DApps Ecosystems: Mapping the Network Structure of Smart Contract
Interactions
- URL: http://arxiv.org/abs/2401.01991v1
- Date: Wed, 3 Jan 2024 21:48:54 GMT
- Title: DApps Ecosystems: Mapping the Network Structure of Smart Contract
Interactions
- Authors: Sabrina Aufiero, Giacomo Ibba, Silvia Bartolucci, Giuseppe Destefanis,
Rumyana Neykova, Marco Ortu
- Abstract summary: Decentralized applications (dApps) have gained attention for their potential to disrupt traditional centralized systems.
We show how decentralization is architecturally implemented, identifying common development patterns and anomalies.
We find a consistent network structure characterized by modular, self-sufficient contracts and a complex web of function interactions.
- Score: 3.453303606167197
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In recent years, decentralized applications (dApps) built on blockchain
platforms such as Ethereum and coded in languages such as Solidity, have gained
attention for their potential to disrupt traditional centralized systems.
Despite their rapid adoption, limited research has been conducted to understand
the underlying code structure of these applications. In particular, each dApp
is composed of multiple smart contracts, each containing a number of functions
that can be called to trigger a specific event, e.g., a token transfer. In this
paper, we reconstruct and analyse the network of contracts and functions calls
within the dApp, which is helpful to unveil vulnerabilities that can be
exploited by malicious attackers. We show how decentralization is
architecturally implemented, identifying common development patterns and
anomalies that could influence the system's robustness and efficiency. We find
a consistent network structure characterized by modular, self-sufficient
contracts and a complex web of function interactions, indicating common coding
practices across the blockchain community. Critically, a small number of key
functions within each dApp play a pivotal role in maintaining network
connectivity, making them potential targets for cyber attacks and highlighting
the need for robust security measures.
Related papers
- Internet of Agents: Weaving a Web of Heterogeneous Agents for Collaborative Intelligence [79.5316642687565]
Existing multi-agent frameworks often struggle with integrating diverse capable third-party agents.
We propose the Internet of Agents (IoA), a novel framework that addresses these limitations.
IoA introduces an agent integration protocol, an instant-messaging-like architecture design, and dynamic mechanisms for agent teaming and conversation flow control.
arXiv Detail & Related papers (2024-07-09T17:33:24Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - HasTEE+ : Confidential Cloud Computing and Analytics with Haskell [50.994023665559496]
Confidential computing enables the protection of confidential code and data in a co-tenanted cloud deployment using specialized hardware isolation units called Trusted Execution Environments (TEEs)
TEEs offer low-level C/C++-based toolchains that are susceptible to inherent memory safety vulnerabilities and lack language constructs to monitor explicit and implicit information-flow leaks.
We address the above with HasTEE+, a domain-specific language (cla) embedded in Haskell that enables programming TEEs in a high-level language with strong type-safety.
arXiv Detail & Related papers (2024-01-17T00:56:23Z) - MindTheDApp: A Toolchain for Complex Network-Driven Structural Analysis
of Ethereum-based Decentralised Applications [3.6592446476338445]
This paper presents MindTheDApp, a toolchain designed specifically for the structural analysis of Decentralized Applications (DApps)
Unlike existing tools, our toolchain combines the power of ANTLR4 and Abstract Syntax Tree (AST) techniques to transform the architecture and interactions within smart contracts into a specialized bipartite graph.
arXiv Detail & Related papers (2023-10-03T20:03:08Z) - Collaborative Learning Framework to Detect Attacks in Transactions and Smart Contracts [26.70294159598272]
This paper presents a novel collaborative learning framework designed to detect attacks in blockchain transactions and smart contracts.
Our framework exhibits the capability to classify various types of blockchain attacks, including intricate attacks at the machine code level.
Our framework achieves a detection accuracy of approximately 94% through extensive simulations and 91% in real-time experiments with a throughput of over 2,150 transactions per second.
arXiv Detail & Related papers (2023-08-30T07:17:20Z) - Defending Against Poisoning Attacks in Federated Learning with
Blockchain [12.840821573271999]
We propose a secure and reliable federated learning system based on blockchain and distributed ledger technology.
Our system incorporates a peer-to-peer voting mechanism and a reward-and-slash mechanism, which are powered by on-chain smart contracts, to detect and deter malicious behaviors.
arXiv Detail & Related papers (2023-07-02T11:23:33Z) - APPFLChain: A Privacy Protection Distributed Artificial-Intelligence
Architecture Based on Federated Learning and Consortium Blockchain [6.054775780656853]
We propose a new system architecture called APPFLChain.
It is an integrated architecture of a Hyperledger Fabric-based blockchain and a federated-learning paradigm.
Our new system can maintain a high degree of security and privacy as users do not need to share sensitive personal information to the server.
arXiv Detail & Related papers (2022-06-26T05:30:07Z) - HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a
Collaborative IoT Intrusion Detection [0.0]
We propose a hierarchical blockchain-based federated learning framework to enable secure and privacy-preserved collaborative IoT intrusion detection.
The proposed ML-based intrusion detection framework follows a hierarchical federated learning architecture to ensure the privacy of the learning process and organisational data.
The outcome is a securely designed ML-based intrusion detection system capable of detecting a wide range of malicious activities while preserving data privacy.
arXiv Detail & Related papers (2022-04-08T19:06:16Z) - The Feasibility and Inevitability of Stealth Attacks [63.14766152741211]
We study new adversarial perturbations that enable an attacker to gain control over decisions in generic Artificial Intelligence systems.
In contrast to adversarial data modification, the attack mechanism we consider here involves alterations to the AI system itself.
arXiv Detail & Related papers (2021-06-26T10:50:07Z) - ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep
Neural Network and Transfer Learning [80.85273827468063]
Existing machine learning-based vulnerability detection methods are limited and only inspect whether the smart contract is vulnerable.
We propose ESCORT, the first Deep Neural Network (DNN)-based vulnerability detection framework for smart contracts.
We show that ESCORT achieves an average F1-score of 95% on six vulnerability types and the detection time is 0.02 seconds per contract.
arXiv Detail & Related papers (2021-03-23T15:04:44Z) - Graph Neural Networks for Decentralized Controllers [171.6642679604005]
Dynamical systems comprised of autonomous agents arise in many relevant problems such as robotics, smart grids, or smart cities.
Optimal centralized controllers are readily available but face limitations in terms of scalability and practical implementation.
We propose a framework using graph neural networks (GNNs) to learn decentralized controllers from data.
arXiv Detail & Related papers (2020-03-23T13:51:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.