Publications

Filter





















11 Publications found

A Simple Framework for Evaluating (Security Assumptions of) Consensus Algorithms

Found: 6/27/2019
Finder: Blockchaindex robot
Discussions about consensus algorithm cover a board range of topics. Prior to the emergence of blockchain, there had already been a substantial body of research on consensus algorithm in the area of distributed system and database. However, blockchain consensus poses significantly different requirements and one needs to exercise cautions if pitfalls in traditional consensus algorithm research are to be avoided. Actually not only blockchain puts unique constraints on consensus algorithm, I also see a significant difference in emphasis in researches presented in database conference and those in distributed systems. This is easy to understanding: different use cases naturally call for different designs.
Rating: 0 Views: 0 Comments: 0 Continue reading >

Smart Contract Security Class (No. 003)

Found: 6/3/2019
Finder: Blockchaindex robot
Citation: "In this class, we will use the two contracts from TRON-Eye to talk about the characteristics of the this.balance in smart contracts on TRON. At the same time, everyone is welcome to follow @tron official twitter, and submit your contract code. The following is the contract code from https://troneye.com (hereinafter referred to as TRON-Eye). TRON-Eye is a TRON verification platform from the community. The previous classes have introduced the TRON-Eye verification platform in detail. Figure 1 shows the contract for this issue, MileStoneAlpha (contract address: TVDPg45gS1UYi4GMhhcjsiVKTMBUveVDbM)."
Rating: 0 Views: 0 Comments: 0 Continue reading >

16 Solidity Hacks/Vulnerabilities, their Fixes and Real World Examples

Found: 5/30/2019
Finder: Blockchaindex robot
Citation: "Although in its infancy, Solidity has had widespread adoption and is used to compile the byte-code in many Ethereum smart contracts we see today. There have been a number of harsh lessons learned by developers and users alike in discovering the nuances of the language and the EVM. This post aims to be a relatively in-depth and up-to-date introductory post detailing the past mistakes that have been made by Solidity developers in an effort to prevent future devs from repeating history."
Rating: 0 Views: 1 Comments: 0 Continue reading >

How blockchain could prevent companies like Facebook from manipulating users

Found: 5/23/2019
Finder: Blockchaindex robot
Citation: "Technology products have changed the way we live, eat, interact, and commute. We shop through Amazon instead of going to physical stores. We order Uber or Lyft ride before leaving our home instead of trying our luck to get a taxi on the street. We use GrubHub to order delivery online. We make new friends through Tinder. We use Airbnb to find a place to stay when traveling. We search on Google when we have questions to ask."
Rating: 0 Views: 0 Comments: 0 Continue reading >

Role Based Access Control for the Ethereum Blockchain

Found: 5/23/2019
Finder: Blockchaindex robot
Citation: "Role Based Access Control is a security need for software systems that are designed to be accessed by hundreds of users. While this need is commonly implemented in enterprise software and operating systems, not much has been done for the Ethereum Blockchain. This article aims to show how we implemented Role Based Access Control in Solidity for the Ethereum Blockchain, and to teach you to build your own. We also have made our code public, please feel free to reuse it in any way or form."
Rating: 0 Views: 0 Comments: 0 Continue reading >

Programmable Custody: Key Management Gets Smart

Found: 5/23/2019
Finder: Blockchaindex robot
Citation: "Crypto wallets are secure, but the private keys we use to access them can be very difficult to keep safe. How might we design ways to keep our private keys protected? In part two of this series, we explore the concept of programmable custody and how it could revolutionize how we manage our private keys. If you haven’t already, read part one."
Rating: 0 Views: 0 Comments: 0 Continue reading >

An Analysis of Ontology Smart Contract Security and Loopholes — Part 1

Found: 5/22/2019
Finder: Blockchaindex robot
Citation: "Foreword: The security of smart contracts is one of the hottest topics in blockchain technology. All the existing smart contract systems have shown some types of loopholes, whether they are backed by the Ethereum Virtual Machine (EVM) or the EOS WASM Virtual Machine. These loopholes have caused huge losses for projects and users, and have called into question the security of blockchain technology."
Rating: 0 Views: 0 Comments: 0 Continue reading >

Komodo’s Delayed Proof of Work (dPoW) Security, Explained

Found: 5/21/2019
Finder: Blockchaindex robot
Citation: "t’s almost the end of 2018, and this year we have witnessed many 51% attacks (Double Spending attacks) on various Proof of Work (PoW) based blockchains. I remember the days of 2015–2016 when jl777 (James Lee) was working on the SuperNET code, programmed in the C language, in which James was both creating a Decentralized Exchange solution as well as learning the core internals of Bitcoin blockchain architecture by re-coding it himself. As he was learning and coding, he usually was sharing much innovative knowledge with the SuperNET community and pointing out the many shortcomings of Bitcoin, places where the code could be improved a lot more."
Rating: 0 Views: 0 Comments: 0 Continue reading >

A Zero-Knowledge Proof: Improving Privacy on a Blockchain

Found: 5/18/2019
Finder: Blockchaindex robot
Citation: "Using zero-knowledge proof, a blockchain transaction can be verified while maintaining user anonymity. Cryptography is one of the the most important components of the blockchain technology, which has become widely spread over the last few years. Here, we talk about a zero-knowledge proof (ZKP)—a mechanism/protocol that has a close connection to cryptography. You will learn about the general concepts of a ZKP and noninteractive zero-knowledge proof, see some use cases for employing the protocol within a blockchain, and get a dive into a ZKP from the perspective of cryptography."
Rating: 0 Views: 0 Comments: 0 Continue reading >

Securing a Blockchain with a Noninteractive Zero-Knowledge Proof

Found: 5/18/2019
Finder: Blockchaindex robot
Citation: "The concept (also known as zk-SNARK) enables transactions to be verified in a single message from a prover to a verifier—without interaction between them. In cryptography, a zero-knowledge proof (ZKP) is a method by which one party can prove to another party that they know value x, without conveying any information apart from the fact that they know value x. We have already written about the general concepts surrounding ZKP and noninteractive ZKP, as well as provided some use cases for employing the protocol within a blockchain."
Rating: 0 Views: 0 Comments: 0 Continue reading >