Secure Decentralized Application Development of Blockchain-based Games

Natalia Trojanowska, M. Kedziora, Moataz Hanif, H. Song
{"title":"Secure Decentralized Application Development of Blockchain-based Games","authors":"Natalia Trojanowska, M. Kedziora, Moataz Hanif, H. Song","doi":"10.1109/IPCCC50635.2020.9391556","DOIUrl":null,"url":null,"abstract":"The purpose of this paper is to present Ethereum decentralized application development methodology with focus on security issues and its verification. We introduce key concepts that are related to developing decentralized applications and Crypto Collectibles games. Moreover, the requirements for blockchain projects were presented along with a selection of use case examples. The paper concerns the application design process issues, starting from the methodology used, going through the description of requirements and specification, ending up with the implementation. Finally, an overview of the issues associated with the security of Ethereum decentralized applications is presented. We compared guidelines from Ethereum Smart Contract Best Practices by ConsenSys, Smart Contract Security Verification Standard created by SecuRing, Decentralized Application Security Project introduced by NCC Group, Security Considerations from Solidity documentation, Ethereum Smart Contracts Security Recommendations from Guylando Knowledge Lists, and Smart Contract Weakness Classification and Test Cases. It was discussed which guideline should be followed and when should the verification take place, considering the life cycle of the application. The paper covers different security risks related to blockchain games along with examples of how vulnerabilities can arise, how they can be detected during security verification phase, and countermeasures to address them.","PeriodicalId":226034,"journal":{"name":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IPCCC50635.2020.9391556","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

The purpose of this paper is to present Ethereum decentralized application development methodology with focus on security issues and its verification. We introduce key concepts that are related to developing decentralized applications and Crypto Collectibles games. Moreover, the requirements for blockchain projects were presented along with a selection of use case examples. The paper concerns the application design process issues, starting from the methodology used, going through the description of requirements and specification, ending up with the implementation. Finally, an overview of the issues associated with the security of Ethereum decentralized applications is presented. We compared guidelines from Ethereum Smart Contract Best Practices by ConsenSys, Smart Contract Security Verification Standard created by SecuRing, Decentralized Application Security Project introduced by NCC Group, Security Considerations from Solidity documentation, Ethereum Smart Contracts Security Recommendations from Guylando Knowledge Lists, and Smart Contract Weakness Classification and Test Cases. It was discussed which guideline should be followed and when should the verification take place, considering the life cycle of the application. The paper covers different security risks related to blockchain games along with examples of how vulnerabilities can arise, how they can be detected during security verification phase, and countermeasures to address them.
基于区块链的游戏安全去中心化应用开发
本文的目的是介绍以太坊分散应用程序开发方法,重点关注安全问题及其验证。我们介绍了与开发分散应用程序和加密收藏品游戏相关的关键概念。此外,还介绍了区块链项目的需求以及一些用例示例。本文关注应用程序设计过程问题,从使用的方法开始,经过需求和规范的描述,最后到实现。最后,概述了与以太坊分散应用程序的安全性相关的问题。我们比较了ConsenSys的以太坊智能合约最佳实践指南、NCC集团推出的secure、去中心化应用安全项目创建的智能合约安全验证标准、Solidity文档中的安全注意事项、Guylando知识列表中的以太坊智能合约安全建议以及智能合约弱点分类和测试用例。考虑到应用程序的生命周期,讨论了应该遵循哪些指导方针以及何时进行验证。本文涵盖了与区块链游戏相关的不同安全风险,并举例说明了漏洞是如何产生的,如何在安全验证阶段检测到漏洞,以及解决漏洞的对策。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信