Blockchain Technology and Vulnerability Exploits on Smart Contracts

Darvishi, Iman, Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274, Bismark, Tei Asare, Oseni, Waheed, Musa, Ahmad and Ganiyu, Aishat (2024) Blockchain Technology and Vulnerability Exploits on Smart Contracts. In: IEEE The 11th International Conference on Future Internet of Things and Cloud (FiCloud 2024), 19-21 Aug 2024, Vienna, Austria. (In Press)

[thumbnail of Blockchain Technology and Vulnerability Exploits on Smart Contracts - UWL Repo.pdf]
Preview
PDF
Blockchain Technology and Vulnerability Exploits on Smart Contracts - UWL Repo.pdf - Accepted Version

Download (746kB) | Preview

Abstract

The immutability of smart-contract characteristics is a significant key benefit of blockchain. However, after we deploy a smart contract in a blockchain, we cannot change, modify, or debug it. Further, wrong or vulnerable coding implementation in smart contracts could have error output that may have severe consequences in the future. Thus, the challenge of finding vulnerabilities in the smart contract is vital to stop criminals from performing malicious exploits during Defi transactions. The paper explores Blockchain Technology in Smart Contracts to detect vulnerability exploits focused on general purchase agreements and smart contracts. The novelty contributions of the paper are threefold: First, we explore the existing blockchain vulnerabilities and how attackers exploit decentralized financial transactions (Defi), including re-entrancy attacks, 51% attacks, and double spending issues. Secondly, we set up a Remix virtual platform using the solidity tool to demonstrate a purchase agreement between client and seller that can interact in a smart contract to determine how it can be exploited. The implementations show how the attacker can call the withdraw function recursively before the transaction updates the balance during transaction procedures. Finally, we recommend control mechanisms to improve blockchain security in the purchase agreement and re-entrancy attacks. Our results show that re-entrancy attacks and purchase agreement smart contracts can be secured by developing modifiers to update the bank balance before completing transactions.

Item Type: Conference or Workshop Item (Paper)
Depositing User: Dr Abel Yeboah-Ofori
Date Deposited: 22 Aug 2024 07:02
Last Modified: 22 Aug 2024 08:00
URI: https://repository.uwl.ac.uk/id/eprint/12337

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu