Security and privacy issues in blockchain and its applications

IET Blockchain Pub Date : 2023-10-21 DOI:10.1049/blc2.12051
Liangmin Wang, Victor S. Sheng, Boris Düdder, Haiqin Wu, Huijuan Zhu
{"title":"Security and privacy issues in blockchain and its applications","authors":"Liangmin Wang,&nbsp;Victor S. Sheng,&nbsp;Boris Düdder,&nbsp;Haiqin Wu,&nbsp;Huijuan Zhu","doi":"10.1049/blc2.12051","DOIUrl":null,"url":null,"abstract":"<p>Blockchain technology has emerged and evolved as a disruptive technology with the potential to be applied in various fields, including digital finance, healthcare, and the Internet of Things (IoT). Besides being a distributed ledger, blockchain enables decentralized and trusted storage/computation without relying on a central trusted party. However, the growing heterogeneity of blockchain platforms and the expanding range of applications have resulted in escalating security and privacy concerns. These concerns encompass persistent privacy breaches, vulnerabilities in smart contracts, and the “impossible triangle” problem. These challenges have emerged as the primary obstacles to the development and seamless integration of blockchain technology with industry applications.</p><p>To address the security and privacy challenges in blockchain platforms and its applications, numerous researchers have conducted extensive studies in this field by leveraging advanced technologies, including new cryptographic protocols and deep learning techniques. This special issue aims to highlight research perspectives, articles, and experimental studies pertaining to “Security and Privacy Issues in Blockchain and Its Applications”.</p><p>In this special issue, we received a total of 19 papers, out of which 17 underwent a rigorous peer-review process. However, two papers were excluded from the peer-reviewed selection because one was submitted in a draft form and the other was voluntarily withdrawn by the authors. Out of the 17 papers submitted for review, 10 were accepted for publication, six were rejected without being transferred, and one was rejected and referred to a transfer service. The exceptional quality of all the submissions played a crucial role in ensuring the success of this special issue.</p><p>These accepted papers can be classified into two categories, namely blockchain application security and cross-chain interaction security. The papers in the first category focus on analyzing and providing insights into the security of blockchain applications. Their objective is to keep readers informed about the latest trends, developments, challenges, and opportunities in blockchain application security. Moreover, significant research efforts have been dedicated to security analysis and detection in typical blockchain applications. The papers in this category are of Zhou et al., Grybniak et al., Lv et al., Li et al., Gong et al., Xiao et al. and Videira et al. These contributions further enhance our understanding and capability to safeguard blockchain applications from potential security threats. The second category of papers presents novel solutions that target the enhancement of security in cross-system interactions. These papers are of Feng et al., Xu et al. and Yu et al. By addressing the specific challenges associated with cross-system communication, these solutions contribute to the development of robust and secure blockchain networks. A brief presentation of each of the papers in the special issue is as follows.</p><p>Zhou et al. present WASMOD, a prototype system designed to detect vulnerabilities in WebAssembly (Wasm) smart contracts. WASMOD utilizes a combination of bytecode instrumentation, run-time validation, and grey-box fuzzing techniques to identify integer overflow and stack overflow vulnerabilities. The tool was effectively applied to the EOSIO blockchain, successfully detecting vulnerable smart contracts.</p><p>Grybniak et al. propose “Waterfall: Gozalandia”, a distributed protocol based on the Proof of Stake approach. This protocol enables fast finality, proven safety, and liveness in a network utilizing BlockDAG structures. By employing cross-voting for block ordering, the protocol ensures swift consensus and the ability to detect dishonest behaviors. The protocol assumes the presence of a Coordinating network that holds information about the approved ordering. This Coordinating network serves to significantly enhance security and improve network synchronization in a qualitative manner. Through load testing, the protocol has demonstrated its ability to handle a throughput of 3200–3600 transactions per second, with an average confirmation waiting time of 20 seconds.</p><p>Lv et al. propose a graph-based embedding classification method for phishing detection on the Ethereum blockchain. The method involves constructing multiple subgraphs using the transaction records collected from Ethereum and introduces a modified version of Graph2Vec called imgraph2vec. This modified approach aims to learn more meaningful information from the subgraphs. To identify phishing attempts, the Extreme Gradient Boosting (XGBoost) algorithm is utilized.</p><p>Li et al. introduce BlockDetective, an innovative framework based on GCN that employs a student-teacher architecture to identify fraudulent cryptocurrency transactions. The framework incorporates pre-training and fine-tuning, enabling the pre-trained model (teacher) to effectively adapt to the new data distribution and improve prediction performance. Meanwhile, a lightweight model (student) is trained to provide abstract and high-level information. Experimental results demonstrate that BlockDetective outperforms state-of-the-art methods.</p><p>Gong et al. propose a novel method called SCGformer, which aims to detect vulnerabilities in smart contracts. This novel method combines the power of a control flow graph (CFG) and a transformer model to enhance the accuracy and effectiveness of vulnerability detection. SCGformer involves constructing the CFGs using the operation codes (opcodes) of smart contracts. By focusing on the opcodes, SCGformer provides a language-agnostic solution, ensuring consistent vulnerability detection regardless of specific language versions. The authors conduct experiments to assess the efficacy of SCGformer, yielding an accuracy rate of 94.36%.</p><p>Xiao et al. introduce a blockchain-based image copyright protection system named BB-RICP. By leveraging the distributed storage technique of blockchain, BB-RICP aims to solve the vulnerabilities of centralized storage, such as data loss and tampering. The system provides a novel solution for managing the entire lifecycle of copyright. It utilizes spread spectrum watermarking to enable traceability and incorporates GM algorithms and the PBFT consensus algorithm to enhance its functionality and effectiveness. Lastly, to enhance the practicality of the system, they implement a copyright blockchain framework called ICP-Chain and conduct evaluations to assess its security and reliability.</p><p>Feng et al. introduce a novel federated learning framework that leverages a Directed Acyclic Graph (DAG) to enhance interoperability among different blockchains. The framework comprises a shard chain and a main chain, featuring replaceable consensus mechanisms and a weighted context graph to enhance efficiency. The experimental results unequivocally demonstrate the efficacy of the proposed federated framework. Specifically, the framework significantly reduces the global computation requirements while simultaneously increasing the blockchain throughput.</p><p>Xu et al. introduce ChainKeeper, a cross-chain scheme for governing the chain by chain. ChainKeeper incorporates several key components, including a modular node proxy program, a verifiable node random selection method (VNRS), and a verifiable identity threshold signature method (VITS). These components work together to ensure universality, efficiency, and security throughout the cross-chain process. The scheme is resilient against malicious behaviors and collaborative attacks from both business nodes and supervision nodes. The experimental results demonstrate the effectiveness of ChainKeeper in cross-chain supervision scenarios.</p><p>Yu et al. present SPRA, a policy-based regulatory architecture designed to regulate blockchain transactions. The architecture comprises four layers: permission layer, regulation layer, bridge layer, and business layer. To facilitate interoperability between these layers, they introduce XRPL, a regulatory policy description language. The regulation layer incorporates JuryBC, a decentralized jury mechanism based on the Shamir threshold secret sharing algorithm and Pedersen commitment. At the business layer, they implement RDShare, a secure and efficient regulatory data sharing mechanism that utilizes attribute-based encryption.</p><p>All the selected papers in this special issue showcase the continuous advancements in the field of blockchain and its application security. However, it is important to recognize that security and privacy issues in blockchain and its applications continue to pose significant challenges. These challenges serve as a driving force for further research and exploration of new technologies. They highlight the need for ongoing efforts to enhance the security and privacy aspects of blockchain, fostering a more resilient and trustworthy blockchain ecosystem.</p><p></p><p>Liangmin Wang received his B.S. degree in computational mathematics in Jilin University, Changchun, China in 1999, and his PhD degree in cryptology from Xidian University, Xi'an, China in 2007. He is a full professor in the School of Cyber Science and Engineering, Southeast University, Nanjing, China. He has been honored as a “Wan-Jiang Scholar” of Anhui Province since November 2013. Now his research interests include data security and privacy. He has published over 70 technical papers at premium international journals and conferences, for example, IEEE/ACM Transactions on Networking and IEEE International Conference on Computer Communications. He has severed as a TPC member of many IEEE conferences, such as IEEE ICC, IEEE HPCC, IEEE Trust-COM.</p><p></p><p>Victor S. Sheng received his master's degree in computer science from the University of New Brunswick, Canada, in 2003, and his PhD degree in computer science from Western University, Ontario, Canada, in 2007. He is an associate professor of computer science, Texas Tech University, and the founding director of the Data Analytics Lab (DAL). His research interests include data mining, machine learning, and related applications. He was an associate research scientist and NSERC postdoctoral fellow in information systems at Stern Business School, New York University, after he obtained his PhD. He is a senior member of the IEEE and a lifetime member of the ACM. He received the test-of-time award for research from KDD’20, the best paper award runner-up from KDD’08, and the best paper award from ICDM’11. He is an area chair and SPC/PC member for several international top conferences and an associate editor for several international journals.</p><p></p><p>Boris Düdder is an associate professor at the department of computer science (DIKU) at the University of Copenhagen (UCPH), Denmark. He is head of the research group Software Engineering &amp; Formal Methods at DIKU. His primary research interests are formal methods and programming languages in software engineering of trustworthy distributed systems, where he is studying automated program generation for adaptive systems with high-reliability guarantees. He is working on the computational foundations of reliable and secure Big Data ecosystems. His research is bridging the formal foundations of computer science and complex industrial applications.</p><p></p><p>Haiqin Wu received her B.E. degree in computer science and PhD degree in computer application technology from Jiangsu University in 2014 and 2019, respectively. She is an associate professor at the Shanghai Key Laboratory of Trustworthy Computing (Software Engineering Institute), East China Normal University, China. Before joining ECNU, she was a postdoctoral researcher in the Department of Computer Science, University of Copenhagen, Denmark. She was also a visiting student in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University, USA. Her research interests include data security and privacy protection, mobile crowdsensing/crowdsourcing, and blockchain-based applications.</p><p></p><p>Huijuan Zhu received her master's degree at School of Computer Science and Communication Engineering in Jiangsu University, Zhenjiang, China in 2010 and her PhD degree at School of Computer and Control Engineering in University of Chinese Academy of Sciences, Beijing, China in 2017. Her research interests include malware detection and machine learning. She is an associate professor in the School of Computer Science and Communication Engineering at Jiangsu University.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"169-171"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12051","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Blockchain","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/blc2.12051","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Blockchain technology has emerged and evolved as a disruptive technology with the potential to be applied in various fields, including digital finance, healthcare, and the Internet of Things (IoT). Besides being a distributed ledger, blockchain enables decentralized and trusted storage/computation without relying on a central trusted party. However, the growing heterogeneity of blockchain platforms and the expanding range of applications have resulted in escalating security and privacy concerns. These concerns encompass persistent privacy breaches, vulnerabilities in smart contracts, and the “impossible triangle” problem. These challenges have emerged as the primary obstacles to the development and seamless integration of blockchain technology with industry applications.

To address the security and privacy challenges in blockchain platforms and its applications, numerous researchers have conducted extensive studies in this field by leveraging advanced technologies, including new cryptographic protocols and deep learning techniques. This special issue aims to highlight research perspectives, articles, and experimental studies pertaining to “Security and Privacy Issues in Blockchain and Its Applications”.

In this special issue, we received a total of 19 papers, out of which 17 underwent a rigorous peer-review process. However, two papers were excluded from the peer-reviewed selection because one was submitted in a draft form and the other was voluntarily withdrawn by the authors. Out of the 17 papers submitted for review, 10 were accepted for publication, six were rejected without being transferred, and one was rejected and referred to a transfer service. The exceptional quality of all the submissions played a crucial role in ensuring the success of this special issue.

These accepted papers can be classified into two categories, namely blockchain application security and cross-chain interaction security. The papers in the first category focus on analyzing and providing insights into the security of blockchain applications. Their objective is to keep readers informed about the latest trends, developments, challenges, and opportunities in blockchain application security. Moreover, significant research efforts have been dedicated to security analysis and detection in typical blockchain applications. The papers in this category are of Zhou et al., Grybniak et al., Lv et al., Li et al., Gong et al., Xiao et al. and Videira et al. These contributions further enhance our understanding and capability to safeguard blockchain applications from potential security threats. The second category of papers presents novel solutions that target the enhancement of security in cross-system interactions. These papers are of Feng et al., Xu et al. and Yu et al. By addressing the specific challenges associated with cross-system communication, these solutions contribute to the development of robust and secure blockchain networks. A brief presentation of each of the papers in the special issue is as follows.

Zhou et al. present WASMOD, a prototype system designed to detect vulnerabilities in WebAssembly (Wasm) smart contracts. WASMOD utilizes a combination of bytecode instrumentation, run-time validation, and grey-box fuzzing techniques to identify integer overflow and stack overflow vulnerabilities. The tool was effectively applied to the EOSIO blockchain, successfully detecting vulnerable smart contracts.

Grybniak et al. propose “Waterfall: Gozalandia”, a distributed protocol based on the Proof of Stake approach. This protocol enables fast finality, proven safety, and liveness in a network utilizing BlockDAG structures. By employing cross-voting for block ordering, the protocol ensures swift consensus and the ability to detect dishonest behaviors. The protocol assumes the presence of a Coordinating network that holds information about the approved ordering. This Coordinating network serves to significantly enhance security and improve network synchronization in a qualitative manner. Through load testing, the protocol has demonstrated its ability to handle a throughput of 3200–3600 transactions per second, with an average confirmation waiting time of 20 seconds.

Lv et al. propose a graph-based embedding classification method for phishing detection on the Ethereum blockchain. The method involves constructing multiple subgraphs using the transaction records collected from Ethereum and introduces a modified version of Graph2Vec called imgraph2vec. This modified approach aims to learn more meaningful information from the subgraphs. To identify phishing attempts, the Extreme Gradient Boosting (XGBoost) algorithm is utilized.

Li et al. introduce BlockDetective, an innovative framework based on GCN that employs a student-teacher architecture to identify fraudulent cryptocurrency transactions. The framework incorporates pre-training and fine-tuning, enabling the pre-trained model (teacher) to effectively adapt to the new data distribution and improve prediction performance. Meanwhile, a lightweight model (student) is trained to provide abstract and high-level information. Experimental results demonstrate that BlockDetective outperforms state-of-the-art methods.

Gong et al. propose a novel method called SCGformer, which aims to detect vulnerabilities in smart contracts. This novel method combines the power of a control flow graph (CFG) and a transformer model to enhance the accuracy and effectiveness of vulnerability detection. SCGformer involves constructing the CFGs using the operation codes (opcodes) of smart contracts. By focusing on the opcodes, SCGformer provides a language-agnostic solution, ensuring consistent vulnerability detection regardless of specific language versions. The authors conduct experiments to assess the efficacy of SCGformer, yielding an accuracy rate of 94.36%.

Xiao et al. introduce a blockchain-based image copyright protection system named BB-RICP. By leveraging the distributed storage technique of blockchain, BB-RICP aims to solve the vulnerabilities of centralized storage, such as data loss and tampering. The system provides a novel solution for managing the entire lifecycle of copyright. It utilizes spread spectrum watermarking to enable traceability and incorporates GM algorithms and the PBFT consensus algorithm to enhance its functionality and effectiveness. Lastly, to enhance the practicality of the system, they implement a copyright blockchain framework called ICP-Chain and conduct evaluations to assess its security and reliability.

Feng et al. introduce a novel federated learning framework that leverages a Directed Acyclic Graph (DAG) to enhance interoperability among different blockchains. The framework comprises a shard chain and a main chain, featuring replaceable consensus mechanisms and a weighted context graph to enhance efficiency. The experimental results unequivocally demonstrate the efficacy of the proposed federated framework. Specifically, the framework significantly reduces the global computation requirements while simultaneously increasing the blockchain throughput.

Xu et al. introduce ChainKeeper, a cross-chain scheme for governing the chain by chain. ChainKeeper incorporates several key components, including a modular node proxy program, a verifiable node random selection method (VNRS), and a verifiable identity threshold signature method (VITS). These components work together to ensure universality, efficiency, and security throughout the cross-chain process. The scheme is resilient against malicious behaviors and collaborative attacks from both business nodes and supervision nodes. The experimental results demonstrate the effectiveness of ChainKeeper in cross-chain supervision scenarios.

Yu et al. present SPRA, a policy-based regulatory architecture designed to regulate blockchain transactions. The architecture comprises four layers: permission layer, regulation layer, bridge layer, and business layer. To facilitate interoperability between these layers, they introduce XRPL, a regulatory policy description language. The regulation layer incorporates JuryBC, a decentralized jury mechanism based on the Shamir threshold secret sharing algorithm and Pedersen commitment. At the business layer, they implement RDShare, a secure and efficient regulatory data sharing mechanism that utilizes attribute-based encryption.

All the selected papers in this special issue showcase the continuous advancements in the field of blockchain and its application security. However, it is important to recognize that security and privacy issues in blockchain and its applications continue to pose significant challenges. These challenges serve as a driving force for further research and exploration of new technologies. They highlight the need for ongoing efforts to enhance the security and privacy aspects of blockchain, fostering a more resilient and trustworthy blockchain ecosystem.

Liangmin Wang received his B.S. degree in computational mathematics in Jilin University, Changchun, China in 1999, and his PhD degree in cryptology from Xidian University, Xi'an, China in 2007. He is a full professor in the School of Cyber Science and Engineering, Southeast University, Nanjing, China. He has been honored as a “Wan-Jiang Scholar” of Anhui Province since November 2013. Now his research interests include data security and privacy. He has published over 70 technical papers at premium international journals and conferences, for example, IEEE/ACM Transactions on Networking and IEEE International Conference on Computer Communications. He has severed as a TPC member of many IEEE conferences, such as IEEE ICC, IEEE HPCC, IEEE Trust-COM.

Victor S. Sheng received his master's degree in computer science from the University of New Brunswick, Canada, in 2003, and his PhD degree in computer science from Western University, Ontario, Canada, in 2007. He is an associate professor of computer science, Texas Tech University, and the founding director of the Data Analytics Lab (DAL). His research interests include data mining, machine learning, and related applications. He was an associate research scientist and NSERC postdoctoral fellow in information systems at Stern Business School, New York University, after he obtained his PhD. He is a senior member of the IEEE and a lifetime member of the ACM. He received the test-of-time award for research from KDD’20, the best paper award runner-up from KDD’08, and the best paper award from ICDM’11. He is an area chair and SPC/PC member for several international top conferences and an associate editor for several international journals.

Boris Düdder is an associate professor at the department of computer science (DIKU) at the University of Copenhagen (UCPH), Denmark. He is head of the research group Software Engineering & Formal Methods at DIKU. His primary research interests are formal methods and programming languages in software engineering of trustworthy distributed systems, where he is studying automated program generation for adaptive systems with high-reliability guarantees. He is working on the computational foundations of reliable and secure Big Data ecosystems. His research is bridging the formal foundations of computer science and complex industrial applications.

Haiqin Wu received her B.E. degree in computer science and PhD degree in computer application technology from Jiangsu University in 2014 and 2019, respectively. She is an associate professor at the Shanghai Key Laboratory of Trustworthy Computing (Software Engineering Institute), East China Normal University, China. Before joining ECNU, she was a postdoctoral researcher in the Department of Computer Science, University of Copenhagen, Denmark. She was also a visiting student in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University, USA. Her research interests include data security and privacy protection, mobile crowdsensing/crowdsourcing, and blockchain-based applications.

Huijuan Zhu received her master's degree at School of Computer Science and Communication Engineering in Jiangsu University, Zhenjiang, China in 2010 and her PhD degree at School of Computer and Control Engineering in University of Chinese Academy of Sciences, Beijing, China in 2017. Her research interests include malware detection and machine learning. She is an associate professor in the School of Computer Science and Communication Engineering at Jiangsu University.

区块链及其应用中的安全和隐私问题
区块链技术已经成为一种颠覆性技术,有可能应用于数字金融、医疗保健和物联网(IoT)等各个领域。除了作为分布式账本之外,区块链还可以在不依赖中央可信方的情况下实现分散和可信的存储/计算。然而,区块链平台日益增长的异质性和应用范围的扩大导致了安全和隐私问题的升级。这些担忧包括持续的隐私泄露、智能合约漏洞和“不可能三角”问题。这些挑战已成为区块链技术与行业应用开发和无缝集成的主要障碍。为了解决区块链平台及其应用中的安全和隐私挑战,许多研究人员利用先进技术,包括新的加密协议和深度学习技术,在这一领域进行了广泛的研究。本期特刊旨在突出与“区块链及其应用中的安全和隐私问题”相关的研究观点、文章和实验研究。在本期特刊中,我们共收到了19篇论文,其中17篇经过了严格的同行评议。然而,两篇论文被排除在同行评议的选择之外,因为一篇是以草稿形式提交的,另一篇是作者自愿撤回的。在17篇论文中,10篇论文被接受发表,6篇论文被拒绝,但没有转移,1篇论文被拒绝,并被转介到转移服务机构。所有投稿作品的卓越品质对确保本期特刊的成功发挥了至关重要的作用。这些被接受的论文可以分为两类,即区块链应用安全性和跨链交互安全性。第一类的论文侧重于分析和提供对区块链应用程序安全性的见解。他们的目标是让读者了解区块链应用安全的最新趋势、发展、挑战和机遇。此外,对典型区块链应用中的安全分析和检测也进行了大量的研究。该类论文有Zhou等人、Grybniak等人、Lv等人、Li等人、Gong等人、Xiao等人、Videira等人。这些贡献进一步增强了我们保护区块链应用免受潜在安全威胁的理解和能力。第二类论文提出了针对增强跨系统交互安全性的新颖解决方案。这些论文分别是Feng et al., Xu et al.和Yu et al.。通过解决与跨系统通信相关的具体挑战,这些解决方案有助于开发强大而安全的区块链网络。以下是特刊中每篇论文的简要介绍。Zhou等人提出了WASMOD,这是一个用于检测WebAssembly (Wasm)智能合约漏洞的原型系统。WASMOD结合了字节码检测、运行时验证和灰盒模糊测试技术来识别整数溢出和堆栈溢出漏洞。该工具有效应用于EOSIO区块链,成功检测出易受攻击的智能合约。Grybniak等人提出了“瀑布:Gozalandia”,这是一种基于权益证明方法的分布式协议。该协议在使用BlockDAG结构的网络中实现快速终局,经过验证的安全性和活跃性。通过采用交叉投票进行区块排序,该协议确保了快速共识和检测不诚实行为的能力。该协议假定存在一个协调网络,该网络保存有关已批准的订购的信息。这种协调网络可以显著增强安全性,从质的角度提高网络的同步性。通过负载测试,该协议已经证明了其处理每秒3200-3600个事务的吞吐量的能力,平均确认等待时间为20秒。Lv等人提出了一种基于图的嵌入分类方法,用于以太坊区块链上的网络钓鱼检测。该方法涉及使用从以太坊收集的交易记录构建多个子图,并引入Graph2Vec的修改版本,称为imgraph2vec。这种改进的方法旨在从子图中学习更多有意义的信息。为了识别网络钓鱼企图,使用了极限梯度增强(XGBoost)算法。Li等人介绍了BlockDetective,这是一个基于GCN的创新框架,采用学生-教师架构来识别欺诈性加密货币交易。 区块链技术已经成为一种颠覆性技术,有可能应用于数字金融、医疗保健和物联网(IoT)等各个领域。除了作为分布式账本之外,区块链还可以在不依赖中央可信方的情况下实现分散和可信的存储/计算。然而,区块链平台日益增长的异质性和应用范围的扩大导致了安全和隐私问题的升级。这些担忧包括持续的隐私泄露、智能合约漏洞和“不可能三角”问题。这些挑战已成为区块链技术与行业应用开发和无缝集成的主要障碍。为了解决区块链平台及其应用中的安全和隐私挑战,许多研究人员利用先进技术,包括新的加密协议和深度学习技术,在这一领域进行了广泛的研究。本期特刊旨在突出与“区块链及其应用中的安全和隐私问题”相关的研究观点、文章和实验研究。在本期特刊中,我们共收到了19篇论文,其中17篇经过了严格的同行评审。然而,两篇论文被排除在同行评议的选择之外,因为一篇是以草稿形式提交的,另一篇是作者自愿撤回的。在17篇论文中,有10篇论文被接受发表,6篇论文被拒绝,但没有转移,1篇论文被拒绝,并被转介到转移服务机构。所有投稿作品的卓越品质对确保本期特刊的成功发挥了至关重要的作用。这些被接受的论文可以分为两类,即区块链应用安全性和跨链交互安全性。第一类的论文侧重于分析和提供对区块链应用程序安全性的见解。他们的目标是让读者了解区块链应用安全的最新趋势、发展、挑战和机遇。此外,对典型区块链应用中的安全分析和检测也进行了大量的研究。该类论文有Zhou等人、Grybniak等人、Lv等人、Li等人、Gong等人、Xiao等人、Videira等人。这些贡献进一步增强了我们保护区块链应用免受潜在安全威胁的理解和能力。第二类论文提出了针对增强跨系统交互安全性的新颖解决方案。这些论文分别是Feng et al., Xu et al.和Yu et al.。通过解决与跨系统通信相关的具体挑战,这些解决方案有助于开发强大而安全的区块链网络。以下是特刊中每篇论文的简要介绍。Zhou等人提出了WASMOD,这是一个用于检测WebAssembly (Wasm)智能合约漏洞的原型系统。WASMOD结合了字节码检测、运行时验证和灰盒模糊测试技术来识别整数溢出和堆栈溢出漏洞。该工具有效应用于EOSIO区块链,成功检测出易受攻击的智能合约。Grybniak等人提出了“瀑布:Gozalandia”,这是一种基于权益证明方法的分布式协议。该协议在使用BlockDAG结构的网络中实现快速终局,经过验证的安全性和活跃性。通过采用交叉投票进行区块排序,该协议确保了快速共识和检测不诚实行为的能力。该协议假定存在一个协调网络,该网络保存有关已批准的订购的信息。这种协调网络可以显著增强安全性,从质的角度提高网络的同步性。通过负载测试,该协议已经证明了其处理每秒3200-3600个事务的吞吐量的能力,平均确认等待时间为20秒。Lv等人提出了一种基于图的嵌入分类方法,用于以太坊区块链上的网络钓鱼检测。该方法涉及使用从以太坊收集的交易记录构建多个子图,并引入Graph2Vec的修改版本,称为imgraph2vec。这种改进的方法旨在从子图中学习更多有意义的信息。为了识别网络钓鱼企图,使用了极限梯度增强(XGBoost)算法。Li等人介绍了BlockDetective,这是一个基于GCN的创新框架,采用学生-教师架构来识别欺诈性加密货币交易。 该框架结合了预训练和微调,使预训练模型(教师)能够有效地适应新的数据分布,提高预测性能。同时,训练一个轻量级模型(学生)来提供抽象和高级的信息。实验结果表明,BlockDetective优于最先进的方法。Gong等人提出了一种名为SCGformer的新方法,旨在检测智能合约中的漏洞。该方法结合了控制流图(CFG)和变压器模型的功能,提高了漏洞检测的准确性和有效性。SCGformer涉及使用智能合约的操作代码(opcodes)构建cfg。通过关注操作码,SCGformer提供了一种与语言无关的解决方案,无论特定的语言版本如何,都可以确保一致的漏洞检测。通过实验评估SCGformer的有效性,准确率为94.36%。Xiao等人介绍了一种基于区块链的图像版权保护系统bb - icp。通过利用区块链的分布式存储技术,BB-RICP旨在解决集中存储的漏洞,如数据丢失和篡改。该系统为版权的全生命周期管理提供了一种新颖的解决方案。它利用扩频水印实现可追溯性,并结合GM算法和PBFT共识算法来增强其功能和有效性。最后,为了提高系统的实用性,他们实施了一个名为ICP-Chain的版权区块链框架,并对其安全性和可靠性进行了评估。Feng等人介绍了一种新的联邦学习框架,该框架利用有向无环图(DAG)来增强不同区块链之间的互操作性。该框架由分片链和主链组成,具有可替换的共识机制和加权上下文图,以提高效率。实验结果明确地证明了所提出的联邦框架的有效性。具体来说,该框架显著降低了全局计算需求,同时提高了区块链吞吐量。Xu等人介绍了ChainKeeper,这是一种用于逐链管理的跨链方案。ChainKeeper集成了几个关键组件,包括模块化节点代理程序,可验证节点随机选择方法(VNRS)和可验证身份阈值签名方法(VITS)。这些组件协同工作以确保整个跨链过程的通用性、效率和安全性。该方案能够抵御来自业务节点和监管节点的恶意行为和协同攻击。实验结果证明了ChainKeeper在跨链监管场景下的有效性。Yu等人提出了SPRA,这是一种基于策略的监管架构,旨在监管区块链交易。该架构包括四层:权限层、监管层、网桥层和业务层。为了促进这些层之间的互操作性,他们引入了XRPL,一种监管策略描述语言。监管层采用了基于Shamir阈值秘密共享算法和Pedersen承诺的去中心化陪审团机制JuryBC。在业务层,他们实现了RDShare,这是一种安全高效的监管数据共享机制,利用基于属性的加密。本期特刊精选的所有论文都展示了区块链及其应用安全领域的不断进步。然而,重要的是要认识到区块链及其应用中的安全和隐私问题继续构成重大挑战。这些挑战是进一步研究和探索新技术的动力。他们强调需要不断努力加强区块链的安全和隐私方面,培养一个更具弹性和可信赖的区块链生态系统。王良民,1999年毕业于中国吉林大学计算数学专业,2007年毕业于中国西安电子科技大学密码学专业,获博士学位。他是中国南京东南大学网络科学与工程学院的全职教授。2013年11月被授予安徽省“万江学者”称号。现在他的研究兴趣包括数据安全和隐私。他在IEEE/ACM Transactions on Networking和IEEE international Conference on Computer Communications等高级国际期刊和会议上发表了70多篇技术论文。他曾担任许多IEEE会议的TPC成员,如IEEE ICC, IEEE HPCC, IEEE Trust-COM。维克多。 他于2003年获得加拿大新不伦瑞克大学计算机科学硕士学位,并于2007年获得加拿大安大略省西部大学计算机科学博士学位。他是德克萨斯理工大学计算机科学副教授,也是数据分析实验室(DAL)的创始主任。主要研究方向为数据挖掘、机器学习及相关应用。在获得博士学位后,他曾在纽约大学斯特恩商学院担任副研究员和NSERC信息系统博士后。他是IEEE的高级会员和ACM的终身会员。他获得了KDD ' 20的研究时间检验奖,KDD ' 08的最佳论文奖亚军,ICDM ' 11的最佳论文奖。他是几个国际顶级会议的区域主席和SPC/PC成员,也是几个国际期刊的副主编。Boris d<e:1>,丹麦哥本哈根大学计算机科学系(DIKU)副教授。他是软件工程研究小组的负责人。DIKU的正式方法。他的主要研究方向是可信分布式系统软件工程中的形式化方法和编程语言,主要研究具有高可靠性保证的自适应系统的自动程序生成。他正在研究可靠和安全的大数据生态系统的计算基础。他的研究为计算机科学的正式基础和复杂的工业应用架起了桥梁。吴海琴于2014年和2019年分别获得江苏大学计算机科学学士学位和计算机应用技术博士学位。华东师范大学上海市可信计算重点实验室(软件工程研究所)副教授。在加入华东师大之前,她是丹麦哥本哈根大学计算机科学系博士后研究员。她也是美国亚利桑那州立大学计算机、信息学和决策系统工程学院的访问学生。她的研究兴趣包括数据安全和隐私保护、移动众测/众包以及基于区块链的应用。朱慧娟,2010年在江苏大学计算机科学与通信工程学院获得硕士学位,2017年在中国科学院大学计算机与控制工程学院获得博士学位。她的研究兴趣包括恶意软件检测和机器学习。她是江苏大学计算机科学与通信工程学院副教授。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
1.80
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信