Efficient Methods to Avoid Smart Contract Vulnerabilities Using Block Chain
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 125

Research Paper | Computer Science & Engineering | India | Volume 9 Issue 8, August 2020

Efficient Methods to Avoid Smart Contract Vulnerabilities Using Block Chain

B. Ratnakanth, M. Sahiti, Dr. K. Venkata Ramana

Ethereum smart contracts are programs which will run inside public distributed network called block chain. These smart contracts are used to perform operation over ether i. e transfer, receiving across the blockchain, by public to manage their accounts. These smart contracts are immutable once deployed on blockchain. So, developers need to make sure that smart contracts are bug- free at the time of deployment. As we are developing supply chain management (SCM) for textile industry project, to protect the project from smart contract vulnerabilities. In this paper we have analyzed the Decentralized Autonomous organization i. e DAO attack, which takes the advantage of smart contract vulnerability. Some functions are exposed to access by external contracts. The attacker makes use of vulnerability in smart contract and he can implement code to recursively call the function to transfer the funds in to his own account. And also we analyzed Reentrancy attack, which also used by attacker to recursively call the contract to multiple transfers of funds to his own account. And finally we analyzed Underflow attack, which make use of vulnerability in smart contract while transferring ethers between the users without considering limitations of integers values i. e uint8, uint16 etc.

Keywords: attacks, blockchain, smart contract, supply chain management

Edition: Volume 9 Issue 8, August 2020

Pages: 600 - 606

Share this Article

How to Cite this Article?

B. Ratnakanth, M. Sahiti, Dr. K. Venkata Ramana, "Efficient Methods to Avoid Smart Contract Vulnerabilities Using Block Chain", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SR20809215923, Volume 9 Issue 8, August 2020, 600 - 606

Enter Your Email Address




Similar Articles with Keyword 'attacks'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Similar Articles with Keyword 'blockchain'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Downloads: 3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1292 - 1297

Supply Chain Using Blockchain (Healthcare Industry)

Prof. Mangesh G. Ingale, Shyam Jamman Parmeshwar, Yash G. Purohit, Divyani Sable, Vishaksha Kachane

Share this Article

Similar Articles with Keyword 'smart contract'

Downloads: 3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1292 - 1297

Supply Chain Using Blockchain (Healthcare Industry)

Prof. Mangesh G. Ingale, Shyam Jamman Parmeshwar, Yash G. Purohit, Divyani Sable, Vishaksha Kachane

Share this Article

Downloads: 157

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 6, June 2020

Pages: 169 - 173

Adoption of a Nationwide Real Estate Blockchain for E-Governance

Shreyas Prasad

Share this Article

Similar Articles with Keyword 'supply chain management'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 959 - 963

An Analysis of Business Framework in identifying Customer Driven Demand Discovery

Are Karunakar Reddy, Gunna Kishore

Share this Article



Top