Cited 3 time in
A study on chaincode security weakness detector in hyperledger fabric blockchain framework for it development
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Kim, S. | - |
| dc.contributor.author | Son, Y. | - |
| dc.contributor.author | Lee, Y. | - |
| dc.date.accessioned | 2023-04-28T00:41:11Z | - |
| dc.date.available | 2023-04-28T00:41:11Z | - |
| dc.date.issued | 2020-10 | - |
| dc.identifier.issn | 1904-4720 | - |
| dc.identifier.issn | 2245-4586 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/7118 | - |
| dc.description.abstract | The hyperledger fabric is a modular blockchain framework used by private companies to develop blockchain-based products, solutions, and applications using plug-and-play components. Smart contracts running in this framework are created by implementing chaincode for IT Development. When implementing the chaincode, there may be a security weakness that is the root cause of the security vulnerability in the code. If the chaincode with the security weakness is completed and a block is created, the chaincode with the inherent security weakness creates a security threat because the contract cannot be modified arbitrarily.The hyperledger fabric is a modular blockchain framework used by private companies to develop blockchain-based products, solutions, and applications using plug-and-play components. Smart contracts running in this framework are created by implementing chaincode. When implementing the chaincode, there may be a security weakness that is the root cause of the security vulnerability in the code. If the chaincode with the security weakness is completed and a block is created, the chaincode with the inherent security weakness creates a security threat because the contract cannot be modified arbitrarily. © 2020 Alpha Publishers. All rights reserved. | - |
| dc.format.extent | 25 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Alpha Publishers | - |
| dc.title | A study on chaincode security weakness detector in hyperledger fabric blockchain framework for it development | - |
| dc.type | Article | - |
| dc.publisher.location | 덴마크 | - |
| dc.identifier.scopusid | 2-s2.0-85096595935 | - |
| dc.identifier.bibliographicCitation | Journal of Green Engineering, v.10, no.10, pp 7820 - 7844 | - |
| dc.citation.title | Journal of Green Engineering | - |
| dc.citation.volume | 10 | - |
| dc.citation.number | 10 | - |
| dc.citation.startPage | 7820 | - |
| dc.citation.endPage | 7844 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.subject.keywordAuthor | Cloud Computing | - |
| dc.subject.keywordAuthor | Control Flow Graph | - |
| dc.subject.keywordAuthor | Ecurity Weakness Analysis | - |
| dc.subject.keywordAuthor | Loop Unrolling | - |
| dc.subject.keywordAuthor | SMT(Satisfiability Modulo Theory) Solver | - |
| dc.subject.keywordAuthor | SVM(Smart Virtual Machine) | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
