Smart contracts: security patterns in the ethereum ecosystem and solidity

@article{Wohrer2018SmartCS,
  title={Smart contracts: security patterns in the ethereum ecosystem and solidity},
  author={Maximilian Wohrer and U. Zdun},
  journal={2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE)},
  year={2018},
  pages={2-8}
}
  • Maximilian Wohrer, U. Zdun
  • Published 2018
  • Computer Science
  • 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE)
Smart contracts that build up on blockchain technologies are receiving great attention in new business applications and the scientific community, because they allow untrusted parties to manifest contract terms in program code and thus eliminate the need for a trusted third party. The creation process of writing well performing and secure contracts in Ethereum, which is today’s most prominent smart contract platform, is a difficult task. Research on this topic has only recently started in… Expand
Design Patterns for Smart Contracts in the Ethereum Ecosystem
  • Maximilian Wohrer, U. Zdun
  • Computer Science
  • 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
  • 2018
Security Issues of Smart Contracts in Ethereum Platforms
Security Vulnerabilities in Ethereum Smart Contracts
SoK: Development of Secure Smart Contracts - Lessons from a Graduate Course
Developing Safe Smart Contracts
...
1
2
3
4
5
...

References

SHOWING 1-8 OF 8 REFERENCES
A Survey of Attacks on Ethereum Smart Contracts (SoK)
Blockchain-based Smart Contracts: A Systematic Mapping Study
An Empirical Analysis of Smart Contracts: Platforms, Applications, and Design Patterns
ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER
Applying Software Patterns to Address Interoperability in Blockchain-based Healthcare Apps
Analysis of the dao exploit
  • 2016, [Online; accessed 6-September-2017 ]. [Online]. Available: http://hackingdistributed.com/2016/ 06/18/analysis-of-the-dao-exploit/
  • 2016
Design patterns: elements of
  • 1994.
  • 1994
Security considerations — solidity 0 . 4 . 18 documentation