Limpar
5.148 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo Acesso aberto Revisado por pares

Peter Robinson,

... paper discusses the pros and cons of using Ethereum MainNet, the public Ethereum blockchain, as a Coordination Blockchain. The requirements Ethereum MainNet needs to fulfil to perform this role are analyzed within the context of Ethereum Private Sidechains, a private blockchain technology which allows ... transactions to execute across blockchains. We found that Ethereum MainNet is best suited to storing long-term ... need to be widely available, such as the Ethereum Registration Authority information. However, due to Ethereum MainNet’ ...

Tópico(s): Cloud Data Security Solutions

2020 - Cambridge University Press | The Knowledge Engineering Review

Artigo Acesso aberto Revisado por pares

Taotao Wang, Chonghe Zhao, Qing Yang, Shengli Zhang, Soung Chang Liew,

... topologies of popular blockchains such as Bitcoin and Ethereum, therefore, deserve our highest attention. The current Ethereum blockchain explorers (e.g., Etherscan) focus on the ... the underlying P2P network. This work presents the Ethereum Network Analyzer (Ethna), a tool that probes and analyzes the P2P network of the Ethereum blockchain. Unlike Bitcoin that adopts an unstructured P2P network, Ethereum relies on the Kademlia DHT to manage its ... Bitcoin-like P2P networks are not applicable to Ethereum. Ethna implements a novel method that accurately measures ...

Tópico(s): Peer-to-Peer Network Technologies

2021 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Network Science and Engineering

Capítulo de livro Revisado por pares

Purathani Praitheeshan, Yi Wei Xin, Lei Pan, Robin Doss,

Ethereum is a popular Blockchain platform that allows users to manage their cryptocurrency transactions through the wallets. Ethereum wallet helps interact with the blockchain network easily, and it keeps Ethereum cryptocurrency (Ether) transaction data of its users. The use of Ethereum and wallets grows rapidly. Since they handle huge ... are keen to hack and steal Ethers from Ethereum wallets. But there lacks comprehensive security analysis, especially on keystore files in Ethereum wallets. There were a few incidents occurred with ...

Tópico(s): Spam and Phishing Detection

2019 - Springer Science+Business Media | Communications in computer and information science

Artigo Acesso aberto

Mahmud Hasan, Kemafor Ogan, Binil Starly,

... over cryptographically secure networks. In recent times, the Ethereum network has emerged as a popular blockchain framework ... proprietary manufacturing data in decentralized CMaaS. However, the Ethereum ecosystem was only designed to store and transmit ... and validation of middleware software architectures that allow Ethereum based distributed CMaaS platforms to harness the benefits of the secure asset models of the Ethereum ecosystem and the immutable big data storage capabilities ... transactions to bypass the transaction fees of the Ethereum ecosystem. Additionally, a machine learning based time series ...

Tópico(s): Blockchain Technology Applications and Security

2021 - Elsevier BV | Procedia Manufacturing

Artigo Acesso aberto Revisado por pares

Shenhui Zhang, Ming Tang, Xiulai Li, Boyi Liu, Bo Zhang, Fei Hu, Sirui Ni, Jieren Cheng,

... and blockchain. Inspired by this, we propose ROS-Ethereum. It bridges ROS and Ethereum, a widely used blockchain platform. ROS-Ethereum is based on the User Datagram Protocol (UDP) ... mechanism and the SM algorithm family along with Ethereum technology. Simply put, ROS-Ethereum allows users to invoke the contract when interacting ... real robots to verify the effectiveness of ROS-Ethereum and evaluate it from the following metrics: (1) ... and stability of the algorithm and (2) ROS-Ethereum transaction response time and packet loss rate.

Tópico(s): IoT and Edge/Fog Computing

2022 - Hindawi Publishing Corporation | Security and Communication Networks

Artigo Acesso aberto Revisado por pares

Gianluca Bonifazi, Enrico Corradini, Domenico Ursino, Luca Virgili,

... of user spectrum and adopt it to classify Ethereum users based on their behavior. Design/methodology/approach ... obtained from a social network-based representation of Ethereum. Each class of users has its own spectrum, ... we test our approach on a dataset of Ethereum transactions. Findings We define a social network-based model to represent Ethereum. We also define a spectrum for a user ... spectra and the modified Eros distance to classify Ethereum users based on their past behavior. Currently, no multi-class automatic classification approach tailored to Ethereum exists yet, albeit some single-class ones have ...

Tópico(s): Complex Systems and Time Series Analysis

2022 - Springer Science+Business Media | Journal Of Big Data

Artigo Acesso aberto Revisado por pares

Zhaowei Liu, Dong Yang, Shenqiang Wang, Hang Su,

... data created by numerous 5G IoT devices, the Ethereum platform has become a tool for the storage ... to its open and tamper-resistant characteristics. So, Ethereum account security is necessary for the Internet of ... quickly and improve people's lives. By modeling Ethereum transaction records as a transaction network, the account types are well identified by the Ethereum account classification system established based on Graph Neural Networks (GNNs). This work first investigates the Ethereum transaction network, Surprisingly, experimental metrics reveal that the ...

Tópico(s): Brain Tumor Detection and Classification

2022 - KeAi | Digital Communications and Networks

Capítulo de livro Revisado por pares

Hanyi Sun, Na Ruan, Hanqing Liu,

... blockchain with the capabilities of running smart contract, Ethereum provides decentralized Ethernet virtual machines to handle peer- ... largest blockchain, the amount of transaction data in Ethereum grows fast. Analysis of these data can help researchers better understand Ethereum and find attackers among the users. However, the analysis of Ethereum data at the present stage is mostly based on the statistical characteristics of Ethereum nodes and lacks analysis of the transaction behavior ... In this paper, we apply machine learning in Ethereum analysis for the first time and cluster users ...

Tópico(s): Caching and Content Delivery

2019 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto Revisado por pares

Rameez Asif, Syed Raheel Hassan,

Ethereum (ETH) is a popular Layer-1 blockchain platform that has been used to create decentralized applications (dApps) and smart contracts. Ethereum 2.0, or Serenity, is a significant update ... is one of the major new features of Ethereum 2.0. Given that PoS doesn’t require ... be more energy-efficient than PoW. Additionally, this Ethereum upgrade will also be more secure due to ... paper begins by discussing the current issues facing Ethereum, including the limitations of the Proof of Work ( ... we peered at the major changes introduced by Ethereum 2.0, such as the new consensus method ( ...

Tópico(s): Cloud Data Security Solutions

2023 - Frontiers Media | Frontiers in Blockchain

Artigo Acesso aberto Revisado por pares

Rohit Saxena, Deepak Arora, Vishal Nagar,

Ethereum is a digital asset whose transactions are kept on a decentralized, globally accessible ledger. An Ethereum Blockchain owner's real identity is concealed behind a pseudonym termed an address. Because of this, Ethereum is frequently used in illegal activities like gambling ... malicious cybercriminal users' activities and addresses in the Ethereum Blockchain. The Blockchain's public data enables an ... malicious and non-malicious activities, the classification of Ethereum Blockchain addresses is carried out in this paper. ...

Tópico(s): Cybercrime and Law Enforcement Studies

2023 - Elsevier BV | Procedia Computer Science

Artigo Acesso aberto Revisado por pares

Michele Pasqua, Andrea Benini, Filippo Contro, Marco Crosara, Mila Dalla Preda, Mariano Ceccato,

The immutable nature of Ethereum transactions, and consequently Ethereum smart-contracts, has stimulated the proliferation of many approaches aiming at detecting defects and security issues ... to face the problem of inspecting the compiled Ethereum Virtual Machine (EVM) bytecode, retrieved directly from the ... have poor accuracy in the automated detection of Ethereum smart-contracts programming defects and vulnerabilities. This paper ... tool on a large dataset of real-world Ethereum smart-contracts, showing that EtherSolve extracts more precise ...

Tópico(s): Advanced Malware Detection Techniques

2023 - Elsevier BV | Journal of Systems and Software

Artigo Revisado por pares

Dan Lin, Jialan Chen, Jiajing Wu, Zibin Zheng,

Much of the current research in Ethereum transaction records focuses on the statistical analysis and measurements of existing data; however, the evolution mechanism of Ethereum transactions is an important, yet seldom discussed issue. ... work, we first collect the transaction data of Ethereum and build network models from a microlevel view ... to quantify the impact of network characteristics on Ethereum evolution. Next, we explore the graph structure properties ... show that the local and microscopic structure of Ethereum networks is star-shaped, and the transaction frequency ...

Tópico(s): Functional Brain Connectivity Studies

2021 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Computational Social Systems

Artigo Revisado por pares

Yixian Wang, Zhaowei Liu, Jindong Xu, Weiqing Yan,

... characteristics of the transaction. As smart society evolves, Ethereum makes smart contracts reality, while the mine of transaction characteristics appearing on the Ethereum platform is scarce; thus, there is an urgent need to mine Ethereum from contract and transfer. In this article, we ... representation learning method to mine implicit information inside Ethereum transactions. Specifically, we construct an Ethereum transaction network by collecting transaction data from normal and phishing Ethereum accounts. Then, we propose a walk strategy that ...

Tópico(s): Spam and Phishing Detection

2022 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Computational Social Systems

Capítulo de livro Acesso aberto Revisado por pares

Ting Chen, Xiaoqi Li, Wang Ying, Jiachi Chen, Zihao Li, Xiapu Luo, Man Ho Au, Xiaosong Zhang,

The gas mechanism in Ethereum charges the execution of every operation to ensure that smart contracts running in EVM (Ethereum Virtual Machine) will be eventually terminated. Failing to ... operations allows attackers to launch DoS attacks on Ethereum. Although Ethereum recently adjusted the gas costs of EVM operations ... consumptions of EVM operations. The results reveal that Ethereum’s new setting is still not proper. Moreover, ... flexible and secure and avoid frequent update of Ethereum client, we design a special smart contract that ...

Tópico(s): Advanced Malware Detection Techniques

2017 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto Revisado por pares

Peter Robinson,

Ethereum Private Sidechains are permissioned Ethereum blockchains which allow authorised participants to interact privately using Smart Contracts. Permissioned blockchains are appropriate for use in scenarios in which ... contracts on the blockchain must be kept secret. Ethereum Registration Authorities are a system of Smart Contracts ... bootstrap information based on domain names to allow Ethereum Private Sidechains to be established between parties which ... gas usage of a reference implementation for the Ethereum Registration Authority system. It analyses the security properties ...

Tópico(s): Cryptography and Data Security

2018 - | The Journal of British Blockchain Association

Artigo Acesso aberto Revisado por pares

Matevž Pustišek, Andrej Kos,

... for the Internet of things (IoT), including the Ethereum, Hyperledger Fabric and IOTA. This paper briefly presents ... end BC applications. They differ in positioning of Ethereum blockchain clients (local device, remote server) and in ... practical constraints of these architectures, which utilize the Ethereum network for trusted transaction exchange, are the data ... and the location and the access to the Ethereum key store. Results of these experiments indicate that a full Ethereum node is not likely to reliably run on ...

Tópico(s): IoT and Edge/Fog Computing

2018 - Elsevier BV | Procedia Computer Science

Artigo Acesso aberto Revisado por pares

Xinming Wang, Jiahao He, Zhijian Xie, Gansen Zhao, Shing-Chi Cheung,

Ethereum smart contracts are programs that can be collectively executed by a network of mutually untrusted nodes. ... the first intrusion detection system (IDS) to defend Ethereum smart contracts against such attacks. Like IDSs for ... However, existing IDS techniques/tools are inapplicable to Ethereum smart contracts due to Ethereum's decentralized nature and its highly restrictive execution ... tagged acyclic paths, and optimizing it under the Ethereum gas-oriented performance model. The main goal is ... investigation using real-life contracts deployed in the Ethereum mainnet shows that on average, ContractGuard only adds ...

Tópico(s): Blockchain Technology Applications and Security

2019 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Services Computing

Artigo Acesso aberto Revisado por pares

Praveen M. Dhulavvagol, Vijayakumar H Bhajantri, Shashikumar G. Totad,

... major problems or issues with the current systems. Ethereum, the most widely used blockchain platform because of ... problems with smart contracts can be implemented with Ethereum and the eradication of third party organizations interfering ... to lack of speed in processing the transactions. Ethereum Blockchain code will be executed by different clients ... The goal of this paper is to understand Ethereum transactions and perform the comparative analysis of Geth and Parity ethereum clients on the private blockchain. In this paper, ...

Tópico(s): Caching and Content Delivery

2020 - Elsevier BV | Procedia Computer Science

Artigo Acesso aberto Revisado por pares

Imran Yousaf, Shoaib Ali,

... to intra-day data for three cryptocurrencies (Bitcoin, Ethereum, and Litecoin), this study examines the return and ... vary across the two periods for the Bitcoin–Ethereum, Bitcoin–Litecoin, and Ethereum–Litecoin pairs. However, the volatility transmissions are found ... during the two sample periods for the Bitcoin–Ethereum and Bitcoin–Litecoin pairs. The constant conditional correlations ... a) in Bitcoin for the portfolios of Bitcoin/Ethereum and Bitcoin/Litecoin and (b) in Ethereum for the portfolios of Ethereum/Litecoin during the ...

Tópico(s): COVID-19 Pandemic Impacts

2020 - Springer Nature | Financial Innovation

Artigo Revisado por pares

Amjad Aldweesh, Maher Alharby, Maryam Mehrnezhad, Aad van Moorsel,

Ethereum is a public, permissionless blockchain, with Ether as cryptocurrency, and with Turing-complete smart contracts to implement arbitrarily complex distributed applications. Correct operation of Ethereum relies on appropriately rewarding participating nodes (called miners) ... the resources used to run the blockchain. In Ethereum the Used Gas determines the reward miners receive ... propose OpBench, a platform-independent benchmark framework for Ethereum, as a lightweight approach to determine if for ...

Tópico(s): Security and Verification in Computing

2020 - Elsevier BV | Performance Evaluation

Artigo Revisado por pares

Artem Meshcheryakov, Stoyu I. Ivanov,

... Ether - the token or cryptocurrency based on the Ethereum platform. Ether is the second largest crypto-currency, ... 70% of combined market share. Similar to Bitcoin, Ethereum experienced rapid growth in price from a few ... 13, 2018. In this paper, we study whether Ethereum crypto-currency is a hedge, diversifier or a safe haven asset. We find that Ethereum crypto-currency is a hedge against the US stock and gold markets. Also, Ethereum tends to behave as a safe haven for ... When currency markets are concerned, we document that Ethereum is a diversifier for the US Dollar.

Tópico(s): Blockchain Technology Applications and Security

2020 - Springer Nature | Economics bulletin

Artigo Revisado por pares

Jieli Liu, J. Chen, Jiajing Wu, Zhiying Wu, Junyuan Fang, Zibin Zheng,

... losses have been caused by phishing scams in Ethereum, the second-largest blockchain system. Existing approaches for Ethereum phishing detection, however, typically use machine learning or ... term a "gang"). Since accounts are pseudonymous in Ethereum, these undisclosed conspirator accounts have potential risks to ... conduct the first study that characterizes and detects Ethereum phishing gangs. We first investigate the transaction behaviors ... order patterns. Our analysis reveals that although the Ethereum transaction graph is sparse with a highly skewed ...

Tópico(s): Spam and Phishing Detection

2024 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Information Forensics and Security

Artigo Acesso aberto

Hind Hassan, Rehab F. Hassan, Ekhlas Gbashi,

... to believe and invest in it. In the Ethereum world, the blockchain runs on smart contracts, self- ... to propose a decentralized elections application based on Ethereum; the application was developed using the Truffle development ... actions of the software were written into an Ethereum smart contract, which was then deployed on the Ethereum network. A web interface had been used to ... s vote before it was broadcast to the Ethereum network through the web3.js API. The ganache was utilized as the Ethereum client. Metalmark was used as a wallet on ...

Tópico(s): Information Retrieval and Data Mining

2023 - University of Technology, Iraq | Engineering and Technology Journal

Capítulo de livro Acesso aberto Revisado por pares

Sri Aravinda Krishnan Thyagarajan, Adithya Bhat, Bernardo Magri, Daniel Tschudi, Aniket Kate,

... dollars were lost in buggy smart contracts in Ethereum. A line of research then spawned on redactable ... with existing running blockchains, such as Bitcoin and Ethereum. This work demonstrates that the traditional build-new- ... present an efficient instantiation of $$\mathsf {Reparo}$$ over Ethereum (with proof of work based consensus) for repairing smart contract bugs. In this protocol, any Ethereum user may propose a repair and a deliberation ... to the repair proposal and the state of Ethereum is updated accordingly. $$\mathsf {Reparo}$$ ’s advantages are ...

Tópico(s): Cloud Data Security Solutions

2021 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Han-Min Kim, Gee‐Woo Bock, Gunwoong Lee,

... of Bitcoin price predictions. However, we find that Ethereum, a popular and leading cryptocurrency in the market, ... Hence, this study investigates the relationship between inherent Ethereum Blockchain information and Ethereum prices. Furthermore, we investigate how Blockchain information concerning ... available coins on the market is associated with Ethereum prices. Our key findings reveal that macro-economy factors, Ethereum-specific Blockchain information, and the Blockchain information of ... cryptocurrency play important roles in the prediction of Ethereum prices.

Tópico(s): Stock Market Forecasting Methods

2021 - Elsevier BV | Expert Systems with Applications

Artigo Acesso aberto Revisado por pares

Ian Rogers, Dave Carter, Benjamin A. Morgan, Anna Edgington,

... that functions as an indivisible token on the Ethereum blockchain. Although all ERC-721 tokens are NFTs, ... creation (minting) and transfer of ownership on the Ethereum network—by far the dominant chain—comes with ... a low-bandwidth stereo audio file on the ethereum network appears cost-prohibitive. This presents a challenge ... votes, and transactions on the blockchain. Bitcoin and Ethereum are often considered the first DAOs of note, ... Nastassia Sachs. “EIP-721: Non-Fungible Token Standard.” Ethereum Improvement Proposals, 2022. 16 Feb. 2022 <https://arxiv. ...

Tópico(s): Music History and Culture

2022 - Queensland University of Technology | M/C Journal

Artigo Acesso aberto Revisado por pares

Satpal Singh Kushwaha, Sandeep Joshi, Dilbag Singh, Manjit Kaur, Heung-No Lee,

... untrusted parties. There are several security vulnerabilities in Ethereum blockchain-based smart contracts, due to which sometimes ... systematic review of the security vulnerabilities in the Ethereum blockchain is presented. The main objective is to discuss Ethereum smart contract security vulnerabilities, detection tools, real life ... and preventive mechanisms. Comparisons are drawn among the Ethereum smart contract analysis tools by considering various features. ... extensive depth review, various issues associated with the Ethereum blockchain-based smart contract are highlighted. Finally, various ...

Tópico(s): Blockchain Technology Applications and Security

2022 - Institute of Electrical and Electronics Engineers | IEEE Access

Artigo Acesso aberto Revisado por pares

Simona Andreea Apostu, Mirela Panait, László Vasa, Constanţa Mihăescu, Zbysław Dobrowolski,

... two types of assets (NFTs and the cryptocurrencies Ethereum, Crypto Coin, and Bitcoin), using data for the ... technology. The results highlighted relationships between NFTs and Ethereum, between Ethereum and Crypto Coin, and between Bitcoin and Ethereum, Ethereum being a bridge between all four. Therefore, NFTs present a relationship with Ethereum, the NFTs price had a causal effect on the price of Ethereum.

Tópico(s): Financial Markets and Investment Strategies

2022 - Multidisciplinary Digital Publishing Institute | Mathematics

Revisão Acesso aberto Revisado por pares

Arkan Hammoodi Hasan Kabla, Mohammed Anbar, Selvakumar Manickam, Taief Alaa Al-Amiedy, Peterson Bernabe Cruspe, Ahmed K. Al-Ani, Shankar Karuppayah,

Ethereum attracts more investors, researchers, and even scammers for many reasons; this is the first platform that ... the applicability of Intrusion Detection System in detecting Ethereum-based attacks. Hence, this paper is among the ... that studies the applicability of IDS in detecting Ethereum-based attacks. In addition, this paper lists all the potential attacks on Ethereum passing through the vulnerabilities that cause those attacks ... analyses all the IDS-based related works of Ethereum attacks detection since the Ethereum platform was launched ...

Tópico(s): Network Security and Intrusion Detection

2022 - Institute of Electrical and Electronics Engineers | IEEE Access

Capítulo de livro Revisado por pares

Yoichi Hirai,

Smart contracts in Ethereum are executed by the Ethereum Virtual Machine (EVM). We defined EVM in Lem, a language that can be compiled ... our definition against a standard test suite for Ethereum implementations. Using our definition, we proved some safety properties of Ethereum smart contracts in an interactive theorem prover Isabelle/ ... a basis for further analysis and generation of Ethereum smart contracts.

Tópico(s): Cryptography and Data Security

2017 - Springer Science+Business Media | Lecture notes in computer science