Cited 2 time in
A study on the security weakness analysis of chaincode on hyperledger fabric and ethereum blockchain framework
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Kim, S. | - |
| dc.contributor.author | Son, Y. | - |
| dc.contributor.author | Lee, Y. | - |
| dc.date.accessioned | 2023-04-28T00:41:11Z | - |
| dc.date.available | 2023-04-28T00:41:11Z | - |
| dc.date.issued | 2020-09 | - |
| dc.identifier.issn | 1904-4720 | - |
| dc.identifier.issn | 2245-4586 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/7116 | - |
| dc.description.abstract | The hyperledger fabric and the ethereum, a blockchain framework, are used for developing blockchain solutions and applications in a modular architecture. It also is used as a technology for developing blockchain-based products, solutions and applications in enterprises. The chaincode is used to write smart contracts that work with these frameworks, which may contain security weaknesses inside the chaincode. Due to the nature of blockchain, no one can modify the contract arbitrarily when the contract is completed and the block is created. Therefore, if the chaincode with the security weakness is contracted, it cannot be modified. Therefore, smart contracts which is implemented with chaincode must be analyzed for security weaknesses before the smart contract is completed.This paper define the security weakness items of the chaincode to analyze the security weaknesses of the chaincode running on the hyperledger fabric blockchain network and the ethereum, and among the defined items, a study have been conducted to diagnose security weakness items that can be analyzed through AST (Abstract Syntax Tree) traversal. By analyzing the security weaknesses of the chaincode, it can ensure safety and prevent the risk of hacking. In addition, the smart contract can be executed safely and efficient operation can be expected. © 2020 Alpha Publishers. All rights reserved. | - |
| dc.format.extent | 19 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Alpha Publishers | - |
| dc.title | A study on the security weakness analysis of chaincode on hyperledger fabric and ethereum blockchain framework | - |
| dc.type | Article | - |
| dc.publisher.location | 덴마크 | - |
| dc.identifier.scopusid | 2-s2.0-85094154906 | - |
| dc.identifier.bibliographicCitation | Journal of Green Engineering, v.10, no.9, pp 6349 - 6367 | - |
| dc.citation.title | Journal of Green Engineering | - |
| dc.citation.volume | 10 | - |
| dc.citation.number | 9 | - |
| dc.citation.startPage | 6349 | - |
| dc.citation.endPage | 6367 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.subject.keywordAuthor | AST(Abstract Syntax Tree) | - |
| dc.subject.keywordAuthor | Blockchain | - |
| dc.subject.keywordAuthor | Chaincode | - |
| dc.subject.keywordAuthor | Control Flow Graph | - |
| dc.subject.keywordAuthor | Ethereum | - |
| dc.subject.keywordAuthor | Hyperledger Fabric | - |
| dc.subject.keywordAuthor | Security Weakness Analysis | - |
| dc.subject.keywordAuthor | Smart Contract | - |
| dc.subject.keywordAuthor | SVM(Smart Virtual Machine) | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
