Log in

Smart contract: a survey towards extortionate vulnerability detection and security enhancement

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Smart contracts become significant as blockchain technology is blooming around the technological globe. In this juncture, smart contract is an automatic programming framework executed based upon pre-conditions in blockchain even among untrusted parties by eliminating third party. The usage of blockchain in various fields keeps on increasing enormously from crypto-currency to 6G wireless communication. While develo** smart contracts for novel purposes, vulnerability and various challenges are discovered. Smart contracts are still in the emerging development stage with few bugs and errors, which are often exploited by hackers leading to huge losses. There are loopholes and misinterpretations in the development of smart contracts, thus it is necessary to design smart contracts. The anonymity and self-execution of the smart contract are taken as an advantage for illegal business. Hence, various modern tools are developed to identify the vulnerabilities in the smart contract but still, there is a research gap in this area. In this paper, various smart contracts and their challenges are studied to analyze the current state and a survey is carried out mainly focusing on its security aspects. Hence, providing a way to develop highly secure smart contracts and providing directions for contributing to future research.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Germany)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data availability

Not Applicable.

References

  1. Ministry of Electronics & Information Technology (Meity) Government of India, NATIONAL STRATEGY ON BLOCKCHAIN Towards Enabling Trusted Digital Platforms (2021). https://www.meity.gov.in/writereaddata/files/National_BCT_Strategy.pdf

  2. Parliamentary Office of Science and Technology (POST). (2018). POSTbrief 28: Distributed ledger technology. Houses of Parliament, UK. https://researchbriefings.files.parliament.uk/documents/POST-PB-0028/POST-PB-0028.pdf

  3. Xu, M., Chen, X., & Kou, G. (2019). A systematic review of blockchain. Financial Innovation, 5, 27. https://doi.org/10.1186/s40854-019-0147-z

    Article  Google Scholar 

  4. Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Retrieved February 7, 2022, from https://bitcoin.org/bitcoin.pdf

  5. Merkle, R. C. (1988). A digital signature based on a conventional encryption function. In C. Pomerance (Ed.). Advances in Cryptology—CRYPTO’87. CRYPTO 1987. Lecture notes in computer science (Vol. 293). Springer. https://doi.org/10.1007/3-540-48184-2_32

  6. Buterin, V. (2014). A next-generation smart contract and decentralized application platform. White Paper, 3(37), 2–1.

    Google Scholar 

  7. Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., Caro, A.D., Enyeart, D., Ferris, C., Laventman, G., Manevich, Y., Muralidharan, S., Murthy, C., Nguyen, B., Sethi, M., Singh, G., Smith, K.A., Sorniotti, A., Stathakopoulou, C., Vukolic, M., Cocco, S.W., & Yellick, J. (2018). Hyperledger fabric: A distributed operating system for permissioned blockchains. In Proceedings of the thirteenth EuroSys conference.

  8. Richard, B., James, C., Ian, G., & Mike, H. (2016). Corda: An introduction. https://doi.org/10.13140/RG.2.2.30487.37284

  9. Chase, B., & MacBrough, E. (2018). Analysis of the XRP ledger consensus protocol.

  10. Szabo, N. (1997). Formalizing and securing relationships on public networks. First Monday. https://doi.org/10.5210/fm.v2i9.548

    Article  Google Scholar 

  11. Transaction Details. (2022). Etherscan: Ropsten testnet network. Retrieved March 31, 2022, from https://ropsten.etherscan.io/tx/0x9b21f4f3a16fa1798809f53c9ad7af18c9318dd9984bc004c15e5435e90c8c70

  12. Buterin, V., Conner, E., Dudley, R., Slipper, M., Norden, I., & Bakhta, A. (2019). EIP-1559: Fee market change for ETH 1.0 chain, Ethereum improvement proposals, no. 1559. [Online serial]. https://eips.ethereum.org/EIPS/eip-1559

  13. Transaction Details. (2022). Etherscan: Ropsten testnet network. Retrieved April 1, 2022, from https://ropsten.etherscan.io/tx/0x0a69e153a816761b9ab999114b8ab9445e9291b29d710133e4f2e921d0612b2b

  14. Zhang, J., Tian, R., Cao, Y., Yuan, X., Yu, Z., Yan, X., & Zhang, X. (2021). A hybrid model for central bank digital currency based on blockchain. IEEE Access, 9, 53589–53601. https://doi.org/10.1109/ACCESS.2021.3071033

    Article  Google Scholar 

  15. Tilbury, J. L., de la Rey, E., & van der Schyff, K. (2019). Business process models of blockchain and South African real estate transactions. In 2019 International conference on advances in big data, computing and data communication systems (icABCD) (pp. 1–7). https://doi.org/10.1109/ICABCD.2019.8851014

  16. Nguyen, T. Q., Das, A. K., & Tran, L. T. (2019). NEO smart contract for drought-based insurance. In 2019 IEEE Canadian conference of electrical and computer engineering (CCECE) (pp. 1–4). https://doi.org/10.1109/CCECE.2019.8861573

  17. Kumar, A., Krishnamurthi, R., Nayyar, A., Sharma, K., Grover, V., & Hossain, E. (2020). A novel smart healthcare design, simulation, and implementation using healthcare 4.0 processes. IEEE Access, 8, 118433–118471. https://doi.org/10.1109/ACCESS.2020.3004790

    Article  Google Scholar 

  18. Durá, M., Leal, F., Sánchez-García, Á., Sáez, C., García-Gómez, J. M., Chis, A. E., & González-Vélez, H. (2023). Blockchain for data originality in pharma manufacturing. Journal of Pharmaceutical Innovation. https://doi.org/10.1007/s12247-023-09748-z

    Article  Google Scholar 

  19. Wang, Y., Su, Z., Zhang, N., & Chen, J. (2021). SPDS: A secure and auditable private data sharing scheme for smart grid based on blockchain. IEEE Transactions on Industrial Informatics, 17(11), 7688–7699. https://doi.org/10.1109/TII.2020.3040171

    Article  Google Scholar 

  20. Wang, L., Xu, L., Xheng, Z., & Liu, S. (2021). Smart contract-based agricultural food supply chain traceability. IEEE Access, 9, 9296–9307. https://doi.org/10.1109/ACCESS.2021.3050112

    Article  Google Scholar 

  21. Zhang, Y., Wu, X., Ge, H., Jiang, Y., Sun, Z., Ji, X., Jia, Z., & Cui, G. (2023). A blockchain-based traceability model for grain and oil food supply chain. Foods, 12(17), 3235. https://doi.org/10.3390/foods12173235

    Article  Google Scholar 

  22. Tripathi, A. K., Akul Krishnan, K., & Pandey, A. C. (2023). A novel blockchain and internet of things-based food traceability system for smart cities. Wireless Personal Communications, 129, 2157–2180. https://doi.org/10.1007/s11277-023-10230-9

    Article  Google Scholar 

  23. Zaghloul, E., Li, T., & Ren, J. (2021). d-BAME: Distributed blockchain-based anonymous mobile electronic voting. IEEE Internet of Things Journal, 8(22), 16585–16597. https://doi.org/10.1109/JIOT.2021.3074877

    Article  Google Scholar 

  24. Ridhorkar, S., Wanjari, M., Ansari, S., & Sonwane, P. (2023). MyVote-blockchain based online voting system. International Research Journal of Innovations in Engineering and Technology, 7, 268–274. https://doi.org/10.47001/IRJIET/2023.704041

    Article  Google Scholar 

  25. Bhattacharya, P., Saraswat, D., Dave, A., & Acharya, M. (2021). Coalition of 6G and blockchain in AR/VR space: Challenges and future directions. IEEE Access, 9, 168455–168484. https://doi.org/10.1109/ACCESS.2021.3136860

    Article  Google Scholar 

  26. Gupta, R., Shukla, A., & Tanwar, S. (2021). BATS: A blockchain and AI-empowered drone-assisted telesurgery system towards 6G. IEEE Transactions on Network Science and Engineering, 8(4), 2958–2967. https://doi.org/10.1109/TNSE.2020.3043262

    Article  Google Scholar 

  27. Abugabah, A., Nizamuddin, N., & Alzubi, A. A. (2020). Decentralized telemedicine framework for a smart healthcare ecosystem. IEEE Access, 8, 166575–166588. https://doi.org/10.1109/ACCESS.2020.3021823

    Article  Google Scholar 

  28. Alkhoori, O., Hassan, A., Almansoori, O., & Debe, M. (2021). Design and implementation of CryptoCargo: A blockchain-powered smart ship** container for vaccine distribution. IEEE Access, 9, 53786–53803. https://doi.org/10.1109/ACCESS.2021.3070911

    Article  Google Scholar 

  29. Alkhader, W., Salah, K., Sleptchenko, A., Jayaraman, R., Yaqoob, I., & Omar, M. (2021). Blockchain-based decentralized digital manufacturing and supply for COVID-19 medical devices and supplies. IEEE Access, 9, 137923–137940. https://doi.org/10.1109/ACCESS.2021.3118085

    Article  Google Scholar 

  30. Debe, M., Salah, K., Jayaraman, R., & Arshad, J. (2020). Blockchain-based verifiable tracking of resellable returned drugs. IEEE Access, 8, 205848–205862. https://doi.org/10.1109/ACCESS.2020.3037363

    Article  Google Scholar 

  31. Khan, S. N., Loukil, F., Ghedira-Guegan, C., Benkhelifa, E., & Bani-Hani, A. (2021). Blockchain smart contracts: Applications, challenges, and future trends. Peer-to-Peer Networking and Applications, 14, 2901–2925. https://doi.org/10.1007/s12083-021-01127-0

    Article  Google Scholar 

  32. Salah, N., Nizamuddin, R. J., & Omar, M. (2019). Blockchain-based soybean traceability in agricultural supply chain. IEEE Access, 7, 73295–73305. https://doi.org/10.1109/ACCESS.2019.2918000

    Article  Google Scholar 

  33. Syed, T. A., Siddique, M. S., Nadeem, A., Alzahrani, A., Jan, S., & Khattak, M. A. K. (2020). A novel blockchain-based framework for vehicle life cycle tracking: An end-to-end solution. IEEE Access, 8, 111042–111063. https://doi.org/10.1109/ACCESS.2020.3002170

    Article  Google Scholar 

  34. Wang, S., Li, D., Zhang, Y., & Chen, J. (2019). Smart contract-based product traceability system in the supply chain scenario. IEEE Access, 7, 115122–115133. https://doi.org/10.1109/ACCESS.2019.2935873

    Article  Google Scholar 

  35. Yang, X., Li, M., Yu, H., Wang, M., Xu, D., & Sun, C. (2021). A trusted blockchain-based traceability system for fruit and vegetable agricultural products. IEEE Access, 9, 36282–36293. https://doi.org/10.1109/ACCESS.2021.3062845

    Article  Google Scholar 

  36. Zhang, X., & Wang, D. (2019). Adaptive traffic signal control mechanism for intelligent transportation based on a consortium blockchain. IEEE Access, 7, 97281–97295. https://doi.org/10.1109/ACCESS.2019.2929259

    Article  Google Scholar 

  37. Ethereum: Security vulnerabilities. CVE details: The he ultimate security vulnerability data source [online]. Retrieved March 25, 2022, from https://www.cvedetails.com/vulnerability-list/vendor_id-17524/Ethereum.html

  38. Wang, Z., **, H., Dai, W., Choo, K. K. R., & Zou, D. (2021). Ethereum smart contract security research: Survey and future research opportunities. Frontiers of Computer Science, 15, 152802. https://doi.org/10.1007/s11704-020-9284-9

    Article  Google Scholar 

  39. Yakovenko, A. (2017). Solana: A new architecture for a high performance blockchain v0.8.13. Retrieved March 28, 2022, from https://solana.com/solana-whitepaper.pdf

  40. Luu, L., Chu, D. H., Olickel, H., Saxena, P., & Hobor, A. (2016). Making smart contracts smarter (pp. 254–269). https://doi.org/10.1145/2976749.2978309.

  41. Monteiro, A. P. (2019). A study of static analysis tools for Ethereum smart contracts. Retrieved March 28, 2022, from https://fenix.tecnico.ulisboa.pt/downloadFile/1689244997259999/80990-antonio-monteiro_dissertacao.pdf

  42. Kushwaha, S. S., Joshi, S., Singh, D., Kaur, M., & Lee, H.-N. (2022). Ethereum smart contract analysis tools: A systematic review. IEEE Access, 10, 57037–57062. https://doi.org/10.1109/ACCESS.2022.3169902

    Article  Google Scholar 

  43. Tolmach, P., Li, Y., Lin, S., Liu, Y., & Li. Z. (2019). A survey of smart contract formal specification and verification. Computer Science, Software Engineering. Preprint retrieved from https://arxiv.org/abs/2008.02712 [cs.SE]. https://doi.org/10.48550/ar**v.2008.02712

  44. Mota, A., Yang, F., & Teixeira, C. (2023). Formally verifying a real world smart contract, software engineering. Preprint retrieved from https://arxiv.org/abs/2307.02325

  45. Mojtaba, E., Cyrille, A., & Dilian, G. (2021). Dynamic vulnerability detection on smart contracts using machine learning (pp. 305–312). https://doi.org/10.1145/3463274.3463348

  46. Fuchen, M., Ying, F., Meng, R., Mingzhe, W., Yu, J., Kaixiang, Z., Huizhong, L., & **ang, S. (2019). EVM*: From offline detection to online reinforcement for Ethereum virtual machine (pp. 554–558). https://doi.org/10.1109/SANER.2019.8668038.

  47. Kondo, M., Oliva, G. A., Jiang, Z. M., & Hassan, A. E. (2020). Code cloning in smart contracts: A case study on verified contracts from the Ethereum blockchain platform. Empirical Software Engineering, 25, 4617–4675. https://doi.org/10.1007/s10664-020-09852-5

    Article  Google Scholar 

  48. Han, L., Zhiqiang, Y., Chao, L., Yu. J., Wenqi, Z., & Jiaguang, S. (2018). Eclone: Detect semantic clones in Ethereum via symbolic transaction sketch (pp. 900–903). https://doi.org/10.1145/3236024.3264596

  49. Gao, Z., Jayasundara, V., Jiang, L., **a, X., Lo, D., & Grundy, J. (2019). SmartEmbed: A tool for clone and bug detection in smart contracts through structural code embedding. https://doi.org/10.1109/ICSME.2019.00067

  50. Khan, F., David, I., Varro, D., & McIntosh, S. (2023). Code cloning in smart contracts on the Ethereum platform: An extended replication study. IEEE Transactions on Software Engineering, 49(4), 2006–2019. https://doi.org/10.1109/TSE.2022.3207428

    Article  Google Scholar 

  51. Pal, P., SudharsanaK, J. L., & RohithBalaji, S. (2019). WiP: Criminal smart contract for private key theft in end to end encrypted applications. In D. Garg, N. Kumar, R. Shyamasundar (Eds.) Information systems security. ICISS 2019. Lecture notes in computer science (Vol. 11952). Springer. https://doi.org/10.1007/978-3-030-36945-3_2

  52. McCorry, P., Hicks, A., & Meiklejohn, S. (2018). Smart contracts for bribing miners. In A. Zohar (Ed.), Proceedings of international conference on financial cryptography and data security, FC 2018, Lecture notes in computer science (Vol. 10958, pp. 3–18). Springer.

  53. McKie, S. (2017). Solidity learning: Revert(), assert(), and require() in solidity, and the new revert opcode in the EVM. BlockChannel. https://medium.com/blockchannel/the-use-of-revert-assert-and-require-in-solidity-and-the-new-revert-opcode-in-the-evm-1a3a7990e06e

  54. Wesley, D., Aviel, C., Nick, F., Adam, L., Patrick, J., Paul, B., & Lin, D. (2019). Defects and vulnerabilities in smart contracts, a classification using the NIST bugs framework. International Journal of Networked and Distributed Computing, 7, 121–132. https://doi.org/10.2991/ijndc.k.190710.003

    Article  Google Scholar 

  55. Kaleem, M., Mavridou, A., & Laszka, A. (2020) Vyper: A security comparison with solidity based on common vulnerabilities. In 2020 2nd conference on blockchain research & applications for innovative networks and services (BRAINS) (pp. 107–111). https://doi.org/10.1109/BRAINS49436.2020.9223278

  56. Vyper.readthedocs.io. (2020). Vyper—Vyper documentation [online]. Retrieved March 30, 2022, from https://vyper.readthedocs.io/en/stable/

  57. Bamboo: Security vulnerabilities. CVE details: The ultimate security vulnerability data source [online]. Retrieved March 30, 2022, from https://www.cvedetails.com/vulnerability-list/vendor_id-3578/product_id-22350/Atlassian-Bamboo.html

  58. Coblenz, M. (2017). Obsidian: A safer blockchain programming language. In 2017 IEEE/ACM 39th international conference on software engineering companion (ICSE-C) (pp. 97–99). https://doi.org/10.1109/ICSE-C.2017.150

  59. GitHub. (2022). GitHub pirapira/bamboo: Bamboo [online]. Retrieved March 30, 2022, from https://github.com/pirapira/bamboo#:~:text=Bamboo%20is%20a%20programming%20language,need%20something%20resembling%20a%20definition

  60. Franklin, S., Susan, E., & Sophia, D. (2018). Writing safe smart contracts in Flint. In Programming’18 companion: Conference companion of the 2nd international conference on art, science, and engineering of programming (pp. 218–219). https://doi.org/10.1145/3191697.3213790.

  61. Jiliang, L., Ziyi, Z., Zhou, S., & Weizhi, M. (2023). Gas-expensive patterns detection to optimize smart contracts. Applied Soft Computing, 145, 110542. https://doi.org/10.1016/j.asoc.2023.110542

    Article  Google Scholar 

  62. Mamageishvili, A., & Schlegel, J. C. (2020). Optimal smart contracts with costly verification. In 2020 IEEE international conference on blockchain and cryptocurrency (ICBC), (pp. 1–8). https://doi.org/10.1109/ICBC48266.2020.9169407

  63. Chen, T., Li, X., Luo, X., & Zhang, X. (2017). Under-optimized smart contracts devour your money. In IEEE 24th international conference on software analysis, evolution and reengineering (SANER) (pp. 442–446). https://doi.org/10.1109/SANER.2017.7884650.

  64. Ellis, S., Juels, A., & Nazarov, S. (2017). ChainLink: A decentralized oracle network. https://research.chain.link/whitepaper-v1.pdf

  65. AnChain.AI. (2018). Exposing an $18 million USD smart contract vulnerability. https://anchainai.medium.com/largest-smart-contract-attacks-in-blockchain-history-exposed-part-1-93b975a374d0

  66. Abhishek, M. (2021). Squid coin: A crypto scam that robbed investors off $3.38 million. The Logical India. https://thelogicalindian.com/technology/squid-coin-32078#:~:text=Squid’s%20developers%20have%20made%20off,being%20filled%20with%20spelling%20errors

  67. Vincent. (2021). Analysis of the SQUID game contract vulnerability—risk remains high. Gate.io Blog. https://www.gate.io/blog_detail/332/analysis-of-the-squid-game-contract-vulnerability-risk-remains-high

  68. Contract Overview. (2022). Etherscan: Ropsten testnet network. Retrieved April 1, 2022, from https://etherscan.io/address/0xDd9fd6b6F8f7ea932997992bbE67EabB3e316f3C

  69. Token Squid Game. BscScan: A product of Etherscan https://bscscan.com/token/0x87230146E138d3F296a9a77e497A2A83012e9Bc5#balances

  70. Torres, C. F., Steichen, M., & State, R. (2019). The art of the scam: Demystifying honeypots in thereum smart contracts. In Proceedings of the 28th USENIX conference on security symposium (SEC’19) (pp. 1591–1607). USENIX Association.

  71. Zhou, Y., Kumar, D., Bakshi, S., Mason, J., Miller, A., & Bailey, M. (2018). Erays: Reverse engineering Ethereum’s opaque smart contracts. In Proceedings of the 27th USENIX security symposium (pp. 1371–1385). USENIX Association.

  72. Pomerantz, O. (2021). Reverse engineering a contract. Ethereum. https://ethereum.org/en/developers/tutorials/reverse-engineering-a-contract/

  73. Musamih, A., Salah, K., Jayaraman, R., & Arshad, J. (2021). A Blockchain-based approach for drug traceability in healthcare supply chain. IEEE Access, 9, 9728–9743. https://doi.org/10.1109/ACCESS.2021.3049920

    Article  Google Scholar 

  74. Madine, M. M., Salah, K., Jayaraman, R., Yaqoob, I., Al-Hammadi, Y., Ellahha, S., & Calyam, P. (2020). Fully decentralized multi-party consent management for secure sharing of patient health records. IEEE Access, 8, 225777–225791. https://doi.org/10.1109/ACCESS.2020.3045048

    Article  Google Scholar 

  75. Wang, D., & Zhang, X. (2020). Secure data sharing and customized services for intelligent transportation based on a consortium blockchain. IEEE Access, 8, 56045–56059. https://doi.org/10.1109/ACCESS.2020.2981945

    Article  Google Scholar 

  76. Shahid, A., Almogren, A., Javaid, N., Al-Zahrani, F. A., Zuair, M., & Alam, M. (2020). Blockchain-based agri-food supply chain: A complete solution. IEEE Access, 8, 69230–69243. https://doi.org/10.1109/ACCESS.2020.2986257

    Article  Google Scholar 

  77. Omar, I. A., Jayaraman, R., Salah, K., Debe, M., & Omar, M. (2020). Enhancing vendor managed inventory supply chain operations using blockchain smart contracts. IEEE Access, 8, 182704–182719. https://doi.org/10.1109/ACCESS.2020.3028031

    Article  Google Scholar 

  78. Cui, P., Dixon, J., Guin, U., & Dimase, D. (2019). A Blockchain-based framework for supply chain provenance. IEEE Access, 7, 157113–157125. https://doi.org/10.1109/ACCESS.2019.2949951

    Article  Google Scholar 

  79. Hasan, H. R., Salah, K., Jayaraman, R., Ahmad, R. W., Yaqoob, I., & Omar, M. (2020). Blockchain-based solution for the traceability of spare parts in manufacturing. IEEE Access, 8, 100308–100322. https://doi.org/10.1109/ACCESS.2020.2998159

    Article  Google Scholar 

  80. Musamih, A., Jayaraman, R., Salah, K., Hasan, H. R., Yaqoob, I., & Al-Hammadi, Y. (2021). Blockchain-based solution for distribution and delivery of COVID-19 vaccines. IEEE Access, 9, 71372–71387. https://doi.org/10.1109/ACCESS.2021.3079197

    Article  Google Scholar 

  81. Debe, M., Hasan, H. R., Salah, K., Yaqoob, I., & Jayaraman, R. (2021). Blockchain-based energy trading in electric vehicles using an auctioning and reputation scheme. IEEE Access, 9, 165542–165556. https://doi.org/10.1109/ACCESS.2021.3133958

    Article  Google Scholar 

  82. Chaudhary, S., Shah, S., Kakkar, R., Gupta, R., Alabdulatif, A., Tanwar, S., Sharma, G., & Bokoro, P. N. (2023). Blockchain-based secure voting mechanism underlying 5G network: A smart contract approach. IEEE Access, 11, 76537–76550. https://doi.org/10.1109/ACCESS.2023.3297492

    Article  Google Scholar 

  83. Patro, P. K., Jayaraman, R., Salah, K., & Yaqoob, I. (2022). Blockchain-based traceability for the fishery supply chain. IEEE Access, 10, 81134–81154. https://doi.org/10.1109/ACCESS.2022.3196162

    Article  Google Scholar 

  84. Alnuaimi, A., Alshehhi, A., Salah, K., Jayaraman, R., Omar, I. A., & Battah, A. (2022). Blockchain-based processing of health insurance claims for prescription drugs. IEEE Access, 10, 118093–118107. https://doi.org/10.1109/ACCESS.2022.3219837

    Article  Google Scholar 

  85. Elmay, F. K., Salah, K., Jayaraman, R., & Omar, I. A. (2022). Using NFTs and blockchain for traceability and auctioning of ship** containers and cargo in maritime industry. IEEE Access, 10, 124507–124522. https://doi.org/10.1109/ACCESS.2022.3225000

    Article  Google Scholar 

  86. Battah, A., Salah, K., Jayaraman, R., Yaqoob, I., & Khalil, A. (2023). Using blockchain for enabling transparent, traceable, and trusted University ranking systems. IEEE Access, 11, 23792–23807. https://doi.org/10.1109/ACCESS.2023.3253948

    Article  Google Scholar 

  87. Elmay, F. K., Salah, K., Yaqoob, I., Jayaraman, R., Battah, R., & Maleh, Y. (2022). Blockchain-based traceability for ship** containers in unimodal and multimodal logistics. IEEE Access, 10, 133539–133556. https://doi.org/10.1109/ACCESS.2022.3231689

    Article  Google Scholar 

  88. Gebreab, S. A., Hasan, H. R., Salah, K., & Jayaraman, R. (2022). NFT-based traceability and ownership management of medical devices. IEEE Access, 10, 126394–126411. https://doi.org/10.1109/ACCESS.2022.3226128

    Article  Google Scholar 

  89. Tikhomirov, S., Voskresenskaya, E., Ivanitskiy, I., Takhaviev, R., Marchenko, E., & Alexandrov, Y. (2018). SmartCheck: Static analysis of Ethereum smart contracts. In 2018 IEEE/ACM 1st international workshop on emerging trends in software engineering for blockchain (WETSEB) (pp. 9–16).

  90. Grieco, G., Song, W., Cygan, A., Feist, J., & Groce, A. (2020). Echidna: Effective, usable, and fast fuzzing for smart contracts. In Proceedings of the 29th ACM SIGSOFT international symposium on software testing and analysis (pp. 557–560).

  91. Vani, S., Doshi, M., Nanavathi, A. A., & Kundu, A. (2022). Vulnerability analysis of smart contracts. Preprint retrieved from https://arxiv.org/pdf/2212.07387.pdf

Download references

Funding

No fund received.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Porkodi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Porkodi, S., Kesavaraja, D. Smart contract: a survey towards extortionate vulnerability detection and security enhancement. Wireless Netw 30, 1285–1304 (2024). https://doi.org/10.1007/s11276-023-03587-z

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-023-03587-z

Keywords

Navigation