A Survey of Attacks on Ethereum Smart Contracts SoK
Citations
3 citations
Cites background from "A Survey of Attacks on Ethereum Sma..."
...Such flaws can be turned into vulnerabilities and cause a great harm, and there are many examples of such vulnerabilities and attacks that exploit them [2]....
[...]
3 citations
Cites background from "A Survey of Attacks on Ethereum Sma..."
...A comprehensive taxonomy of vulnerabilities of smart contracts can be found in [16]....
[...]
...Expressing financial derivatives in a specialized DSL may be more precise and less error prone than specifying them in a general purpose smart contracts language [16]....
[...]
3 citations
Cites background from "A Survey of Attacks on Ethereum Sma..."
...Academic research is gathering pace and it is so far focused on network/PoW attacks, such as the 51% and eclipse attacks [25] and application bugs: reentrancy, [3] including effort towards formal verification of contracts [35]....
[...]
3 citations
3 citations
References
2,964 citations
2,755 citations
1,495 citations
1,258 citations
1,232 citations