Detailed Information

Cited 0 time in webofscience Cited 3 time in scopus
Metadata Downloads

A study on chaincode security weakness detector in hyperledger fabric blockchain framework for it development

Full metadata record
DC Field Value Language
dc.contributor.authorKim, S.-
dc.contributor.authorSon, Y.-
dc.contributor.authorLee, Y.-
dc.date.accessioned2023-04-28T00:41:11Z-
dc.date.available2023-04-28T00:41:11Z-
dc.date.issued2020-10-
dc.identifier.issn1904-4720-
dc.identifier.issn2245-4586-
dc.identifier.urihttps://scholarworks.dongguk.edu/handle/sw.dongguk/7118-
dc.description.abstractThe hyperledger fabric is a modular blockchain framework used by private companies to develop blockchain-based products, solutions, and applications using plug-and-play components. Smart contracts running in this framework are created by implementing chaincode for IT Development. When implementing the chaincode, there may be a security weakness that is the root cause of the security vulnerability in the code. If the chaincode with the security weakness is completed and a block is created, the chaincode with the inherent security weakness creates a security threat because the contract cannot be modified arbitrarily.The hyperledger fabric is a modular blockchain framework used by private companies to develop blockchain-based products, solutions, and applications using plug-and-play components. Smart contracts running in this framework are created by implementing chaincode. When implementing the chaincode, there may be a security weakness that is the root cause of the security vulnerability in the code. If the chaincode with the security weakness is completed and a block is created, the chaincode with the inherent security weakness creates a security threat because the contract cannot be modified arbitrarily. © 2020 Alpha Publishers. All rights reserved.-
dc.format.extent25-
dc.language영어-
dc.language.isoENG-
dc.publisherAlpha Publishers-
dc.titleA study on chaincode security weakness detector in hyperledger fabric blockchain framework for it development-
dc.typeArticle-
dc.publisher.location덴마크-
dc.identifier.scopusid2-s2.0-85096595935-
dc.identifier.bibliographicCitationJournal of Green Engineering, v.10, no.10, pp 7820 - 7844-
dc.citation.titleJournal of Green Engineering-
dc.citation.volume10-
dc.citation.number10-
dc.citation.startPage7820-
dc.citation.endPage7844-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordAuthorCloud Computing-
dc.subject.keywordAuthorControl Flow Graph-
dc.subject.keywordAuthorEcurity Weakness Analysis-
dc.subject.keywordAuthorLoop Unrolling-
dc.subject.keywordAuthorSMT(Satisfiability Modulo Theory) Solver-
dc.subject.keywordAuthorSVM(Smart Virtual Machine)-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Advanced Convergence Engineering > Department of Computer Science and Artificial Intelligence > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Son, Yun Sik photo

Son, Yun Sik
College of Advanced Convergence Engineering (Department of Computer Science and Artificial Intelligence)
Read more

Altmetrics

Total Views & Downloads

BROWSE