Please use this identifier to cite or link to this item:
http://bura.brunel.ac.uk/handle/2438/30121
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ortu, M | - |
dc.contributor.author | Ibba, G | - |
dc.contributor.author | Destefanis, G | - |
dc.contributor.author | Conversano, C | - |
dc.contributor.author | Tonelli, R | - |
dc.date.accessioned | 2024-11-14T13:12:16Z | - |
dc.date.available | 2024-11-14T13:12:16Z | - |
dc.date.issued | 2024-10-08 | - |
dc.identifier | ORCiD: Giuseppe Destefanis https://orcid.org/0000-0003-3982-6355 | - |
dc.identifier | 23433 | - |
dc.identifier.citation | Ortu, M. et al. (2024) 'Taxonomic insights into ethereum smart contracts by linking application categories to security vulnerabilities', Scientific Reports, 14 (1), 23433, pp. 1 - 20. doi: 10.1038/s41598-024-73454-0. | en_US |
dc.identifier.uri | https://bura.brunel.ac.uk/handle/2438/30121 | - |
dc.description | Data availability: The datasets generated and/or analysed during the current study are available in the Top-Trending-Contracts repository, https://github.com/giacomofi/Top-Trending-Contracts. To support ongoing research and community engagement, we have established a GitHub repository, currently featuring a collection of the top-trending contracts categorized as ELTC, Bank, CNFT, and Token programs, organized chronologically. While the repository presently focuses on these trending categories, our plan is to progressively include a broader spectrum of contracts, particularly those representing other categories and various vulnerabilities. This expansion will not only improve the repository’s but also provide insights into the vulnerability landscape of Ethereum smart contracts. | en_US |
dc.description.abstract | The expansion of smart contracts on the Ethereum blockchain has created a diverse ecosystem of decentralized applications. This growth, however, poses challenges in classifying and securing these contracts. Existing research often separately addresses either classification or vulnerability detection, without a comprehensive analysis of how contract types are related to security risks. Our study addresses this gap by developing a taxonomy of smart contracts and examining the potential vulnerabilities associated with each category. We use the Latent Dirichlet Allocation (LDA) model to analyze a dataset of over 100,040 Ethereum smart contracts, which is notably larger than those used in previous studies. Our analysis categorizes these contracts into eleven groups, with five primary categories: Notary, Token, Game, Financial, and Blockchain interaction. This categorization sheds light on the various functions and applications of smart contracts in today’s blockchain environment. In response to the growing need for better security in smart contract development, we also investigate the link between these categories and common vulnerabilities. Our results identify specific vulnerabilities associated with different contract types, providing valuable insights for developers and auditors. This relationship between contract categories and vulnerabilities is a new contribution to the field, as it has not been thoroughly explored in previous research. Our findings offer a detailed taxonomy of smart contracts and practical recommendations for enhancing security. By understanding how contract categories correlate with vulnerabilities, developers can implement more effective security measures, and auditors can better prioritize their reviews. This study advances both academic knowledge of smart contracts and practical strategies for securing decentralized applications on the Ethereum platform. | en_US |
dc.format.extent | 1 - 20 | - |
dc.format.medium | Electronic | - |
dc.language | English | - |
dc.language.iso | en_US | en_US |
dc.publisher | Springer Nature | en_US |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | - |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | - |
dc.subject | computer science | en_US |
dc.subject | mathematics and computing | en_US |
dc.subject | scientific data | en_US |
dc.subject | statistics | en_US |
dc.title | Taxonomic insights into ethereum smart contracts by linking application categories to security vulnerabilities | en_US |
dc.type | Article | en_US |
dc.identifier.doi | https://doi.org/10.1038/s41598-024-73454-0 | - |
dc.relation.isPartOf | Scientific Reports | - |
pubs.issue | 1 | - |
pubs.publication-status | Published online | - |
pubs.volume | 14 | - |
dc.identifier.eissn | 2045-2322 | - |
dc.rights.license | https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode.en | - |
dc.rights.holder | The Author(s) | - |
Appears in Collections: | Dept of Computer Science Research Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
FullText.pdf | Copyright © The Author(s) 2024 Rights and permissions: Open Access. This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit https://creativecommons.org/licenses/by-nc-nd/4.0/. | 2.73 MB | Adobe PDF | View/Open |
This item is licensed under a Creative Commons License