Penetration testing framework for smart contract Blockchain

被引:58
作者
Bhardwaj, Akashdeep [1 ]
Shah, Syed Bilal Hussian [2 ]
Shankar, Achyut [3 ]
Alazab, Mamoun [4 ]
Kumar, Manoj [1 ]
Gadekallu, Thippa Reddy [5 ]
机构
[1] Univ Petr & Energy Studies, Sch Comp Sci, Dehra Dun, Uttarakhand, India
[2] Dalian Univ Technol China, Sch Software, Dalian, Peoples R China
[3] Amity Univ, Dept Comp Sci, Noida, Uttar Pradesh, India
[4] Charles Darwin Univ, Coll Engn IT & Environm, Brinkin, NT 0909, Australia
[5] Vellore Inst Technol, Sch Informat Technol & Engn, Vellore, Tamil Nadu, India
关键词
Attack vectors; Blockchain; Cyber threats; Cybersecurity; OWASP; Smart contracts; SOCIAL-SYSTEMS; IOT; SECURITY; PRIVACY;
D O I
10.1007/s12083-020-00991-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart contracts powered by blockchain ensure transaction processes are effective, secure and efficient as compared to conventional contacts. Smart contracts facilitate trustless process, time efficiency, cost effectiveness and transparency without any intervention by third party intermediaries like lawyers. While blockchain can counter traditional cybersecurity attacks on smart contract applications, cyberattacks keep evolving in the form of new threats and attack vectors that influence blockchain similar to other web and application based systems. Effective blockchain testing help organizations to build and utilize the technology securely withe connected infrastructure. However, during the course of our research, the authors detected that Blockchain technology comes with security considerations like irreversible transactions, insufficient access, and non-competent strategies. Attack vectors, like these are not found on web portals and other applications. This research presents a new Penetration Testing framework for smart contracts and decentralized apps. The authors compared results from the proposed penetration-testing framework with automated penetration test Scanners. The results detected missing vulnerability that were not reported during regular pen test process.
引用
收藏
页码:2635 / 2650
页数:16
相关论文
共 43 条
  • [1] Al-Jaroodi J, 2019, IEEE 9 ANN COMP COMM
  • [2] Blockchain Applications for Industry 4.0 and Industrial IoT: A Review
    Alladi, Tejasvi
    Chamola, Vinay
    Parizi, Reza M.
    Choo, Kim-Kwang Raymond
    [J]. IEEE ACCESS, 2019, 7 : 176935 - 176951
  • [3] Amani Sidney, 2018, Certified Programs and Proofs, P66, DOI DOI 10.1145/3167084
  • [4] Amoordon A, 2019, IEEE INT WORKSH BLOC
  • [5] [Anonymous], 2018, ARXIV180601143V2
  • [6] [Anonymous], 2019, World Bank Open Data
  • [7] [Anonymous], 2018, ARXIV PREPRINT ARXIV
  • [8] [Anonymous], 2018, WHAT IS DAO
  • [9] Australian Securities Exchange, 2018, CHESS REPL
  • [10] Azab A, 2016, IEEE TRUST BIG, P1788, DOI [10.1109/TrustCom.2016.273, 10.1109/TrustCom.2016.0275]