Cybercrime on Smart Contract

User Generated

ebanyqoelnag

Writing

Description

Write about 1500-2000 words to briefly describe the attached slides. Focus on Exploit the vulnerabilities of smart contract games.

Unformatted Attachment Preview

Cybercrimes on Smart Contracts Goals ● Detect vulnerabilities on smart contract games ● Prevent such vulnerabilities in the future Methods ● Collect popular games ● Collect bytecode of games(etherscan) ● Collect and analyze data(etherscan) ● Reverse engineering bytecode ● Simulation based vulnerability detection - ContractFuzzer ● Categorize and try to find cures for these vulnerabilities Games Code analysis of collected games Find addresses by examine page source code Common Vulnerabilities ● Exception disorder ○ rollback stops at low-level call on address ● Reentrance ● Timestamp & Block number dependency ● Gasless send ○ Fallback function limit is 2300 ● Dangerous delegate call ○ Argument set to msg.data Verify Vulnerabilities ● Locate the vulnerability ● Isolate the vulnerable function ● Simulate different edge case inputs, see if exception matches category ● Record results Reporting vulnerabilities Via email In the process of convincing non-technical person to notify the developers... Future work ● Game specific vulnerabilities vs smart contract vulnerabilities ● How to systematically prevent cybercrime on vulnerabilities we found ● Real experiment to test volunteers
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Outline

Introduction
Body
Conclusion
References


Running head: CYBER CRIMES ON SMART CONTRACTS

Cyber Crimes on Smart Contracts
Student
Institution
Date

CYBER CRIMES ON SMART CONTRACTS

2

Cyber Crimes on Smart Contracts
Smart contract use has increased in the business world today as it does not allow for thirdparty involvement in the transformation of information. It is designed to digitally facilitate, verify
and enforce the negotiation or the performance of the contract in the business between two parties.
Its use includes the block chains which is visible to all the users of the blocked mail. As a result,
it is open to situations of bugs, including security holes which leads to cybercrimes. This result in
loss of business information which gets into the hands of unauthorised people. There is a need to
control and protect the business information and as such all the block chains need security. This
essay will focus on all the types of cybercrime and how to counter all the vulnerabilities that pose
a threat to an organisation's information.
In the modern world, there are various forms of cybercrime which multiple people use to
get access to information of organisation or people of their interest. Phishing is a way of obtaining
personal information through emails and communication sent to the business. This also involves
loss of considerable company information as these people track the information before they get
into the market. The people can truck the devices used and steal the data. Also, the people involved
in cybercrime may take advantage of the vulnerability in the system to gain information about the
company. These people look at the loopholes in the business and gain access to the business
information. All these weaknesses should be prevented for information safety.
Another form of cybercrime is by hacking which involves getting into access on someone's
co...


Anonymous
Really useful study material!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags