Fundamentals of smart contract security /

Saved in:
Bibliographic Details
Author / Creator:Ma, Richard, author.
Imprint:New York, New York (222 East 46th Street, New York, NY 10017) : Momentum Press, 2019.
Description:1 online resource (1 PDF (xxiv, 137 pages)) : illustrations (some color)
Language:English
Series:Computer engineering foundations, currents, and trajectories collection
Computer engineering foundations, currents, and trajectories collection.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/13456099
Hidden Bibliographic Details
Other authors / contributors:Gorzny, Jan, author.
Zulkoski, Edward, author.
Bak, Kacper, author.
Mack, Olga V., author.
Honda, Keisuke, writer of foreword.
ISBN:1949449378
9781949449372
9781949449365
Notes:Includes bibliographical references (pages 119-124) and index.
PDF viewed 05/28/2019.
Summary:Smart contracts are an innovative application of blockchain technology. Acting as decentralized custodians of digital assets, they allow us to transfer value and information more effectively by reducing the need to trust a third party. By eliminating the need for intermediaries, smart contracts have the potential to massively scale the world economy and unleash the potential for faster and more effcient solutions than traditional systems could ever provide. But there's one catch: while blockchains are secure, smart contracts are not. Security vulnerabilities in smart contracts have led to over 250 million USD in value to be lost or stolen. For smart contract technology to achieve its full potential, these security vulnerabilities need to be addressed. Written by security experts at the forefront of this dynamic industry, this book teaches state-of-the-art smart contract security principles and practices. Help us secure the future of blockchain technology and join us at the forefront today.
Other form:Print version: 9781949449365

MARC

LEADER 00000cam a2200000Mi 4500
001 13456099
006 m eo d
007 cr cn||||m|||a
008 190417s2019 nyua fob 001 0 eng d
005 20240415220615.3
035 |a (OCoLC)1102625314 
035 9 |a (OCLCCM-CC)1102625314 
040 |a NYMPP  |b eng  |e rda  |c NYMPP  |d YDX  |d OCLCF  |d OCLCQ  |d OCLCO  |d N$T  |d OCLCO 
020 |a 1949449378 
020 |a 9781949449372  |q (electronic bk.) 
020 |z 9781949449365  |q (print) 
050 4 |a HG1710  |b .M37 2019eb 
049 |a MAIN 
100 1 |a Ma, Richard,  |e author. 
245 1 0 |a Fundamentals of smart contract security /  |c Richard Ma, Jan Gorzny, Edward Zulkoski, Kacper Bak, and Olga V. Mack ; foreword by Keisuke Honda. 
264 1 |a New York, New York (222 East 46th Street, New York, NY 10017) :  |b Momentum Press,  |c 2019. 
300 |a 1 online resource (1 PDF (xxiv, 137 pages)) :  |b illustrations (some color) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 isbdmedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Computer engineering foundations, currents, and trajectories collection 
504 |a Includes bibliographical references (pages 119-124) and index. 
505 0 |a 1. Introduction. 1.1. What are smart contracts? ; 1.2. A brief history of smart contracts ; 1.3. Uses of smart contracts ; 1.4. Where can smart contracts be used? ; 1.5. Major hacks ; 1.6. The need for secure smart contracts -- 2. The state of blockchain security. 2.1. Blockchain fundamentals ; 2.2. Blockchain environment security layers -- 3. Design choices, design flaws, and cryptoeconomics. 3.1. Design choices ; 3.2. Design flaws ; 3.3. Cryptoeconomics -- 4. Common security flaws. 4.1. Transactions on ethereum in depth ; 4.2. Integer overflows and underflows ; 4.3. Race conditions in ERC20 ; 4.4 Re-entrancy ; 4.5. Transaction-ordering dependence (TOD) and front running ; 4.6. Timestamp dependence ; 4.7. Denial-of-service: exceeding block gas limit ; 4.8. Denial-of-service: transaction revert ; 4.9. Attempts to generate random numbers ; 4.10. Ensuring contracts are called by humans ; 4.11. Zero initial balance assumption ; 4.12. Deprecated call stack depth attack ; 4.13. Library design flaws ; 4.14. Exception handling ; 4.15. Validated arguments and the ethereum short address attack -- 5. Writing secure smart contracts. 5.1. Engineering processes and standards; 5.2. Testing ; 5.3. Automated smart contract analysis with symbolic execution ; 5.4. Securify ; 5.5. Audits ; 5.6. Guidelines -- 6. Conclusion. 6.1. Security is a business strategy, not just a technical challenge ; 6.2. Applying an iterative approach to security ; 6.3. Security is a holistic problem that involves people, systems and processes ; 6.4. Building the world of programmable money together. 
520 3 |a Smart contracts are an innovative application of blockchain technology. Acting as decentralized custodians of digital assets, they allow us to transfer value and information more effectively by reducing the need to trust a third party. By eliminating the need for intermediaries, smart contracts have the potential to massively scale the world economy and unleash the potential for faster and more effcient solutions than traditional systems could ever provide. But there's one catch: while blockchains are secure, smart contracts are not. Security vulnerabilities in smart contracts have led to over 250 million USD in value to be lost or stolen. For smart contract technology to achieve its full potential, these security vulnerabilities need to be addressed. Written by security experts at the forefront of this dynamic industry, this book teaches state-of-the-art smart contract security principles and practices. Help us secure the future of blockchain technology and join us at the forefront today. 
588 0 |a PDF viewed 05/28/2019. 
650 0 |a Blockchains (Databases)  |0 http://id.loc.gov/authorities/subjects/sh2016002790 
650 0 |a Data encryption (Computer science)  |0 http://id.loc.gov/authorities/subjects/sh94001524 
650 0 |a Electronic funds transfers.  |0 http://id.loc.gov/authorities/subjects/sh85042329 
650 6 |a Chaînes de blocs. 
650 6 |a Chiffrement (Informatique) 
650 6 |a Transferts électroniques de fonds. 
650 7 |a Blockchains (Databases)  |2 fast  |0 (OCoLC)fst01981761 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
650 7 |a Electronic funds transfers.  |2 fast  |0 (OCoLC)fst00907204 
653 |a Blockchain. 
653 |a Smart contracts. 
653 |a Smart contracts law. 
653 |a Security. 
653 |a Cybersecurity. 
653 |a DLT. 
653 |a Distributed ledger technology. 
653 |a Ethereum. 
653 |a Cryptocurrencies. 
653 |a Bitcoin. 
653 |a Fintech. 
653 |a Innovation. 
653 |a Decentralization. 
653 |a Blockchain programming. 
653 |a Blockchain applications. 
653 |a Solidity. 
653 |a Cryptography. 
655 4 |a Electronic books. 
700 1 |a Gorzny, Jan,  |e author. 
700 1 |a Zulkoski, Edward,  |e author. 
700 1 |a Bak, Kacper,  |e author. 
700 1 |a Mack, Olga V.,  |e author. 
700 1 |a Honda, Keisuke,  |e writer of foreword. 
776 0 8 |i Print version:  |z 9781949449365 
830 0 |a Computer engineering foundations, currents, and trajectories collection. 
856 4 0 |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e000xna&AN=2145748  |y eBooks on EBSCOhost 
929 |a oclccm 
999 f f |s 1ed7d6b0-361b-4d43-b3f5-2466a5ed4739  |i 26d15050-5d50-4b4c-83ea-53c9120eb195 
928 |t Library of Congress classification  |a HG1710.M37 2019eb  |l Online  |c UC-FullText  |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e000xna&AN=2145748  |z eBooks on EBSCOhost  |g ebooks  |i 13597758