in Ethereum Smart Contracts 被引量:6
17
作者 Jinlei Sun Song Huang +3 位作者 Changyou Zheng Tingyong Wang Cheng Zong Zhanwei Hui 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2022年第1期27-40,共14页
Integer overflow is a common vulnerability in Ethereum Smart Contracts(ESCs)and often causes huge economic losses.Smart contracts cannot be changed once it is deployed on the blockchain and thus demand further testing... Integer overflow is a common vulnerability in Ethereum Smart Contracts(ESCs)and often causes huge economic losses.Smart contracts cannot be changed once it is deployed on the blockchain and thus demand further testing.Mutation testing is a fault-based testing method that can effectively improve the sufficiency of a test for smart contracts.However,existing methods cannot efficiently perform mutation testing specifically for integer overflow in ESCs.Therefore,by analyzing integer overflow in ESCs,we propose five special mutation operators to address such vulnerability in terms of detecting sufficiency in ESC testing.An empirical study on 40 open-source ESCs is conducted to evaluate the effectiveness of the proposed mutation operators.Results show that(1)our proposed mutation operators can reproduce all 179 integer overflow vulnerabilities in 40 smart contracts,and the generated mutants have high compilation pass rate and integer overflow vulnerability generation rate;moreover,(2)the generated mutants can find the shortcomings of existing testing methods for integer overflow vulnerability,thereby providing effective support to improve the sufficiency of the test. 展开更多
关键词 blockchain ethereum Smart Contracts(ESCs) integer overflow mutation testing
原文传递
AppendChain:一种面向区块链的高效键值存储系统
18
作者 王锦江 张晓 +5 位作者 苏琳萱 于锦阳 黄志杰 甘一伟 何赫烺 Michael Ngulube 《计算机研究与发展》 北大核心 2026年第3期668-684,共17页
现代区块链数据规模持续增长,节点存储压力不断上升。主流区块链系统通常采用基于LSMTree的键值存储引擎作为持久化层,其特性是通过合并操作维护键值在同一层级的有序性。然而,区块链数据具有显著的异构特征,包含大量结构不一与无序的... 现代区块链数据规模持续增长,节点存储压力不断上升。主流区块链系统通常采用基于LSMTree的键值存储引擎作为持久化层,其特性是通过合并操作维护键值在同一层级的有序性。然而,区块链数据具有显著的异构特征,包含大量结构不一与无序的键类型,使得存储引擎频繁触发合并操作,带来读写放大现象和I/O效率下降等问题。针对上述问题,提出了AppendChain,在不改变以太坊执行语义的前提下,重新组织数据在存储引擎中的写入路径与存储布局,实现3项优化:1)类型分离。将异构键类型划分至独立的列族,最小化键空间重叠。2)大值分离。将大值剥离到外部Blob文件存储,避免在合并过程中的重写。3)排序MPT。通过引入树结构感知、顺序对齐的键编码,增强状态键的局部性。AppendChain在Go-Ethereum(Geth)的基础上实现,并集成了RocksDB,修改了存储栈而未改变以太坊的共识与溯源功能。在主网工作负载上的实验评估表明,与Geth相比,AppendChain将存储引擎吞吐量(OPS)提升了28倍,将写放大率降低约为94.24%,将合并操作次数与耗时分别降低了98.75%与72.19%,在高吞吐量交易工作负载下显著提高了读写效率。该方案显著提升了区块链全节点的存储性能。 展开更多
关键词 区块链 以太坊 MPT LSM-Tree 键值存储引擎 存储优化
在线阅读 下载PDF
Demystifying Ethereum account diversity:observations,models and analysis 被引量:1
19
作者 Chaofan Wang Xiaohai Dai +4 位作者 Jiang Xiao Chenchen Li Ming Wen Bingbing Zhou Hai Jin 《Frontiers of Computer Science》 SCIE EI CSCD 2022年第4期119-130,共12页
Blockchain platform Ethereum has involved millions of accounts due to its strong potential for providing numerous services based on smart contracts.These massive accounts can be divided into diverse categories,such as... Blockchain platform Ethereum has involved millions of accounts due to its strong potential for providing numerous services based on smart contracts.These massive accounts can be divided into diverse categories,such as miners,tokens,and exchanges,which is termed as account diversity in this paper.The benefit of investigating diversity are multi-fold,including understanding the Ethereum ecosystem deeper and opening the possibility of tracking certain abnormal activities.Unfortunately,the exploration of blockchain account diversity remains scarce.Even the most relevant studies,which focus on the deanonymization of the accounts on Bitcoin,can hardly be applied on Ethereum since their underlying protocols and user idioms are different.To this end,we present the first attempt to demystify the account diversity on Ethereum.The key observation is that different accounts exhibit diverse behavior patterns,leading us to propose the heuristics for classification as the premise.We then raise the coverage rate of classification by the statistical learning model Maximum Likelihood Estimation(MLE).We collect real-world data through extensive efforts to evaluate our proposed method and show its effectiveness.Furthermore,we make an in-depth analysis of the dynamic evolution of the Ethereum ecosystem and uncover the abnormal arbitrage actions.As for the former,we validate two sweeping statements reliably:(1)standalone miners are gradually replaced by the mining pools and cooperative miners;(2)transactions related to the mining pool and exchanges take up a large share of the total transactions.The latter analysis shows that there are a large number of arbitrage transactions transferring the coins from one exchange to another to make a price difference. 展开更多
关键词 blockchain ethereum CLASSIFICATION account diversity network analysis
原文传递
Atomic Crosschain Transactions for Ethereum Private Sidechains 被引量:1
20
作者 Peter Robinson Raghavendra Ramesh Sandra Johnson 《Blockchain(Research and Applications)》 2022年第1期23-39,共17页
The Atomic Crosschain Transaction for Ethereum Private Sidechains protocol allows composable programming across permissioned Ethereum blockchains.It allows for inter-contract and inter-blockchain function calls that a... The Atomic Crosschain Transaction for Ethereum Private Sidechains protocol allows composable programming across permissioned Ethereum blockchains.It allows for inter-contract and inter-blockchain function calls that are both synchronous and atomic:if one part fails,the whole call tree of function calls is discarded.The protocol is not based on existing techniques such as Hash Time Locked Contracts,relay chains,block header transfer,or trusted intermediaries.It uses(a)threshold signatures to prove values across blockchains,(b)coordination contracts to manage the state of crosschain transactions,and(c)a function call tree commitment scheme to allow users to commit to a call tree and then later check that the correct function calls have been executed.This paper analyses the processing overhead of using this technique compared to using multiple standard non-atomic single blockchain transactions.The additional processing is analysed for four scenarios involving multiple blockchains:a Trade–Finance system,the Hotel–Train problem,a Supply Chain with Provenance,and an Oracle.The protocol is shown to have both safety and liveness properties. 展开更多
关键词 Crosschain Blockchain TRANSACTION ATOMIC ethereum
原文传递
上一页 1 2 14 下一页 到第
使用帮助 返回顶部