Publication
Title
Refactoring solidity smart contracts to protect against reentrancy exploits
Author
Abstract
Solidity is the dominant programming language for specifying smart contracts deployed on the Ethereum blockchain platform. Smart contracts permit the exchange of cryptocurrency, and hence are vulnerable to security attacks, most notably reentrancy exploits. Extensions to the solidity language, therefore, provide safer alternatives via special-purpose syntactic constructs. Based on an analysis of 26,799 contracts actually deployed on the Ethereum platform, it appears that these safer alternatives are indeed adopted. Next, we investigate whether the SMTChecker provided with the Solidity compiler is able to confirm that two safer alternatives (“Check-Effects-Interactions” and “Mutex”) actually prevent against reentrancy exploits.
Language
English
Source (journal)
Lecture notes in computer science. - Berlin, 1973, currens
Source (book)
Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering. Proceedings of the 11th International Symposium (ISoLA 2022), October 22–30, 2022, Rhodes, Greece
Publication
Zwitzerland : Springer Verlag , 2022
ISBN
978-3-031-19755-0
978-3-031-19756-7
DOI
10.1007/978-3-031-19756-7_18
Volume/pages
13702 (2022) , p. 324-344
Full text (Publisher's DOI)
Full text (open access)
Full text (publisher's version - intranet only)
UAntwerpen
Faculty/Department
Research group
Publication type
Subject
Affiliation
Publications with a UAntwerp address
External links
Record
Identifier c:irua:192021
Creation 05.12.2022
Last edited 17.06.2024
To cite this reference