![]() Ferreira Torres, Christof ![]() ![]() ![]() Poster (2019) In recent years, smart contracts have suffered major exploits, losing millions of dollars. Unlike traditional programs, smart contracts cannot be updated once deployed. Though various tools were pro ... [more ▼] In recent years, smart contracts have suffered major exploits, losing millions of dollars. Unlike traditional programs, smart contracts cannot be updated once deployed. Though various tools were pro- posed to detect vulnerable smart contracts, they all fail to protect contracts that have already been deployed on the blockchain. More- over, they focus on vulnerabilities, but do not address scams (e.g., honeypots). In this work, we introduce ÆGIS, a tool that shields smart contracts and users on the blockchain from being exploited. To this end, ÆGIS reverts transactions in real-time based on pat- tern matching. These patterns encode the detection of malicious transactions that trigger exploits or scams. New patterns are voted upon and stored via a smart contract, thus leveraging the benefits of tamper-resistance and transparency provided by blockchain. By allowing its protection to be updated, the smart contract acts as a smart shield. [less ▲] Detailed reference viewed: 72 (5 UL)![]() Jonker, Hugo ![]() ![]() ![]() in 23rd Security Protocols Workshop (2015) Detailed reference viewed: 118 (5 UL)![]() ; Jonker, Hugo ![]() in 7th conference on Fun with Algorithms (FUN'14), Lipari Island, Sicily, Italy, July 1--3, 2014 (2014) Detailed reference viewed: 89 (0 UL)![]() Dong, Naipeng ![]() ![]() ![]() in Proceedings of the 18th European Symposium on Research in Computer Security (2013) Detailed reference viewed: 108 (2 UL)![]() ; ; et al in Proc.\ 16. Internationales Rechtsinformatik Symposion (IRIS2013) (2013) Detailed reference viewed: 57 (3 UL)![]() ; Jonker, Hugo ![]() in Proc. 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013) (2013) Detailed reference viewed: 94 (1 UL)![]() ; ; et al in Proc. 5th conference on eParticipation (ePart 2013) (2013) Detailed reference viewed: 57 (1 UL)![]() Jonker, Hugo ![]() ![]() ![]() in Computer Science Review (2013) Detailed reference viewed: 177 (0 UL)![]() ; ; Jonker, Hugo ![]() Scientific Conference (2013) Detailed reference viewed: 48 (0 UL)![]() Dong, Naipeng ![]() ![]() ![]() in Proc. 17th European Symposium on Research in Computer Security (2012) Detailed reference viewed: 109 (6 UL)![]() ; Jonker, Hugo ![]() in Proc. 5th International Conference on Electronic Voting (EVOTE'12) (2012) Detailed reference viewed: 43 (0 UL)![]() Jonker, Hugo ![]() ![]() ![]() in Digital Enlightenment Yearbook 2012 (2012) Detailed reference viewed: 96 (5 UL)![]() Dong, Naipeng ![]() ![]() ![]() in Proc. 1st Symposium on Foundations of Health Information Engineering and Systems (2012) Detailed reference viewed: 119 (2 UL)![]() Dong, Naipeng ![]() ![]() ![]() in Proc. 7th Workshop on Formal Aspects in Security and Trust (2011) Detailed reference viewed: 75 (3 UL)![]() Jonker, Hugo ![]() ![]() in Proc. 6th International Conference on Availability, Reliability and Security (2011) Detailed reference viewed: 139 (1 UL)![]() Jonker, Hugo ![]() in Towards Trustworthy Elections, 6000 (2010) Detailed reference viewed: 110 (1 UL)![]() ; Jonker, Hugo ![]() in Proc. 12th Conference on Information and Communications Security (ICICS 2010) (2010) Detailed reference viewed: 88 (0 UL)![]() ; ; et al in Proc. 11th International Conference on Cryptology in India (IndoCrypt'10) (2010) Detailed reference viewed: 309 (7 UL)![]() Jonker, Hugo ![]() Doctoral thesis (2009) Detailed reference viewed: 64 (9 UL)![]() Jonker, Hugo ![]() ![]() ![]() in Journal of Algorithms in Cognition, Informatics and Logic (2009) Detailed reference viewed: 119 (7 UL) |
||