Fundamentals of smart contract security /:
Smart contracts are an innovative application of blockchain technology. Acting as decentralized custodians of digital assets, they allow us to transfer value and information more effectively by reducing the need to trust a third party. By eliminating the need for intermediaries, smart contracts have...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, New York (222 East 46th Street, New York, NY 10017) :
Momentum Press,
2019.
|
Schriftenreihe: | Computer engineering foundations, currents, and trajectories collection.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Smart contracts are an innovative application of blockchain technology. Acting as decentralized custodians of digital assets, they allow us to transfer value and information more effectively by reducing the need to trust a third party. By eliminating the need for intermediaries, smart contracts have the potential to massively scale the world economy and unleash the potential for faster and more effcient solutions than traditional systems could ever provide. But there's one catch: while blockchains are secure, smart contracts are not. Security vulnerabilities in smart contracts have led to over 250 million USD in value to be lost or stolen. For smart contract technology to achieve its full potential, these security vulnerabilities need to be addressed. Written by security experts at the forefront of this dynamic industry, this book teaches state-of-the-art smart contract security principles and practices. Help us secure the future of blockchain technology and join us at the forefront today. |
Beschreibung: | 1 online resource (1 PDF (xxiv, 137 pages)) : illustrations (some color) |
Bibliographie: | Includes bibliographical references (pages 119-124) and index. |
ISBN: | 1949449378 9781949449372 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBU-on1102625314 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m eo d | ||
007 | cr cn||||m|||a | ||
008 | 190417s2019 nyua fob 001 0 eng d | ||
040 | |a NYMPP |b eng |e rda |c NYMPP |d YDX |d OCLCF |d OCLCQ |d OCLCO |d N$T |d OCLCO |d OCLCQ |d OCLCA |d OCLCO |d OCLCQ | ||
020 | |a 1949449378 | ||
020 | |a 9781949449372 |q (electronic bk.) | ||
020 | |z 9781949449365 |q (print) | ||
035 | |a (OCoLC)1102625314 | ||
050 | 4 | |a HG1710 |b .M37 2019eb | |
082 | 7 | |a 332.178 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Ma, Richard, |e author. | |
245 | 1 | 0 | |a Fundamentals of smart contract security / |c Richard Ma, Jan Gorzny, Edward Zulkoski, Kacper Bak, and Olga V. Mack ; foreword by Keisuke Honda. |
264 | 1 | |a New York, New York (222 East 46th Street, New York, NY 10017) : |b Momentum Press, |c 2019. | |
300 | |a 1 online resource (1 PDF (xxiv, 137 pages)) : |b illustrations (some color) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 isbdmedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Computer engineering foundations, currents, and trajectories collection | |
504 | |a Includes bibliographical references (pages 119-124) and index. | ||
505 | 0 | |a 1. Introduction. 1.1. What are smart contracts? ; 1.2. A brief history of smart contracts ; 1.3. Uses of smart contracts ; 1.4. Where can smart contracts be used? ; 1.5. Major hacks ; 1.6. The need for secure smart contracts -- 2. The state of blockchain security. 2.1. Blockchain fundamentals ; 2.2. Blockchain environment security layers -- 3. Design choices, design flaws, and cryptoeconomics. 3.1. Design choices ; 3.2. Design flaws ; 3.3. Cryptoeconomics -- 4. Common security flaws. 4.1. Transactions on ethereum in depth ; 4.2. Integer overflows and underflows ; 4.3. Race conditions in ERC20 ; 4.4 Re-entrancy ; 4.5. Transaction-ordering dependence (TOD) and front running ; 4.6. Timestamp dependence ; 4.7. Denial-of-service: exceeding block gas limit ; 4.8. Denial-of-service: transaction revert ; 4.9. Attempts to generate random numbers ; 4.10. Ensuring contracts are called by humans ; 4.11. Zero initial balance assumption ; 4.12. Deprecated call stack depth attack ; 4.13. Library design flaws ; 4.14. Exception handling ; 4.15. Validated arguments and the ethereum short address attack -- 5. Writing secure smart contracts. 5.1. Engineering processes and standards; 5.2. Testing ; 5.3. Automated smart contract analysis with symbolic execution ; 5.4. Securify ; 5.5. Audits ; 5.6. Guidelines -- 6. Conclusion. 6.1. Security is a business strategy, not just a technical challenge ; 6.2. Applying an iterative approach to security ; 6.3. Security is a holistic problem that involves people, systems and processes ; 6.4. Building the world of programmable money together. | |
520 | 3 | |a Smart contracts are an innovative application of blockchain technology. Acting as decentralized custodians of digital assets, they allow us to transfer value and information more effectively by reducing the need to trust a third party. By eliminating the need for intermediaries, smart contracts have the potential to massively scale the world economy and unleash the potential for faster and more effcient solutions than traditional systems could ever provide. But there's one catch: while blockchains are secure, smart contracts are not. Security vulnerabilities in smart contracts have led to over 250 million USD in value to be lost or stolen. For smart contract technology to achieve its full potential, these security vulnerabilities need to be addressed. Written by security experts at the forefront of this dynamic industry, this book teaches state-of-the-art smart contract security principles and practices. Help us secure the future of blockchain technology and join us at the forefront today. | |
588 | 0 | |a PDF viewed 05/28/2019. | |
650 | 0 | |a Blockchains (Databases) |0 http://id.loc.gov/authorities/subjects/sh2016002790 | |
650 | 0 | |a Data encryption (Computer science) |0 http://id.loc.gov/authorities/subjects/sh94001524 | |
650 | 0 | |a Electronic funds transfers. |0 http://id.loc.gov/authorities/subjects/sh85042329 | |
650 | 6 | |a Chaînes de blocs. | |
650 | 6 | |a Chiffrement (Informatique) | |
650 | 6 | |a Transferts électroniques de fonds. | |
650 | 7 | |a Blockchains (Databases) |2 fast | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
650 | 7 | |a Electronic funds transfers |2 fast | |
653 | |a Blockchain. | ||
653 | |a Smart contracts. | ||
653 | |a Smart contracts law. | ||
653 | |a Security. | ||
653 | |a Cybersecurity. | ||
653 | |a DLT. | ||
653 | |a Distributed ledger technology. | ||
653 | |a Ethereum. | ||
653 | |a Cryptocurrencies. | ||
653 | |a Bitcoin. | ||
653 | |a Fintech. | ||
653 | |a Innovation. | ||
653 | |a Decentralization. | ||
653 | |a Blockchain programming. | ||
653 | |a Blockchain applications. | ||
653 | |a Solidity. | ||
653 | |a Cryptography. | ||
700 | 1 | |a Gorzny, Jan, |e author. | |
700 | 1 | |a Zulkoski, Edward, |e author. | |
700 | 1 | |a Bak, Kacper, |e author. | |
700 | 1 | |a Mack, Olga V., |e author. | |
700 | 1 | |a Honda, Keisuke, |e writer of foreword. | |
776 | 0 | 8 | |i Print version: |z 9781949449365 |
830 | 0 | |a Computer engineering foundations, currents, and trajectories collection. | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBU |q FWS_PDA_EBU |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2145748 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a Momentum Press |b NYMP |n 9781949449372 | ||
938 | |a YBP Library Services |b YANK |n 300568961 | ||
938 | |a EBSCOhost |b EBSC |n 2145748 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBU | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBU-on1102625314 |
---|---|
_version_ | 1816796934240731136 |
adam_text | |
any_adam_object | |
author | Ma, Richard Gorzny, Jan Zulkoski, Edward Bak, Kacper Mack, Olga V. |
author_facet | Ma, Richard Gorzny, Jan Zulkoski, Edward Bak, Kacper Mack, Olga V. |
author_role | aut aut aut aut aut |
author_sort | Ma, Richard |
author_variant | r m rm j g jg e z ez k b kb o v m ov ovm |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HG1710 |
callnumber-raw | HG1710 .M37 2019eb |
callnumber-search | HG1710 .M37 2019eb |
callnumber-sort | HG 41710 M37 42019EB |
callnumber-subject | HG - Finance |
collection | ZDB-4-EBU |
contents | 1. Introduction. 1.1. What are smart contracts? ; 1.2. A brief history of smart contracts ; 1.3. Uses of smart contracts ; 1.4. Where can smart contracts be used? ; 1.5. Major hacks ; 1.6. The need for secure smart contracts -- 2. The state of blockchain security. 2.1. Blockchain fundamentals ; 2.2. Blockchain environment security layers -- 3. Design choices, design flaws, and cryptoeconomics. 3.1. Design choices ; 3.2. Design flaws ; 3.3. Cryptoeconomics -- 4. Common security flaws. 4.1. Transactions on ethereum in depth ; 4.2. Integer overflows and underflows ; 4.3. Race conditions in ERC20 ; 4.4 Re-entrancy ; 4.5. Transaction-ordering dependence (TOD) and front running ; 4.6. Timestamp dependence ; 4.7. Denial-of-service: exceeding block gas limit ; 4.8. Denial-of-service: transaction revert ; 4.9. Attempts to generate random numbers ; 4.10. Ensuring contracts are called by humans ; 4.11. Zero initial balance assumption ; 4.12. Deprecated call stack depth attack ; 4.13. Library design flaws ; 4.14. Exception handling ; 4.15. Validated arguments and the ethereum short address attack -- 5. Writing secure smart contracts. 5.1. Engineering processes and standards; 5.2. Testing ; 5.3. Automated smart contract analysis with symbolic execution ; 5.4. Securify ; 5.5. Audits ; 5.6. Guidelines -- 6. Conclusion. 6.1. Security is a business strategy, not just a technical challenge ; 6.2. Applying an iterative approach to security ; 6.3. Security is a holistic problem that involves people, systems and processes ; 6.4. Building the world of programmable money together. |
ctrlnum | (OCoLC)1102625314 |
dewey-full | 332.178 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 332 - Financial economics |
dewey-raw | 332.178 |
dewey-search | 332.178 |
dewey-sort | 3332.178 |
dewey-tens | 330 - Economics |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05641cam a2200805 i 4500</leader><controlfield tag="001">ZDB-4-EBU-on1102625314</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr cn||||m|||a</controlfield><controlfield tag="008">190417s2019 nyua fob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NYMPP</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NYMPP</subfield><subfield code="d">YDX</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1949449378</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781949449372</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781949449365</subfield><subfield code="q">(print)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1102625314</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HG1710</subfield><subfield code="b">.M37 2019eb</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">332.178</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ma, Richard,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fundamentals of smart contract security /</subfield><subfield code="c">Richard Ma, Jan Gorzny, Edward Zulkoski, Kacper Bak, and Olga V. Mack ; foreword by Keisuke Honda.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, New York (222 East 46th Street, New York, NY 10017) :</subfield><subfield code="b">Momentum Press,</subfield><subfield code="c">2019.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 PDF (xxiv, 137 pages)) :</subfield><subfield code="b">illustrations (some color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Computer engineering foundations, currents, and trajectories collection</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 119-124) and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">1. Introduction. 1.1. What are smart contracts? ; 1.2. A brief history of smart contracts ; 1.3. Uses of smart contracts ; 1.4. Where can smart contracts be used? ; 1.5. Major hacks ; 1.6. The need for secure smart contracts -- 2. The state of blockchain security. 2.1. Blockchain fundamentals ; 2.2. Blockchain environment security layers -- 3. Design choices, design flaws, and cryptoeconomics. 3.1. Design choices ; 3.2. Design flaws ; 3.3. Cryptoeconomics -- 4. Common security flaws. 4.1. Transactions on ethereum in depth ; 4.2. Integer overflows and underflows ; 4.3. Race conditions in ERC20 ; 4.4 Re-entrancy ; 4.5. Transaction-ordering dependence (TOD) and front running ; 4.6. Timestamp dependence ; 4.7. Denial-of-service: exceeding block gas limit ; 4.8. Denial-of-service: transaction revert ; 4.9. Attempts to generate random numbers ; 4.10. Ensuring contracts are called by humans ; 4.11. Zero initial balance assumption ; 4.12. Deprecated call stack depth attack ; 4.13. Library design flaws ; 4.14. Exception handling ; 4.15. Validated arguments and the ethereum short address attack -- 5. Writing secure smart contracts. 5.1. Engineering processes and standards; 5.2. Testing ; 5.3. Automated smart contract analysis with symbolic execution ; 5.4. Securify ; 5.5. Audits ; 5.6. Guidelines -- 6. Conclusion. 6.1. Security is a business strategy, not just a technical challenge ; 6.2. Applying an iterative approach to security ; 6.3. Security is a holistic problem that involves people, systems and processes ; 6.4. Building the world of programmable money together.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Smart contracts are an innovative application of blockchain technology. Acting as decentralized custodians of digital assets, they allow us to transfer value and information more effectively by reducing the need to trust a third party. By eliminating the need for intermediaries, smart contracts have the potential to massively scale the world economy and unleash the potential for faster and more effcient solutions than traditional systems could ever provide. But there's one catch: while blockchains are secure, smart contracts are not. Security vulnerabilities in smart contracts have led to over 250 million USD in value to be lost or stolen. For smart contract technology to achieve its full potential, these security vulnerabilities need to be addressed. Written by security experts at the forefront of this dynamic industry, this book teaches state-of-the-art smart contract security principles and practices. Help us secure the future of blockchain technology and join us at the forefront today.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">PDF viewed 05/28/2019.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Blockchains (Databases)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2016002790</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001524</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic funds transfers.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85042329</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Chaînes de blocs.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Transferts électroniques de fonds.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Blockchains (Databases)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic funds transfers</subfield><subfield code="2">fast</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Blockchain.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Smart contracts.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Smart contracts law.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">DLT.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Distributed ledger technology.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Ethereum.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cryptocurrencies.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Bitcoin.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Fintech.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Innovation.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Decentralization.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Blockchain programming.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Blockchain applications.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Solidity.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cryptography.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gorzny, Jan,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zulkoski, Edward,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bak, Kacper,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mack, Olga V.,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Honda, Keisuke,</subfield><subfield code="e">writer of foreword.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">9781949449365</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Computer engineering foundations, currents, and trajectories collection.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBU</subfield><subfield code="q">FWS_PDA_EBU</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2145748</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Momentum Press</subfield><subfield code="b">NYMP</subfield><subfield code="n">9781949449372</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">300568961</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2145748</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBU-on1102625314 |
illustrated | Illustrated |
indexdate | 2024-11-26T14:49:34Z |
institution | BVB |
isbn | 1949449378 9781949449372 |
language | English |
oclc_num | 1102625314 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (1 PDF (xxiv, 137 pages)) : illustrations (some color) |
psigel | ZDB-4-EBU |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Momentum Press, |
record_format | marc |
series | Computer engineering foundations, currents, and trajectories collection. |
series2 | Computer engineering foundations, currents, and trajectories collection |
spelling | Ma, Richard, author. Fundamentals of smart contract security / Richard Ma, Jan Gorzny, Edward Zulkoski, Kacper Bak, and Olga V. Mack ; foreword by Keisuke Honda. New York, New York (222 East 46th Street, New York, NY 10017) : Momentum Press, 2019. 1 online resource (1 PDF (xxiv, 137 pages)) : illustrations (some color) text txt rdacontent computer c isbdmedia online resource cr rdacarrier Computer engineering foundations, currents, and trajectories collection Includes bibliographical references (pages 119-124) and index. 1. Introduction. 1.1. What are smart contracts? ; 1.2. A brief history of smart contracts ; 1.3. Uses of smart contracts ; 1.4. Where can smart contracts be used? ; 1.5. Major hacks ; 1.6. The need for secure smart contracts -- 2. The state of blockchain security. 2.1. Blockchain fundamentals ; 2.2. Blockchain environment security layers -- 3. Design choices, design flaws, and cryptoeconomics. 3.1. Design choices ; 3.2. Design flaws ; 3.3. Cryptoeconomics -- 4. Common security flaws. 4.1. Transactions on ethereum in depth ; 4.2. Integer overflows and underflows ; 4.3. Race conditions in ERC20 ; 4.4 Re-entrancy ; 4.5. Transaction-ordering dependence (TOD) and front running ; 4.6. Timestamp dependence ; 4.7. Denial-of-service: exceeding block gas limit ; 4.8. Denial-of-service: transaction revert ; 4.9. Attempts to generate random numbers ; 4.10. Ensuring contracts are called by humans ; 4.11. Zero initial balance assumption ; 4.12. Deprecated call stack depth attack ; 4.13. Library design flaws ; 4.14. Exception handling ; 4.15. Validated arguments and the ethereum short address attack -- 5. Writing secure smart contracts. 5.1. Engineering processes and standards; 5.2. Testing ; 5.3. Automated smart contract analysis with symbolic execution ; 5.4. Securify ; 5.5. Audits ; 5.6. Guidelines -- 6. Conclusion. 6.1. Security is a business strategy, not just a technical challenge ; 6.2. Applying an iterative approach to security ; 6.3. Security is a holistic problem that involves people, systems and processes ; 6.4. Building the world of programmable money together. Smart contracts are an innovative application of blockchain technology. Acting as decentralized custodians of digital assets, they allow us to transfer value and information more effectively by reducing the need to trust a third party. By eliminating the need for intermediaries, smart contracts have the potential to massively scale the world economy and unleash the potential for faster and more effcient solutions than traditional systems could ever provide. But there's one catch: while blockchains are secure, smart contracts are not. Security vulnerabilities in smart contracts have led to over 250 million USD in value to be lost or stolen. For smart contract technology to achieve its full potential, these security vulnerabilities need to be addressed. Written by security experts at the forefront of this dynamic industry, this book teaches state-of-the-art smart contract security principles and practices. Help us secure the future of blockchain technology and join us at the forefront today. PDF viewed 05/28/2019. Blockchains (Databases) http://id.loc.gov/authorities/subjects/sh2016002790 Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Electronic funds transfers. http://id.loc.gov/authorities/subjects/sh85042329 Chaînes de blocs. Chiffrement (Informatique) Transferts électroniques de fonds. Blockchains (Databases) fast Data encryption (Computer science) fast Electronic funds transfers fast Blockchain. Smart contracts. Smart contracts law. Security. Cybersecurity. DLT. Distributed ledger technology. Ethereum. Cryptocurrencies. Bitcoin. Fintech. Innovation. Decentralization. Blockchain programming. Blockchain applications. Solidity. Cryptography. Gorzny, Jan, author. Zulkoski, Edward, author. Bak, Kacper, author. Mack, Olga V., author. Honda, Keisuke, writer of foreword. Print version: 9781949449365 Computer engineering foundations, currents, and trajectories collection. FWS01 ZDB-4-EBU FWS_PDA_EBU https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2145748 Volltext |
spellingShingle | Ma, Richard Gorzny, Jan Zulkoski, Edward Bak, Kacper Mack, Olga V. Fundamentals of smart contract security / Computer engineering foundations, currents, and trajectories collection. 1. Introduction. 1.1. What are smart contracts? ; 1.2. A brief history of smart contracts ; 1.3. Uses of smart contracts ; 1.4. Where can smart contracts be used? ; 1.5. Major hacks ; 1.6. The need for secure smart contracts -- 2. The state of blockchain security. 2.1. Blockchain fundamentals ; 2.2. Blockchain environment security layers -- 3. Design choices, design flaws, and cryptoeconomics. 3.1. Design choices ; 3.2. Design flaws ; 3.3. Cryptoeconomics -- 4. Common security flaws. 4.1. Transactions on ethereum in depth ; 4.2. Integer overflows and underflows ; 4.3. Race conditions in ERC20 ; 4.4 Re-entrancy ; 4.5. Transaction-ordering dependence (TOD) and front running ; 4.6. Timestamp dependence ; 4.7. Denial-of-service: exceeding block gas limit ; 4.8. Denial-of-service: transaction revert ; 4.9. Attempts to generate random numbers ; 4.10. Ensuring contracts are called by humans ; 4.11. Zero initial balance assumption ; 4.12. Deprecated call stack depth attack ; 4.13. Library design flaws ; 4.14. Exception handling ; 4.15. Validated arguments and the ethereum short address attack -- 5. Writing secure smart contracts. 5.1. Engineering processes and standards; 5.2. Testing ; 5.3. Automated smart contract analysis with symbolic execution ; 5.4. Securify ; 5.5. Audits ; 5.6. Guidelines -- 6. Conclusion. 6.1. Security is a business strategy, not just a technical challenge ; 6.2. Applying an iterative approach to security ; 6.3. Security is a holistic problem that involves people, systems and processes ; 6.4. Building the world of programmable money together. Blockchains (Databases) http://id.loc.gov/authorities/subjects/sh2016002790 Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Electronic funds transfers. http://id.loc.gov/authorities/subjects/sh85042329 Chaînes de blocs. Chiffrement (Informatique) Transferts électroniques de fonds. Blockchains (Databases) fast Data encryption (Computer science) fast Electronic funds transfers fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2016002790 http://id.loc.gov/authorities/subjects/sh94001524 http://id.loc.gov/authorities/subjects/sh85042329 |
title | Fundamentals of smart contract security / |
title_auth | Fundamentals of smart contract security / |
title_exact_search | Fundamentals of smart contract security / |
title_full | Fundamentals of smart contract security / Richard Ma, Jan Gorzny, Edward Zulkoski, Kacper Bak, and Olga V. Mack ; foreword by Keisuke Honda. |
title_fullStr | Fundamentals of smart contract security / Richard Ma, Jan Gorzny, Edward Zulkoski, Kacper Bak, and Olga V. Mack ; foreword by Keisuke Honda. |
title_full_unstemmed | Fundamentals of smart contract security / Richard Ma, Jan Gorzny, Edward Zulkoski, Kacper Bak, and Olga V. Mack ; foreword by Keisuke Honda. |
title_short | Fundamentals of smart contract security / |
title_sort | fundamentals of smart contract security |
topic | Blockchains (Databases) http://id.loc.gov/authorities/subjects/sh2016002790 Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Electronic funds transfers. http://id.loc.gov/authorities/subjects/sh85042329 Chaînes de blocs. Chiffrement (Informatique) Transferts électroniques de fonds. Blockchains (Databases) fast Data encryption (Computer science) fast Electronic funds transfers fast |
topic_facet | Blockchains (Databases) Data encryption (Computer science) Electronic funds transfers. Chaînes de blocs. Chiffrement (Informatique) Transferts électroniques de fonds. Electronic funds transfers |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2145748 |
work_keys_str_mv | AT marichard fundamentalsofsmartcontractsecurity AT gorznyjan fundamentalsofsmartcontractsecurity AT zulkoskiedward fundamentalsofsmartcontractsecurity AT bakkacper fundamentalsofsmartcontractsecurity AT mackolgav fundamentalsofsmartcontractsecurity AT hondakeisuke fundamentalsofsmartcontractsecurity |