Lecture 10. A2 - will post tonight - due in two weeks
|
|
- Jared Tucker
- 5 years ago
- Views:
Transcription
1 Lecture 10 A2 - will post tonight - due in two weeks The DAO - $72M USD in Ether Decentralized Dragon's Den or Shark's Tank A pot of money that you could contribute to and receive voting shares for You vote on funding projects The attack happened but the stolen funds sat quarantined for 30 days This means the stolen funds were not circulated and so a roll back was possible Ethereum project put in a special block that destructed the DAO contract and refunded everyone's money but the block is invalid --- so need consensus of the network to make an exception and accept it Most went with undoing the DAO attack and this chain is called Ethereum Some objected and did not undo the attack --- their chain is called Ethereum Classic Today ETC trades at about 10% the value of Ether The bug: reentrance / recursive calls Back to Ethereum External accounts - works like Bitcoin Contract accounts - running smart contracts; work by your design Alice and Bob want to use Ethereum like Bitcoin Use external accounts Alice pays Bob How does Bob know he was paid? Consulting the blockchain Automated by his client He sits down at a new paper, parse the whole blockchain to figure out transaction history Use a contract as a wallet with more features Can log all transactions in the state Can notify the use of transactions Can use multi-signatures or fancy access structures Ethereum client has one built in called a wallet and it is exposed in the UI
2 Alice pays Bob Alice pays to Bob's wallet smart contract Bob's wallet only runs if someone calls a function on it No code runs by itself on Ethereum IDEA! What if when you transfer money to a smart contract, that contract is allowed to run some code at that point? Issue 1: Which function in the smart contract will run when it receives money? Convention that it will run a special function with a special name What was the name? No name (empty string) function() payable { Fallback function Payable enables it to receive money when called Fallback function is also called if the function that is called cannot be found Issue 2: Gas Who pays for the fallback function to run? Recall the fallback in Contract B is being triggered by Contract A sending money to the address of Contract B (for whatever reason). Someone is paying for Contract A to run this function; why should they pay for Contract B as well? Paying contract pays the gas but can set a gas limit when it transfers the money If it runs out of gas (or fails for other reasons), an exception is thrown and/or the transfer function returns a boolean of false address.send(10) -> send 10 wei to address -> if error, it will return false, fallback function that is invoked is limited to 2300 gas address.transfer(10) -> same as send but throws an exception instead, fallback function that is invoked is limited to 2300 gas address.call.value(10)() -> old school way of sending money, returns false, uses whatever gas is available from the calling function address.send(10) = address.call.gas(0).value(10)() address.transfer.gas(120000)(10) -> run transfer with more gas Issue 3: code flow control When you transfer money to an address and the address is a contract,
3 you are turning control over to someone else's code that might be malicious and can do whatever it wants (within the gas you give it) // contract Victim { mapping (address => uint) userbalances; if (msg.sender.call.value(userbalances[msg.sender])()) { function() payable { userbalances[msg.sender] += msg.value; Contract contains a list of users and their "balances" in ledger as the data structure, and it also contains Ether (attached to the address) For example, contract might hold 10 Ether and have: A_address 5 B_address 3 C_address 2 D_address 0 Alice calls withdraw. She does it from an account. msg.sender will be her account Withdraw finds the balance of her account (5), as stored in userbalances, and transfers her that amount of money (5). **** If it succeeds, her balance is made to be 0. If it does not, the balance does not update. During **** Alice gets to run her fallback function
4 if (msg.sender.call.value(userbalances[msg.sender])()) { Alice's fallback function: What if Alice in her fallback function calls withdraw again? if (msg.sender.call.value(userbalances[msg.sender])()) // if (alice.call.value(5)())... // if (alice.call.value(5)() -> Alice's fallback) // if ( Alice's fallback ) // if ( withdraw ) // if ( if (alice.call.value(5)()) ) // if ( if ( if ( if ())))
5 Example of fallback function contract Attacker { Victim v; function Attacker(address dest) { v = Victim(dest); function attack() { v.call.value(msg.value)(); v.withdraw(); function() payable { if (msg.gas > ) { v.withdraw(); Mitigations: 3 approaches (not mutually exclusive) 1) Don't use call to send money, use transfer or send --> fallback function still runs but it is limited in terms of Gas to 2300 (which is thought to not be enough to do anything malicious) 2) Do the logic that updates the state before (not after) calling the transfer function uint balance = userbalances[msg.sender]; if (msg.sender.call.value(balance)()) { else{ userbalances[msg.sender] = balance;
6 3) Control flow integrity -> lock down who can enter a function and from where Locks -> States State Machine where before withdraw is called, the state is "open" and the first of line of withdraw will check that the state is open; the second changes the state to closed; then you add your code enum States {Open, Closed; States state; require state=states.open; state=states.closed; if (msg.sender.call.value(userbalances[msg.sender])()) { state=states.open;
Page Total
Page 2 3 4 5 6 7 8 9 Total Mark FIRST NAME LAST (FAMILY) NAME STUDENT NUMBER INSE 6630 Fall 2017 Duration: 3 hours One single-sided letter-sized reference sheet of paper is allowed Write answers in the
More informationSmart Contract Security Tips. Ethereum devcon2 Sep Joseph Chow
Smart Contract Security Tips Ethereum devcon2 Sep 20 2016 - Joseph Chow One line of code spurred a series of momentous events in blockchain history June 12 2016 Community resource: for the community,
More informationCS 251: Bitcoin and Crypto Currencies Fall 2015
CS 251: Bitcoin and Crypto Currencies Fall 2015 Final Exam The exam is open book and open notes. You have 2 hours. Please answer all five questions. All questions are weighted equally. You may use course
More informationCS 251: Bitcoin and Cryptocurrencies Fall 2016
CS 251: Bitcoin and Cryptocurrencies Fall 2016 Homework 3 due : 2016-11-28, 23:59 via Gradescope (entry code M4YJ69 ) 1. Idioms of use: Consider the transaction graph in the figure below: rectangles represent
More informationIntroduction to Blockchain
Diogo Trentini e Lauro Gripa Neto Introduction to Blockchain www.magrathealabs.com source: Scott Adams' Dilbert source: Gartner Inc. SUMMARY 1. 2. 3. 4. 5. Introduction Theoretical concepts Applications
More informationThe power of Blockchain: Smart Contracts. Foteini Baldimtsi
The power of Blockchain: Smart Contracts Foteini Baldimtsi The Blockchain at the heart of a cryptocurrency Alice sends 2 John sends 1 Dave sends 5 to Bob to Eve to Alice Bob sends 1 Eve sends 4 to Dave
More informationEthereum. Smart Contracts Programming Model
Cryptocurrency Technologies Recall: Bitcoin scripting: non Turing-complete limited/limiting Solutions: Add application-specific functionality in scripting of altcoin Create altcoin with Turing-complete
More informationENEE 457: E-Cash and Bitcoin
ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not
More informationBitcoin, Security for Cloud & Big Data
Bitcoin, Security for Cloud & Big Data CS 161: Computer Security Prof. David Wagner April 18, 2013 Bitcoin Public, distributed, peer-to-peer, hash-chained audit log of all transactions ( block chain ).
More informationAn Analysis of Atomic Swaps on and between Ethereum Blockchains Research Project I
An Analysis of Atomic Swaps on and between Ethereum Blockchains Research Project I Master of System and Network Engineering Informatics Institute, University of Amsterdam Peter Bennink Lennart van Gijtenbeek
More informationLecture 44 Blockchain Security I (Overview)
Blockchains Architecture, Design and Use Cases Prof. Sandip Chakraborty Prof. Praveen Jayachandran Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 44 Blockchain
More informationThe promise and peril of smart contracts
The promise and peril of smart contracts Joseph Bonneau Department of Computer Science New York University Understanding smart contracts The Bitcoin ledger track (mostly) payments time Create 25 coins
More informationPOA Bridge. Security Assessment. Cris Neckar SECUREWARE.IO
POA Bridge Security Assessment Cris Neckar SECUREWARE.IO Executive Summary The engagement team performed a limited scope, source code assessment of POA Network s POA Bridge. The purpose of this assessment
More informationCOEN 241 Term Project. A Blockchain-based Cloud Service
COEN 241 Term Project A Blockchain-based Cloud Service Submitted By : Team 2 Xiao Zhu, Yali Zhang Instructor : Prof. Ming Hwa Wang Santa Clara University Preface This project identifies the difficulties
More informationPrivacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data
Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Philip Stehlik Lucas Vogelsang August 8, 2018 1 Abstract Privacy-enabled NFTs (non-fungible tokens) are user-mintable
More informationSecurify: Practical Security Analysis of Smart Contracts
Securify: Practical Security Analysis of Smart Contracts https://securify.ch Dr. Petar Tsankov Scientific Researcher, ICE center, ETH Zurich Co-founder and Chief Scientist, ChainSecurity AG http://www.ptsankov.com/
More informationFXY TOKEN SMART CONTRACT AUDIT RESULTS FOR FIXY NETWORK LTD
FXY TOKEN SMART CONTRACT AUDIT RESULTS FOR FIXY NETWORK LTD 04/05/2018 Made in Germany by chainsulting.de Seite 1 von 26 Change history Version Date Author Changes 1.0 05.04.2017 Chainsulting Audit created
More informationA living programming environment for a living blockchain
A living programming environment for a living blockchain by Santiago Bragagnolo - PharoDays - 2017 santiago.bragagnolo@gmail.com santiago.bragagnolo@inria.fr skype:santiago.bragagnolo @sbragagnolo Disclaimer!
More informationThe Technology behind Smart Contracts
The Technology behind Smart Contracts Florian Glaser, Chair of E-Finance, Information Systems Department Goethe University 01.09.2016 > Agenda Transactions in detail
More informationComputer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019
Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced
More informationLECTURE 2 BLOCKCHAIN TECHNOLOGY EVOLUTION
LECTURE 2 BLOCKCHAIN TECHNOLOGY EVOLUTION THE PAST: THE VENDING MACHINE DAYS NEW USE CASES Namecoin 2011 Bytecoin 2012 Dogecoin 2013 Decentralized domain name service Privacy, first to use the CryptoNote
More informationSmart Contract Vulnerabilities The most interesting transactions on the Ethereum network
Smart Contract Vulnerabilities The most interesting transactions on the Ethereum network Hi! Hai! I m maurelian ConsenSys Diligence This talk will be: Storytelling meets vulnerability postmortems First,
More informationSmart!= Secure - Breaking Ethereum Smart Contracts. Elliot Ward & Jake Humphries
Smart!= Secure - Breaking Ethereum Smart Contracts Elliot Ward & Jake Humphries Elliot Ward Senior Security Consultant @elliotjward eward@gdssecurity.com Jake Humphries Security Consultant @jake_151 jhumphries@gdssecurity.com
More informationOpenbankIT: a banking platform for e- money management based on blockchain technology
OpenbankIT: a banking platform for e- money management based on blockchain technology Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin pavel@distributedlab.com, vsv@atticlab.net, bohdan@distributedlab.com
More informationBlockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric
Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems
More informationSecure Token Development and Deployment. Dmitry Khovratovich and Mikhail Vladimirov, University of Luxembourg and ABDK Consulting
Secure Token Development and Deployment Dmitry Khovratovich and Mikhail Vladimirov, University of Luxembourg and ABDK Consulting ERC-20 tokens and ICO ERC-20 standard: developed in late 2015, de-facto
More informationBITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW
BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW Rustie Lin Wang Move the area1 over the image a little inside and then right click, replace image to change the background. (and delete this box while
More informationBaFin-Tech 2018 BlockChain & Security (from #developerview)
BaFin-Tech 2018 BlockChain & Security (from #developerview) DLT Lab 10 th April 2018 sven.lehnert@main-incubator.com, @itnext_de Experiences from practice Agenda: Blockchain Security 1 Theory: Blockchain
More informationSet: Hub-and-Spoke Cryptographic Payment Channels
Set: Hub-and-Spoke Cryptographic Payment Channels v0.0.1 Nathan Ginnever: nathan@finalitylabs.io Abstract Here we outline the Set-Payment channel protocol (In a later paper we incrementally extend Set
More informationZILLIQA / ZILIKƏ/ NEXT GEN HIGH-THROUGHPUT BLOCKCHAIN PLATFORM DONG XINSHU, CEO JIA YAOQI, BLOCKCHAIN ZILLIQA.
ZILLIQA / ZILIKƏ/ NEXT GEN HIGH-THROUGHPUT BLOCKCHAIN PLATFORM DONG XINSHU, CEO JIA YAOQI, BLOCKCHAIN ARCHITECT SCALABILITY OF PUBLIC BLOCKCHAIN BITCOIN 7 TX/S ETHEREUM 10 TX/S VISA 8000 TX/S SOME EXISTING
More informationUnblockable Chains. Is Blockchain the ultimate malicious infrastructure? Omer Zohar
Unblockable Chains Is Blockchain the ultimate malicious infrastructure? Omer Zohar #WhoAmI Researching malware backbones for the past decade Following blockchain eco-system since 2013 Finally had some
More informationSmalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold
Smalltalk 3/30/15 The Mathematics of Bitcoin Brian Heinold What is Bitcoin? Created by Satoshi Nakamoto in 2008 What is Bitcoin? Created by Satoshi Nakamoto in 2008 Digital currency (though not the first)
More informationContractFuzzer: Fuzzing Smart Contracts for Vulnerability Detection *#
ContractFuzzer: Fuzzing Smart Contracts for Vulnerability Detection *# Bo Jiang School of Computer Science and Engineering Beihang University Beijing, China jiangbo@buaa.edu.cn Ye Liu School of Computer
More informationBLOCKCHAIN CADEC Pär Wenåker & Peter Larsson
BLOCKCHAIN CADEC 2018 - Pär Wenåker & Peter Larsson BITCOIN BITCOIN PAPER Posted 31/10 2008 Bitcoin v0.1 released Satoshi Nakamoto satoshi at vistomail.com Thu Jan 8 14:27:40 EST 2009 Previous message:
More informationImplementing and Mechanically Verifying Smart Contracts
Implementing and Mechanically Verifying Smart Contracts Ilya Sergey ilyasergey.net Smart Contracts Stateful mutable objects replicated via a (Byzantine) consensus protocol State typically involves a stored
More informationKey concepts of blockchain
Advisory A brief history of blockchains 2008 The mysterious Satoshi Nakamoto publishes his Bitcoin white paper 2014 2017 Nov. 23 rd Ethereum crowd sale Number of crypto tokens: 1.172 BTC $8.216 The first
More informationCallisto Network Whitepaper
Callisto Network Whitepaper Revision 1.3, 10 June 2018, Dexaran, Ethereum Commonwealth co-authors : Methw, Crika-Ivan; Callisto Team This document is intended to formally describe the features and concepts
More informationHow Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization
Centralization vs. Decentralization Distributed Consensus Consensus without Identity, using a Block Chain Incentives and Proof of Work Putting it all together Centralization vs. Decentralization Distributed
More informationAbstraction: Distributed Ledger
Bitcoin 2 Abstraction: Distributed Ledger 3 Implementation: Blockchain this happened this happened this happen hashes & signatures hashes & signatures hashes signatu 4 Implementation: Blockchain this happened
More informationConsensus & Blockchain
Consensus & Blockchain S P Suresh Chennai Mathematical Institute Formal Methods Update Meeting IIT Mandi July 17, 2017 The Bitcoin revolution is upon us What is Bitcoin? Bitcoin: an exciting new currency
More informationMultiparty Computation (MPC) protocols
Multiparty Computation (MPC) protocols Protocols where the users of the protocol don t trust each other, but nevertheless they want to achieve a common goal I don t trust Bob I don t trust Alice Alice
More informationWhat is Bitcoin? Consensus technology has the power to do for economics what the internet did for information - Dan Larimer
What is Bitcoin? Consensus technology has the power to do for economics what the internet did for information - Dan Larimer Ross Rydman 2014 For Academic Use Only The 30 second description Bitcoin is the
More informationTABLE OF CONTENTS 1.0 TOKEN SALE SUMMARY INTRODUCTION HOW TO BUY LION HOW TO BUY LION WITH METAMASK
TABLE OF CONTENTS 1.0 TOKEN SALE SUMMARY... 2 2.0 INTRODUCTION... 3 3.0 HOW TO BUY LION... 3 3.1 HOW TO BUY LION WITH METAMASK... 3 3.2 HOW TO BUY LION WITH MYETHERWALLET... 5 4.0 HOW TO CHECK YOUR LION
More informationWormhole: A Smart Contract Solution for Bitcoin Cash
Wormhole: A Smart Contract Solution for Bitcoin Cash Abstract Born at block height 478,558, Bitcoin Cash (BCH) has been dedicated to bringing a reliable electronic cash to the world and fulfilling Satoshi
More informationWho wants to be a millionaire? A class in creating your own cryptocurrency
DEVNET-3626 Who wants to be a millionaire? A class in creating your own cryptocurrency Tom Davies, Sr. Manager, DevNet Sandbox Vallard Benincosa, Software Engineer Cisco Spark How Questions? Use Cisco
More informationActive Planning Committee John Lindsay, Patent Attorney Tony Schuman, Investment Advisor Todd Russell, Gov t Contract Opportunities
Agenda 11:30-11:45 Check-In, networking 11:45-12:45 12:45 Announcements, Networking Active Planning Committee John Lindsay, Patent Attorney Tony Schuman, Investment Advisor Todd Russell, Gov t Contract
More informationEthereum Computation Market Documentation
Ethereum Computation Market Documentation Release 0.1.0 Piper Merriam July 27, 2016 Contents 1 What is it? 3 2 Overview 5 3 Markets 9 4 Computation Requests 11 5 Challenging Answers 15 6 On Chain Computation
More informationBrown University. Yana Hrytsenko. Final Project: Blockchain for PKI: Using Blockchain data structure for Public Key. Infrastructure.
Brown University Yana Hrytsenko Final Project: Blockchain for PKI: Using Blockchain data structure for Public Key Infrastructure May 2017 1 Blockchain for PKI Using Blockchain data structure for Public
More informationEthereum Consortium Network Deployments Made Easy Christine Avanessians Senior Program Manager
Ethereum Consortium Network Deployments Made Easy Christine Avanessians Senior Program Manager Update History October 19, 2016: The document was revised to reflect the most recent update to the template.
More informationBitcoin and Blockchain
Bitcoin and Blockchain COS 418: Distributed Systems Lecture 18 Zhenyu Song [Credit: Selected content adapted from Michael Freedman. Slides refined by Chris Hodsdon and Theano Stavrinos] Why Bitcoin? All
More informationGnosis Safe Documentation. Gnosis
Gnosis Aug 14, 2018 Content 1 Learn more about Gnosis Safe 3 1.1 Smart Contract Overview........................................ 3 1.2 Services Overview............................................ 10
More informationErays: Reverse Engineering Ethereum s Opaque Smart Contracts
Erays: Reverse Engineering Ethereum s Opaque Smart Contracts Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, Michael Bailey University of Illinois Urbana-Champaign 1 Introduction: Ethereum
More informationUsing Chains for what They re Good For
Using Chains for what They re Good For Andrew Poelstra usingchainsfor@wpsoftware.net Scaling Bitcoin, November 5, 2017 1 / 14 On-Chain Smart Contracting Bitcoin (and Ethereum, etc.) uses a scripting language
More informationErgo platform overview
December 2018 Dmitry Meshkov Ergo platform overview Outline Ergo vision Decentralization Survivability Applicability Roadmap 2 Part 1 Ergo vision 3 History Research and Scorex framework development Testnet
More informationEthereum Consortium Blockchain in Azure Marketplace Christine Avanessians Senior Program Manager
Ethereum Consortium Blockchain in Azure Marketplace Christine Avanessians Senior Program Manager Overview The next phase of our support of blockchain on Microsoft Azure is the release of the Ethereum Consortium
More informationZero-Knowledge proof of knowledge transfer. Perm summer school on blockchain 2018
Zero-Knowledge proof of knowledge transfer Teleport Teleport was born in 2016 from the idea to bring the power of peer-to-peer traffic distribution technology like BitTorrent to the solution of traffic
More informationBlockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective
SESSION ID: LAB3-R09 Blockchain, Cryptocurrency, Smart Contracts and Initial Coin Offerings: A Technical Perspective Tom Plunkett Consulting Solutions Director Oracle Captain Brittany Snelgrove United
More informationICO Review: Raiden Network (RDN)
ICO Review: Raiden Network (RDN) Scalable Transfers for Ethereum October 10, 2017 What is Raiden Network? Raiden is an payment network built on top of the Ethereum network. PAYMENT CHANNEL NETWORK It aims
More informationTable of contents. Abstract. Disclaimer. Scope. Procedure. AS-IS overview. Audit overview. Conclusion. Appendix A. Automated tools reports 12
1 Table of contents Abstract 3 Disclaimer 3 Scope 3 Procedure 4 AS-IS overview 5 Audit overview 10 Conclusion 11 Disclaimer 12 Appendix A. Automated tools reports 12 2 Abstract In this report, we consider
More informationTechnical Analysis of Established Blockchain Systems
Technical Analysis of Established Blockchain Systems Florian Haffke, 20.11.2017, Munich Chair of Software Engineering for Business Information Systems (sebis) Faculty of Informatics Technische Universität
More informationQIIBEE Security Audit
PUBLIC QIIBEE Security Audit of QBX TOKEN Smart Contracts June 28, 2018 Produced for by Table Of Content Foreword...................................................... 1 Executive Summary................................................
More informationPillar Token Code Review
Pillar Token Code Review July 14, 2017 Prepared By: Kshitish Balhotra Independent Reviewers Umesh Kushwaha, Bhavish Balhotra kshitish@dltlabs.io dltlabs.io Table of Contents I. Introduction... 2 II. Overview...
More informationLearn Blockchain Programming. Ali Dorri
Learn Blockchain Programming Ali Dorri Traditional Programming Server runs the code User may or may not know the code Complicated algorithms Database Code to be executed Request Response DApps: Distributed
More informationBitcoin, a decentralized and trustless protocol
Bitcoin, a decentralized and trustless protocol Thomas Sibut-Pinote Inria Saclay February 12, 2015 Thomas Sibut-Pinote Bitcoin, a decentralized and trustless protocol 1 / 42 Introduction Questions 1 Introduction
More informationSoftware Security. Final Exam Preparation. Be aware, there is no guarantee for the correctness of the answers!
Software Security Final Exam Preparation Note: This document contains the questions from the final exam on 09.06.2017. Additionally potential questions about Combinatorial Web Security Testing and Decentralized
More informationREM: Resource Efficient Mining for Blockchains
REM: Resource Efficient Mining for Blockchains Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse Vancouver, Canada 13 September 2017 USENIX Security 2017 1 The Cryptocurrency Vision
More informationBlockchains & Cryptocurrencies
1 Blockchains & Cryptocurrencies A Technical Introduction Lorenz Breidenbach ETH Zürich Cornell Tech The Initiative for CryptoCurrencies & Contracts (IC3) 2 Cryptocurrency Mania Market cap as of yesterday:
More informationVerifiable Computation in Smart Contracts
Verifiable Computation in Smart Contracts Thomas Kerber E H U N I V E R S I T Y T O H F R G E D I N B U 4th Year Project Report Computer Science School of Informatics University of Edinburgh 2017 Abstract
More informationRadix - Public Node Incentives
Radix - Public Node Incentives Dan Hughes Piers Ridyard www.radix.global December 2017 Abstract In this paper we present a novel method for implementing a mechanism to reward work carried out across a
More informationEthereum. Campbell R. Harvey* Duke University and NBER. Ashwin Ramachandran Duke University. Brent Xu ConsenSys. Innovation and Cryptoventures
Innovation and Cryptoventures Ethereum Campbell R. Harvey* Duke University and NBER Ashwin Ramachandran Duke University Brent Xu ConsenSys February 12, 2018 1 2 Overview Ethereum Basics Under the hood
More informationSMARTDATA: Leveraging Blockchain to Securely Capture & Verify Scientific Provenance Data
UT DALLAS Erik Jonsson School of Engineering & Computer Science SMARTDATA: Leveraging Blockchain to Securely Capture & Verify Scientific Provenance Data Dr.Murat Kantarcioglu Joint work with Aravind Ramachandran
More informationProblem: Equivocation!
Bitcoin: 10,000 foot view Bitcoin and the Blockchain New bitcoins are created every ~10 min, owned by miner (more on this later) Thereafter, just keep record of transfers e.g., Alice pays Bob 1 BTC COS
More informationInterledger. Internetworking for Money. Evan Schwartz Engineer at Ripple Co-Inventor of Interledger
Interledger Internetworking for Money Evan Schwartz Engineer at Ripple Co-Inventor of Interledger Payments are broken. Accepting Payments in a Turkish Starbucks Accepting Payments OnlinePayments Online
More informationDIGITAL ASSET RESEARCH
Our Digital Assets Primer is a more in-depth look at the underlying technology behind digital assets, using two of the largest cryptocurrencies, in terms of network values, Bitcoin and Ethereum, as examples.
More informationICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa
ICS 421 & ICS 690 Bitcoin & Blockchain Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa Accepted by: Overstock.com Expedia.com Newegg.com Tigerdirect.com
More informationChapter 13. Digital Cash. Information Security/System Security p. 570/626
Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not
More informationWhat s new under the blockchain sun. HYPERLEDGER FABRIC AND A SHORT SURVEY OF INTERLEDGER. DIDIER PH MARTIN, PHD.
What s new under the blockchain sun. HYPERLEDGER FABRIC AND A SHORT SURVEY OF INTERLEDGER. DIDIER PH MARTIN, PHD. Where do come from? BITCOIN = MONEY BLOCKCHAIN NETWORK ETHEREUM = PROGRAMMABLE BLOCKCHAIN
More informationA SYSTEM FOR ENABLING SHORT-TERM FINANCING
A SYSTEM FOR ENABLING SHORT-TERM FINANCING 5 The present invention relates generally to a system and method for enabling short-term financing, and finds particular, although not exclusive, utility in invoice
More informationCS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University
CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University April 9 2018 Schedule HW 4 Due on Thu 04/12 Programming project 3 Due
More informationSecurity: Focus of Control
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
More informationICO Review: Etherparty (FUEL)
ICO Review: Etherparty (FUEL) User-Friendly Smart Contract Compiler September 21, 2017 PROJECT OVERVIEW What is Etherparty? Etherparty makes smart contracts accessible to everyone without requiring programming
More informationPublic Chain for Digital Asset Escrow
Public Chain for Digital Asset Escrow Decentralized PayPal Whitepaper 2018/03 v3 https://themis.network 1. OVERVIEW... 1 2. FAIR EXCHANGE IN DIGITAL COMMERCE... 4 2.1 TRANSACTIONS BETWEEN DIFFERENT DIGITAL
More informationDefining the Ethereum Virtual Machine for Interactive Theorem Provers
Defining the Ethereum Virtual Machine for Interactive Theorem Provers Ethereum Foundation Workshop on Trusted Smart Contracts Malta, Apr. 7, 2017 1/32 Outline 1 2 3 Remaining Problems 4 2/32 Outline 1
More informationMultiparty State Channels Enabling Real-Time Poker on Ethereum
Multiparty State Channels Enabling Real-Time Poker on Ethereum v0.9.3 Alex Lunyov isuntc@gmail.com Johann Barbie johannbarbie@me.com Konstantin Korenkov 7r0ggy@gmail.com Mayank Kumar mkumar@techracers.com
More informationErgo platform. Dmitry Meshkov
Ergo platform Dmitry Meshkov Prehistory Motivation Theory Practice Provably secure 1000 currencies New features Ad-hoc solutions Impractical Security issues Motivation Theory Provably secure New features
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 8: Protocols for public-key management Ion Petre Department of IT, Åbo Akademi University 1 Key management two problems
More informationLecture 3. Introduction to Cryptocurrencies
Lecture 3 Introduction to Cryptocurrencies Public Keys as Identities public key := an identity if you see sig such that verify(pk, msg, sig)=true, think of it as: pk says, [msg] to speak for pk, you must
More informationReplay Attacks on Ethereum Smart Contracts. Zhenxuan Bai, Yuwei Zheng, Kunzhe Chai Senhua Wang
Replay Attacks on Ethereum Smart Contracts Zhenxuan Bai, Yuwei Zheng, Kunzhe Chai Senhua Wang About us 360 Technology is a leading Internet security company in China. Our core products are anti-virus security
More informationThe security and insecurity of blockchains and smart contracts
The security and insecurity of blockchains and smart contracts Jean-Pierre Flori, expert in cryptography, Agence Nationale de la Sécurité des Systèmes d Information (ANSSI) In J.P. Dardayrol, editor of
More informationPrevious Name: D3. Fourth Estate. A secure, decentralized news data storing and sharing solution for journalists
Previous Name: D3 Fourth Estate A secure, decentralized news data storing and sharing solution for journalists Aaron Chong Remini Yip International Student Blockchain Competition s Presentation 1 Problem
More informationChapter 9: Key Management
Chapter 9: Key Management Session and Interchange Keys Key Exchange Cryptographic Key Infrastructure Storing and Revoking Keys Digital Signatures Slide #9-1 Overview Key exchange Session vs. interchange
More informationDeclarative Static Analysis of Smart Contracts
Declarative Static Analysis of Smart Contracts securify.ch Quentin Hibon Blockchain Security Engineer, ChainSecurity Smart Contract Bugs in the News Low-level Code Solidity High-level languages Vyper compilation
More informationcchannel Generalized State Channel Specification
cchannel Generalized State Channel Specification Celer Network Core Team May 27, 2018 cchannel of the Celer Network is a generalized state channel and sidechain suite that provides a framework to support
More informationkasko2go Token Contract Audit
Version 1.0 / 17.04.2018 kasko2go Token Contract Audit inacta AG Eugen Lechner Cédric Walter Index 1. Introduction 2 2. Scope 2 3. Executive Summary
More informationA Java Framework for Smart Contracts
A Java Framework for Smart Contracts Fausto Spoto Università di Verona, Italy WTSC 2019, Saint Kitts February 22, 2019 1 / 19 Programming Smart Contracts Transactions are atomic computation steps of a
More informationscompile: Critical Path Identification and Analysis for Smart Contracts
scompile: Critical Path Identification and Analysis for Smart Contracts Jialiang Chang, Bo Gao, Hao Xiao, Jun Sun and Zijiang Yang Department of Computer Science Western Michigan University, Kalamazoo,
More informationErgo platform: from prototypes to a survivable cryptocurrency
January 2019 Dmitry Meshkov Ergo platform: from prototypes to a survivable cryptocurrency Outline Ergo Consensus Light Storage vision protocol clients fee Voting Smart Monetary Roadmap system contracts
More informationEECS 498 Introduction to Distributed Systems
EECS 498 Introduction to Distributed Systems Fall 2017 Harsha V. Madhyastha Today Bitcoin: A peer-to-peer digital currency Spark: In-memory big data processing December 4, 2017 EECS 498 Lecture 21 2 December
More informationBLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive
BLOCKCHAIN Blockchains and Transactions Part II A Deeper Dive www.blockchaintrainingalliance.com Blockchain Page 3 Blockchain is NOT Bitcoin Page 4 Transactions Page 5 Multi-Signature Addresses An Address
More informationDTX Token. Starter guide
DTX Token Starter guide 2 Choosing for the DTX token to buy and sell sensor data enables you to perform real microtransactions on DataBroker DAO. Every beginning is difficult, but this step-by-step introduction
More information