Article
Computer Science, Theory & Methods
Jianjun Huang, Songming Han, Wei You, Wenchang Shi, Bin Liang, Jingzheng Wu, Yanjun Wu
Summary: The study proposes contract bytecode-oriented normalization and slicing techniques to enhance bytecode matching, addressing two issues in smart contract vulnerability detection. Evaluations show the method's efficiency, effectiveness, and high precision.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2021)
Article
Computer Science, Theory & Methods
Stefano Bistarelli, Francesco Faloci, Paolo Mori
Summary: This paper presents a blockchain-based supply chain tracing system, which assists supply chain experts in creating tracing systems through graphical representation, smart contract generation, and web interface interaction.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2023)
Article
Business
David Petersen
Summary: This article integrates blockchain into current theory on the governance of interorganizational exchanges within business networks, and discusses the significance of blockchain governance and its substitution of traditional mechanisms. It also points out the direction for empirical verification and further theoretical research, as well as the implications of blockchain governance for practitioners.
INDUSTRIAL MARKETING MANAGEMENT
(2022)
Article
Computer Science, Theory & Methods
Nikolay Ivanov, Chenning Li, Qiben Yan, Zhiyuan Sun, Zhichao Cao, Xiapu Luo
Summary: This survey develops a comprehensive taxonomy of smart contract threat mitigation solutions and classifies 133 existing solutions using this taxonomy. The study also shows how these solutions work, creates a coverage map of known smart contract vulnerabilities, and performs an evidence-based evolutionary analysis to identify trends, future perspectives, and major weaknesses of existing methodologies in threat mitigation.
ACM COMPUTING SURVEYS
(2023)
Article
Computer Science, Information Systems
Abir El Azzaoui, Sekione Reward Jeremiah, Neal N. Xiong, Jong Hyuk Park
Summary: The Internet of Vehicle (IoV) is an emerging technology that aims to revolutionize smart transportation in future smart cities. It utilizes advanced information and communication technologies to improve traffic management, reduce congestion, enhance safety, and maximize the efficiency of transport networks. However, the high carbon emissions from the transportation system pose a challenge, and electric vehicles alone are not a sustainable solution. This paper proposes a decentralized trust management solution for IoV systems to address these challenges and reduce both carbon footprint and computational power requirements.
INFORMATION SCIENCES
(2023)
Article
Computer Science, Information Systems
Keunok Kim, Jihyeon Ryu, Hakjun Lee, Youngsook Lee, Dongho Won
Summary: A distributed and federated authentication scheme using smart contracts is proposed to overcome the issue of a single point of failure. It also introduces an updatable smart contract to address programming bugs, add functionality, or modify business logic. This scheme provides protection against security threats, such as single point of failure, user impersonation attacks, and user anonymity, and exhibits a performance improvement of 71% compared to other related schemes.
Article
Computer Science, Information Systems
E. Chen, Bohan Qin, Yan Zhu, Weijing Song, Shengdian Wang, Cheng-Chung William Chu, Stephen S. Yau
Summary: In recent years, advanced smart contract languages (ASCLs) have been proposed to address the difficulties in writing smart legal contracts across different fields. However, the lack of effective conversion methods from ASCLs to executable smart contract programs hinders their practicality. This study takes SPESC as an example and explores the design of conversion rules to translate contracts into Solidity, proposing a three-layer smart contract framework. The results demonstrate the efficiency and security of the conversion process, simplifying contract writing and verifying program correctness.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
Ruiyun Yu, Ann Move Oguti, Dennis Reagan Ochora, Shuchen Li
Summary: Mobile Crowdsensing utilizes the power of crowds and the sensing capabilities of smart mobile devices to collect location-specific data values in exchange for rewards. By applying blockchain technology, the system ensures privacy protection, data quality, and low service fee. The proposed protocol leverages smart contracts to achieve privacy-preserving data aggregation and quality assessment on the public blockchain.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Fausto Spoto, Sara Migliorini, Mauro Gambini, Andrea Benini
Summary: This paper discusses the security risks associated with using generics in writing smart contracts for the Hotmoka blockchain. It reports a specific security issue related to stealing the remuneration of validator nodes and proposes a patch based on code rewriting. The weak types introduced by the use of generics pose a risk of attack in permissionless blockchains.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Software Engineering
Yibo Wang, Kai Li, Yuzhe Tang, Jiaqi Chen, Qi Zhang, Xiapu Luo, Ting Chen
Summary: This paper presents IBATCH, a middleware system that enables secure batching of smart-contract invocations against an untrusted relay server off-chain. It supports different batching policies and can be configured adaptively to current workloads. IBATCH also automatically integrates with legacy applications and supports large-scale deployment. Evaluation shows that IBATCH saves gas and Ether costs per invocation with moderate delay.
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
(2023)
Article
Computer Science, Software Engineering
Zhaoxuan Li, Siqi Lu, Rui Zhang, Ziming Zhao, Rujin Liang, Rui Xue, Wenhao Li, Fan Zhang, Sheng Gao
Summary: In this study, the authors propose VulHunter, a method for detecting vulnerabilities in smart contracts. By traversing the Control Flow Graph built from contract opcodes, VulHunter extracts instances and uses hybrid attention and multi-instance learning mechanisms to reason the instance labels and automatically capture features of both normal and defective contracts. The results show that VulHunter outperforms state-of-the-art methods in terms of accuracy, efficiency, and robustness. It also offers customizable features to meet different user requirements.
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
(2023)
Review
Computer Science, Artificial Intelligence
Valeria Merlo, Gianvito Pio, Francesco Giusto, Massimo Bilancia
Summary: This paper presents a systematic review of the adoption of blockchain technology in healthcare. The analysis highlights that current research activities mainly focus on data security and electronic health records, while areas such as IoT and automated diagnosis systems remain relatively unexplored.
EXPERT SYSTEMS WITH APPLICATIONS
(2023)
Article
Computer Science, Information Systems
J. J. Lohith, Anusree K. Manoj, Guru P. Nanma, Pooja Srinivasan
Summary: Smart contracts are instructions or programs stored on the blockchain that run when certain conditions are met. This paper aims to classify vulnerabilities in Ethereum smart contracts using machine learning and feature extraction. A dataset was constructed using pixel values and trigram feature extraction. Various machine learning methods, including Naive Bayes, were trained on this dataset. The Naive Bayes model outperformed other models, achieving high F1-scores.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Zigui Jiang, Zibin Zheng, Kai Chen, Xiapu Luo, Xiuwen Tang, Yin Li
Summary: Since the development of Blockchain 2.0, smart contracts have become crucial in the blockchain system. However, inaccurate or non-standard coding and settings may result in security vulnerabilities, increased expenses, and wasted computing resources. To address these issues and assist users in creating or utilizing smart contracts more efficiently, a recommendation framework is proposed, treating smart contracts as a specialized form of software service. Real-world datasets from Ethereum and EOSIO are used for evaluation, and the results demonstrate the feasibility of smart contract recommendation. These datasets are also made publicly available for further research on smart contract recommendation.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2023)
Article
Business
Olivier Meier, Aurelie Sannajust
Summary: This paper examines the concept of the holdup problem from an entrepreneurial angle in a world with smart contracts, discussing the need for entrepreneurs to carefully consider the use of smart contracts in dealing with incomplete contracts. While blockchain and smart contracts are believed to provide a solution to the holdup problem, entrepreneurs must evaluate the suitability of smart contracts based on the type of transactions they intend to carry out.
SMALL BUSINESS ECONOMICS
(2021)