{"title":"以太坊智能合约漏洞分析","authors":"Turgay Arda Usman, A. Selçuk, Süleyman Özarslan","doi":"10.1109/ISCTURKEY53027.2021.9654305","DOIUrl":null,"url":null,"abstract":"New vulnerabilities are constantly being discovered in Ethereum and the found vulnerabilities are fixed. This situation causes many vulnerabilities to be effective periodically. This article analyzes the smart contracts deployed on the Ethereum blockchain in 2020 and examines the ten most common vulnerabilities. By doing so, we aimed to determine a threat landscape for 2020. During this analysis, we studied how the vulnerabilities emerged, critical attacks that exploit the vulnerabilities, and what can be done to avoid them.","PeriodicalId":383915,"journal":{"name":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Analysis of Ethereum Smart Contract Vulnerabilities\",\"authors\":\"Turgay Arda Usman, A. Selçuk, Süleyman Özarslan\",\"doi\":\"10.1109/ISCTURKEY53027.2021.9654305\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"New vulnerabilities are constantly being discovered in Ethereum and the found vulnerabilities are fixed. This situation causes many vulnerabilities to be effective periodically. This article analyzes the smart contracts deployed on the Ethereum blockchain in 2020 and examines the ten most common vulnerabilities. By doing so, we aimed to determine a threat landscape for 2020. During this analysis, we studied how the vulnerabilities emerged, critical attacks that exploit the vulnerabilities, and what can be done to avoid them.\",\"PeriodicalId\":383915,\"journal\":{\"name\":\"2021 International Conference on Information Security and Cryptology (ISCTURKEY)\",\"volume\":\"52 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Information Security and Cryptology (ISCTURKEY)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCTURKEY53027.2021.9654305\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Information Security and Cryptology (ISCTURKEY)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCTURKEY53027.2021.9654305","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Analysis of Ethereum Smart Contract Vulnerabilities
New vulnerabilities are constantly being discovered in Ethereum and the found vulnerabilities are fixed. This situation causes many vulnerabilities to be effective periodically. This article analyzes the smart contracts deployed on the Ethereum blockchain in 2020 and examines the ten most common vulnerabilities. By doing so, we aimed to determine a threat landscape for 2020. During this analysis, we studied how the vulnerabilities emerged, critical attacks that exploit the vulnerabilities, and what can be done to avoid them.