Under-optimized smart contracts devour your money

@article{Chen2017UnderoptimizedSC,
  title={Under-optimized smart contracts devour your money},
  author={Ting Chen and Xiaoqi Li and Xiapu Luo and Xiaosong Zhang},
  journal={2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER)},
  year={2017},
  pages={442-446}
}
Smart contracts are full-fledged programs that run on blockchains (e.g., Ethereum, one of the most popular blockchains). In Ethereum, gas (in Ether, a cryptographic currency like Bitcoin) is the execution fee compensating the computing resources of miners for running smart contracts. However, we find that under-optimized smart contracts cost more gas than necessary, and therefore the creators or users will be overcharged. In this work, we conduct the first investigation on Solidity, the… CONTINUE READING
Highly Cited
This paper has 45 citations. REVIEW CITATIONS
Related Discussions
This paper has been referenced on Twitter 9 times. VIEW TWEETS

Citations

Publications citing this paper.
Showing 1-10 of 25 extracted citations

Erays: Reverse Engineering Ethereum's Opaque Smart Contracts

USENIX Security Symposium • 2018
View 1 Excerpt

MPCSToken: Smart Contract Enabled Fault-Tolerant Incentivisation for Mobile P2P Crowd Services

2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS) • 2018
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 11 references

Making Smart Contracts Smarter

ACM Conference on Computer and Communications Security • 2016
View 4 Excerpts
Highly Influenced

An authenticated data feed for smart contracts

F. Zhang, E. Cecchetti, K. Croman, A. Juels, E. Shi
Proc . CCS • 2016

Jun., 2016) Bitcoin price rally rages on, market cap passes $10bn usd

J. Redman
2016
View 1 Excerpt

The Ring of Gyges: Investigating the Future of Criminal Smart Contracts

ACM Conference on Computer and Communications Security • 2016
View 1 Excerpt

Town Crier: An Authenticated Data Feed for Smart Contracts

ACM Conference on Computer and Communications Security • 2016
View 1 Excerpt

Similar Papers

Loading similar papers…