2,457 research outputs found
EASYFLOW: Keep Ethereum Away From Overflow
While Ethereum smart contracts enabled a wide range of blockchain
applications, they are extremely vulnerable to different forms of security
attacks. Due to the fact that transactions to smart contracts commonly involve
cryptocurrency transfer, any successful attacks can lead to money loss or even
financial disorder. In this paper, we focus on the overflow attacks in Ethereum
, mainly because they widely rooted in many smart contracts and comparatively
easy to exploit. We have developed EASYFLOW , an overflow detector at Ethereum
Virtual Machine level. The key insight behind EASYFLOW is a taint analysis
based tracking technique to analyze the propagation of involved taints.
Specifically, EASYFLOW can not only divide smart contracts into safe contracts,
manifested overflows, well-protected overflows and potential overflows, but
also automatically generate transactions to trigger potential overflows. In our
preliminary evaluation, EASYFLOW managed to find potentially vulnerable
Ethereum contracts with little runtime overhead.Comment: Proceedings of the 41st International Conference on Software
Engineering: Companion Proceedings. IEEE Press, 201
Nonstationary two-stage multisplitting methods for symmetric positive definite matrices
AbstractNonstationary synchronous two-stage multisplitting methods for the solution of the symmetric positive definite linear system of equations are considered. The convergence properties of these methods are studied. Relaxed variants are also discussed. The main tool for the construction of the two-stage multisplitting and related theoretical investigation is the diagonally compensated reduction (cf. [1])
Prediction of the aerodynamic performance of the Mexico rotor by using airfoil data extracted from CFD
- …