About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II

Research Article

Perturbing Smart Contract Execution Through the Underlying Runtime

Download(Requires a free EAI acccount)
3 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-63095-9_22,
        author={Pinchen Cui and David Umphress},
        title={Perturbing Smart Contract Execution Through the Underlying Runtime},
        proceedings={Security and Privacy in Communication Networks. 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II},
        proceedings_a={SECURECOMM PART 2},
        year={2020},
        month={12},
        keywords={Blockchain Hyperledger Docker Container Smart contract Security Man in the middle},
        doi={10.1007/978-3-030-63095-9_22}
    }
    
  • Pinchen Cui
    David Umphress
    Year: 2020
    Perturbing Smart Contract Execution Through the Underlying Runtime
    SECURECOMM PART 2
    Springer
    DOI: 10.1007/978-3-030-63095-9_22
Pinchen Cui1,*, David Umphress1
  • 1: Computer Science and Software Engineering, Auburn University, Auburn
*Contact email: pinchen@auburn.edu

Abstract

Because the smart contract is the core element that enables blockchain systems to perform diverse and intelligent operations, the security of smart contracts significantly determines the reliability and availability of the blockchain applications. This work examines security from the perspective that, although a smart contract may be programmatically correct, the environment in which the smart contract is carried out is vulnerable. Adversaries do not need to necessarily concern themselves with how a smart contract is programmed or whether it is vulnerable; the integrity of the smart contract can be undermined by perturbing the output of smart contract execution. Such an approach does not rely on exploiting programming errors or vulnerabilities in smart contract verification and protection frameworks. Instead, it leverages the flaws in the underlying smart contract lifecycle and virtualization mechanisms. The Hyperledger Fabric platform is used to demonstrate the feasibility of the proposed attack.

Keywords
Blockchain Hyperledger Docker Container Smart contract Security Man in the middle
Published
2020-12-12
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-63095-9_22
Copyright © 2020–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL