Description |
1 online resource (1 PDF (xxiv, 137 pages)) : illustrations (some color). |
Physical Medium |
polychrome |
Description |
text file |
Series |
Computer engineering foundations, currents, and trajectories collection
|
|
Computer engineering foundations, currents, and trajectories collection.
|
Bibliography |
Includes bibliographical references (pages 119-124) and index. |
Contents |
1. Introduction. 1.1. What are smart contracts? ; 1.2. A brief history of smart contracts ; 1.3. Uses of smart contracts ; 1.4. Where can smart contracts be used? ; 1.5. Major hacks ; 1.6. The need for secure smart contracts -- 2. The state of blockchain security. 2.1. Blockchain fundamentals ; 2.2. Blockchain environment security layers -- 3. Design choices, design flaws, and cryptoeconomics. 3.1. Design choices ; 3.2. Design flaws ; 3.3. Cryptoeconomics -- 4. Common security flaws. 4.1. Transactions on ethereum in depth ; 4.2. Integer overflows and underflows ; 4.3. Race conditions in ERC20 ; 4.4 Re-entrancy ; 4.5. Transaction-ordering dependence (TOD) and front running ; 4.6. Timestamp dependence ; 4.7. Denial-of-service: exceeding block gas limit ; 4.8. Denial-of-service: transaction revert ; 4.9. Attempts to generate random numbers ; 4.10. Ensuring contracts are called by humans ; 4.11. Zero initial balance assumption ; 4.12. Deprecated call stack depth attack ; 4.13. Library design flaws ; 4.14. Exception handling ; 4.15. Validated arguments and the ethereum short address attack -- 5. Writing secure smart contracts. 5.1. Engineering processes and standards; 5.2. Testing ; 5.3. Automated smart contract analysis with symbolic execution ; 5.4. Securify ; 5.5. Audits ; 5.6. Guidelines -- 6. Conclusion. 6.1. Security is a business strategy, not just a technical challenge ; 6.2. Applying an iterative approach to security ; 6.3. Security is a holistic problem that involves people, systems and processes ; 6.4. Building the world of programmable money together. |
Summary |
Smart contracts are an innovative application of blockchain technology. Acting as decentralized custodians of digital assets, they allow us to transfer value and information more effectively by reducing the need to trust a third party. By eliminating the need for intermediaries, smart contracts have the potential to massively scale the world economy and unleash the potential for faster and more effcient solutions than traditional systems could ever provide. But there's one catch: while blockchains are secure, smart contracts are not. Security vulnerabilities in smart contracts have led to over 250 million USD in value to be lost or stolen. For smart contract technology to achieve its full potential, these security vulnerabilities need to be addressed. Written by security experts at the forefront of this dynamic industry, this book teaches state-of-the-art smart contract security principles and practices. Help us secure the future of blockchain technology and join us at the forefront today. |
Local Note |
eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America |
Subject |
Blockchains (Databases)
|
|
Blockchains (Databases) |
|
Data encryption (Computer science)
|
|
Data encryption (Computer science) |
|
Electronic funds transfers.
|
|
Electronic funds transfers. |
Indexed Term |
Blockchain. |
|
Smart contracts. |
|
Smart contracts law. |
|
Security. |
|
Cybersecurity. |
|
DLT. |
|
Distributed ledger technology. |
|
Ethereum. |
|
Cryptocurrencies. |
|
Bitcoin. |
|
Fintech. |
|
Innovation. |
|
Decentralization. |
|
Blockchain programming. |
|
Blockchain applications. |
|
Solidity. |
|
Cryptography. |
Genre/Form |
Electronic books.
|
Added Author |
Gorzny, Jan, author.
|
|
Zulkoski, Edward, author.
|
|
Bak, Kacper, author.
|
|
Mack, Olga V., author.
|
|
Honda, Keisuke, writer of foreword.
|
Other Form: |
Print version: 9781949449365 |
ISBN |
1949449378 |
|
9781949449372 (electronic book) |
|
9781949449365 (print) |
|