Open in APP
Responsive image
A comprehensive survey of smart contract security: State of the art and research directions
【Abstract】 We introduce the background of Ethereum. Then, the security challenges faced by blockchain smart contracts are proposed. We summarize several types of smart contract security solutions related to the topic of smart contract security, with detailed descriptions and case studies of the current state of the art in terms of automatic auditing, subject matter experts, scalable smart contracts, smart contract templates, decompilers, semantic frameworks, and anomaly detection. Discuss the strengths and weaknesses of each type of solution. Future research directions are outlined. Future protocols in the digital society will be built on the foundation of smart contracts, which are code and algorithmic contracts. Smart contracts enable all phases of the contracting process without the need for outside parties by using protocols and user interfaces. But as blockchain technology has quickly advanced, many security flaws in smart contracts have also come to light. This article offers a thorough examination and organized summary of the pertinent material of smart contract security analysis. These sections make up the bulk of our survey’s contributions. First, a brief history of Ethereum is provided, followed by a proposal of the security difficulties now faced by blockchain smart contracts, with a focus on the analysis and classification of various security flaws. Second, based on a thorough examination of these studies, we present a summary of various smart contract security options, including case studies and detailed descriptions of the state-of-the-art in terms of automatic auditing, subject matter experts, scalable smart contracts, smart contract templates, decompilers, semantic frameworks, and anomaly detection. Finally, we go over each sort of solution’s advantages and disadvantages and outline potential future research trajectories.
【Author】 Guangfu Wu,HaiPing Wang,Xin Lai,Mengmeng Wang,Daojing He,Sammy Chan
【Journal】 Journal of Network and Computer Applications(IF:5.3) Time:2024-04-27
【DOI】 10.1016/j.jnca.2024.103882 [Quote]
【Link】 Article PDF
Comments    Read:1

微信打开×