Skip to main content

Detecting Security Breaches on Smart Contracts Through Techniques and Tools a Brief Review: Applications and Challenges

  • Conference paper
  • First Online:
Proceedings of the 2nd International Conference on Cognitive and Intelligent Computing (ICCIC 2022)

Abstract

In the recent decade, blockchain became a promising platform in the perception of security in almost all sectors, especially in the financial sector its contribution is phenomenal. Blockchain-enabled applications doesn’t need third-party intervention while ensuring transparency since all the operations pertaining to use cases are well designed through smart contracts. A smart contract is designed to facilitate, verify, and execute the agreement between multiple untrusted parties, with tamper-resistance. Though the applications run on blockchain platforms are tamper-proof, the intruder may find unnoticed vulnerabilities in a smart contract to jeopardize the system. This paper highlights the importance of deterministic smart contracts along with the anticipated attacks. Then, a discussion on the detection of attacks using various techniques and tools is presented. Finally, research gaps identified are manifested to guide the researcher to precede further on smart contract security breaches.

Supported by organization VIT-VELLORE

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ramaiah M et al (2023) A review of security vulnerabilities in industry 4.0 application and the possible solutions using blockchain. Cyber Secur Appl Ind 4:63–95

    Google Scholar 

  2. Humayun M et al (2021) Internet of things and ransomware: evolution, mitigation and prevention. Egypt Informatics J 22(1):105–117. https://doi.org/10.1016/j.eij.2020.05.003

    Article  Google Scholar 

  3. Hutchison D et al (2012) Open problems in network security. IFIPWG 11.4 Int. iN-etSec 2011, vol 7039, p 168. https://doi.org/10.1007/978-3-319-39028-4

  4. Wang S et al (2019) Blockchain-enabled smart contracts: architecture, applications, and future trends. IEEE Trans Syst Man Cybern Syst 49(11):2266–2277. https://doi.org/10.1109/TSMC.2019.2895123

  5. Tikhomirov S et al (2018) SmartCheck: static analysis of ethereum smart contracts. In: Proceedings international conference on software engineering, October 2017, pp 9–16. https://doi.org/10.1145/3194113.3194115

  6. Samreen NF, Alalfi MH (2021) SmartScan: an approach to detect denial of service vulnerability in ethereum smart contracts. In: Proceedings 2021 IEEE/ACM 4th international workshop on emerging trends in software engineering for blockchain, WETSEB 2021, pp 17–26. https://doi.org/10.1109/WETSEB52558.2021.00010

  7. Usman TA et al (2021) An analysis of ethereum smart contract vulnerabilities. In: 14th International conference information security and cryptology, ISCTURKEY 2021—Proceedings, no. December, pp 99–104. https://doi.org/10.1109/ISCTURKEY53027.2021.9654305

  8. Pan Z et al (2022) ReDefender: a tool for detecting reentrancy vulnerabilities in smart contracts effectively, pp 915–925. https://doi.org/10.1109/qrs54544.2021.00101

  9. Akca S et al (2019) SolAnalyser: a framework for analysing and testing smart contracts. In: Proceedings—Asia-Pacific software engineering conference APSEC, vol 2019-December, pp 482–489. https://doi.org/10.1109/APSEC48747.2019.00071

  10. Noor Aidee NA et al (2021) Vulnerability assessment on ethereum based smart contract applications. In: 2021 IEEE international conference on automatic control and intelligent systems I2CACIS 2021—Proceedings, June, pp 13–18. https://doi.org/10.1109/I2CACIS52118.2021.9495892

  11. Chen J et al (2022) DefectChecker: automated smart contract defect detection by analyzing EVM bytecode. IEEE Trans Softw Eng 48(7):2189–2207. https://doi.org/10.1109/TSE.2021.3054928

    Article  Google Scholar 

  12. Narayana KL, Sathiyamurthy K (2022) Automation and smart materials in detecting smart contracts vulnerabilities in Blockchain using deep learning. Mater Today Proc. https://doi.org/10.1016/j.matpr.2021.04.125

  13. Kushwaha SS et al (2022) Systematic review of security vulnerabilities in ethereum blockchain smart contract. IEEE Access 10:6605–6621. https://doi.org/10.1109/ACCESS.2021.3140091

    Article  Google Scholar 

  14. Khatoon A (2020) A blockchain-based smart contract system for healthcare management. Electronics 9(1). https://doi.org/10.3390/electronics9010094

  15. Philip AO, Saravanaguru RAK (2020) Secure incident evidence management framework (SIEMF) for Internet of vehicles using deep learning and blockchain. Open Comput Sci 10(1):408–421. https://doi.org/10.1515/comp-2019-0022

    Article  Google Scholar 

  16. Aleksieva V et al (2019) Application of smart contracts based on ethereum blockchain for the purpose of insurance services. In: Proceedings international conference biomed innovations and applications. BIA 2019, pp 18–21. https://doi.org/10.1109/BIA48344.2019.8967468

  17. Putra DR et al (2019) Blockchain and smart-contract for scalable access control in Internet of Things. In: Proceeding—2019 International conference ICT Smart Soc Innov Transform Towards Smart Reg ICISS 2019. https://doi.org/10.1109/ICISS48059.2019.8969807

  18. Karamitsos I et al (2018) Design of the blockchain smart contract: a use case for real estate. J Inf Secur 09(03):177–190. https://doi.org/10.4236/jis.2018.93013

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Mangayarkarasi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Padma, A., Mangayarkarasi, R. (2023). Detecting Security Breaches on Smart Contracts Through Techniques and Tools a Brief Review: Applications and Challenges. In: Kumar, A., Ghinea, G., Merugu, S. (eds) Proceedings of the 2nd International Conference on Cognitive and Intelligent Computing. ICCIC 2022. Cognitive Science and Technology. Springer, Singapore. https://doi.org/10.1007/978-981-99-2742-5_38

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-2742-5_38

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-2741-8

  • Online ISBN: 978-981-99-2742-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics