Downloads: 128 | Views: 404 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Computer Science & Engineering | India | Volume 9 Issue 8, August 2020 | Popularity: 6.4 / 10
Efficient Methods to Avoid Smart Contract Vulnerabilities Using Block Chain
B. Ratnakanth, M. Sahiti, Dr. K. Venkata Ramana
Abstract: Ethereum smart contracts are programs which will run inside public distributed network called block chain. These smart contracts are used to perform operation over ether i. e transfer, receiving across the blockchain, by public to manage their accounts. These smart contracts are immutable once deployed on blockchain. So, developers need to make sure that smart contracts are bug- free at the time of deployment. As we are developing supply chain management (SCM) for textile industry project, to protect the project from smart contract vulnerabilities. In this paper we have analyzed the Decentralized Autonomous organization i. e DAO attack, which takes the advantage of smart contract vulnerability. Some functions are exposed to access by external contracts. The attacker makes use of vulnerability in smart contract and he can implement code to recursively call the function to transfer the funds in to his own account. And also we analyzed Reentrancy attack, which also used by attacker to recursively call the contract to multiple transfers of funds to his own account. And finally we analyzed Underflow attack, which make use of vulnerability in smart contract while transferring ethers between the users without considering limitations of integers values i. e uint8, uint16 etc.
Keywords: attacks, blockchain, smart contract, supply chain management
Edition: Volume 9 Issue 8, August 2020
Pages: 600 - 606
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 629 - 634A Face Spoof Detection using Feature Extraction and SVM
Lovely Pal, Renuka Singh
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, United States of America, Volume 12 Issue 11, November 2023
Pages: 998 - 1004AI-Infused Threat Detection and Incident Response in Cloud Security
Sumanth Tatineni
Downloads: 2
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 12, December 2021
Pages: 1257 - 1264Digital Image Watermarking Technique Using Discrete Wavelet Transform and Discrete Cosine Transform
Bhupendra Ram