{"title":"使用高粒度度量的智能合约自适应安全性","authors":"Venkata Siva Vijayendra Bhamidipati, Michael Chan, Derek Chamorro, Arpit Jain, Ashok Srinivasa Murthy","doi":"10.1145/3387168.3387214","DOIUrl":null,"url":null,"abstract":"In this work, we present a systems centric approach towards implementing security in Blockchain ecosystems. First, we detail the motivation for our security approach. Then, we detail the foundation of this approach by describing the concept of inline, Non-invasive High Granularity Metrics (HGMs). Following this, we outline how such metrics can be used effectively to monitor Blockchain ecosystems to detect behavior that is not deemed secure. We describe how they can be used to build whitelist and blacklist access controls in an adaptive manner, and then describe how they can be effectively used to detect potentially malicious behavior that is not yet baked into the access control structures. Finally, we discuss scalability and potential improvements for future work.","PeriodicalId":346739,"journal":{"name":"Proceedings of the 3rd International Conference on Vision, Image and Signal Processing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Adaptive Security for Smart Contracts using High Granularity Metrics\",\"authors\":\"Venkata Siva Vijayendra Bhamidipati, Michael Chan, Derek Chamorro, Arpit Jain, Ashok Srinivasa Murthy\",\"doi\":\"10.1145/3387168.3387214\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this work, we present a systems centric approach towards implementing security in Blockchain ecosystems. First, we detail the motivation for our security approach. Then, we detail the foundation of this approach by describing the concept of inline, Non-invasive High Granularity Metrics (HGMs). Following this, we outline how such metrics can be used effectively to monitor Blockchain ecosystems to detect behavior that is not deemed secure. We describe how they can be used to build whitelist and blacklist access controls in an adaptive manner, and then describe how they can be effectively used to detect potentially malicious behavior that is not yet baked into the access control structures. Finally, we discuss scalability and potential improvements for future work.\",\"PeriodicalId\":346739,\"journal\":{\"name\":\"Proceedings of the 3rd International Conference on Vision, Image and Signal Processing\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-08-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 3rd International Conference on Vision, Image and Signal Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3387168.3387214\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 3rd International Conference on Vision, Image and Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3387168.3387214","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Adaptive Security for Smart Contracts using High Granularity Metrics
In this work, we present a systems centric approach towards implementing security in Blockchain ecosystems. First, we detail the motivation for our security approach. Then, we detail the foundation of this approach by describing the concept of inline, Non-invasive High Granularity Metrics (HGMs). Following this, we outline how such metrics can be used effectively to monitor Blockchain ecosystems to detect behavior that is not deemed secure. We describe how they can be used to build whitelist and blacklist access controls in an adaptive manner, and then describe how they can be effectively used to detect potentially malicious behavior that is not yet baked into the access control structures. Finally, we discuss scalability and potential improvements for future work.