D. Sebastian-Cardenas, Sri Nikhil Gupta Gourisetti, S. Saha, Komal Khan, Leonard C. Tillman, U. Cali, Tamara Hughes
{"title":"能源领域智能合约的网络安全和隐私方面","authors":"D. Sebastian-Cardenas, Sri Nikhil Gupta Gourisetti, S. Saha, Komal Khan, Leonard C. Tillman, U. Cali, Tamara Hughes","doi":"10.1109/iGETblockchain56591.2022.10087129","DOIUrl":null,"url":null,"abstract":"Smart contracts (SCs) are a set of logical procedures that can be run by individual peers participating within a Distributed Ledger Technology (DLT) network. By design, smart contracts inherit many of the benefits of DLT, including its immutability, scalability and security properties. Nevertheless, they may introduce additional attack vectors, which can lead to cybersecurity explorations that could jeopardize the end-application’s ability to operate as intended or result in data leaks, and privacy violations. In this work an exploration of known problems, and possible attack scenarios will be presented. This is followed by a set of proposed best practices that are intended to assist developers, researchers and other relevant stakeholders to develop secure SC implementations.","PeriodicalId":186049,"journal":{"name":"2022 IEEE 1st Global Emerging Technology Blockchain Forum: Blockchain & Beyond (iGETblockchain)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Cybersecurity and Privacy Aspects of Smart Contracts in the Energy Domain\",\"authors\":\"D. Sebastian-Cardenas, Sri Nikhil Gupta Gourisetti, S. Saha, Komal Khan, Leonard C. Tillman, U. Cali, Tamara Hughes\",\"doi\":\"10.1109/iGETblockchain56591.2022.10087129\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Smart contracts (SCs) are a set of logical procedures that can be run by individual peers participating within a Distributed Ledger Technology (DLT) network. By design, smart contracts inherit many of the benefits of DLT, including its immutability, scalability and security properties. Nevertheless, they may introduce additional attack vectors, which can lead to cybersecurity explorations that could jeopardize the end-application’s ability to operate as intended or result in data leaks, and privacy violations. In this work an exploration of known problems, and possible attack scenarios will be presented. This is followed by a set of proposed best practices that are intended to assist developers, researchers and other relevant stakeholders to develop secure SC implementations.\",\"PeriodicalId\":186049,\"journal\":{\"name\":\"2022 IEEE 1st Global Emerging Technology Blockchain Forum: Blockchain & Beyond (iGETblockchain)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 1st Global Emerging Technology Blockchain Forum: Blockchain & Beyond (iGETblockchain)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iGETblockchain56591.2022.10087129\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 1st Global Emerging Technology Blockchain Forum: Blockchain & Beyond (iGETblockchain)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iGETblockchain56591.2022.10087129","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cybersecurity and Privacy Aspects of Smart Contracts in the Energy Domain
Smart contracts (SCs) are a set of logical procedures that can be run by individual peers participating within a Distributed Ledger Technology (DLT) network. By design, smart contracts inherit many of the benefits of DLT, including its immutability, scalability and security properties. Nevertheless, they may introduce additional attack vectors, which can lead to cybersecurity explorations that could jeopardize the end-application’s ability to operate as intended or result in data leaks, and privacy violations. In this work an exploration of known problems, and possible attack scenarios will be presented. This is followed by a set of proposed best practices that are intended to assist developers, researchers and other relevant stakeholders to develop secure SC implementations.