A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks
[chapter]
2018
Lecture Notes in Computer Science
The approach addresses a new wave of cryptojacking attacks, including XSS-assisted, web gadget-exploiting counterfeit mining. ...
A method of detecting and interrupting unauthorized, browserbased cryptomining is proposed, based on semantic signature-matching. ...
In general, the miners we tested incurred a runtime overhead of roughly 100%. ...
doi:10.1007/978-3-319-98989-1_7
fatcat:ubgcajsf4zfwpbcr762fclrlni
An overview on smart contracts: Challenges, advances and platforms
2019
Future generations computer systems
Although smart contracts are promising to drive the new wave of innovation in business processes, there are a number of challenges to be tackled.This paper presents a survey on smart contracts. ...
As a result, smart contracts can cut down administration and save services costs, improve the efficiency of business processes and reduce the risks. ...
In particular, a formal verification method was proposed in [54] to analyze and verify both the runtime safety and the functional correctness of smart contracts (e.g., Ethereum contracts). ...
doi:10.1016/j.future.2019.12.019
fatcat:usxpqm6vpzhefekeeukbwj4sku
Proceedings of the Seminar Innovative Internet Technologies and Mobile Communications (IITM), Winter Semester 2021/2022
2022
This has created a large demand for DDoS Protection Services (DPS) in the last decade, who use their clouds to defend customers from larger attacks every year. ...
The paper shows the three basic components of a potent defence against DDoS attacks which are attack detection, traffic classification and attack response. ...
(WebAssembly page size is 64Ki) [18]
How Modules Access APIs A module does not have access to anything but its own memory and sandboxed runtime. ...
doi:10.2313/net-2022-07-1
fatcat:uui75dwe6zb5phttvrmuijsq7m
Proceedings of the Seminar Innovative Internet Technologies and Mobile Communications (IITM), Winter Semester 2021/2022
2022
This has created a large demand for DDoS Protection Services (DPS) in the last decade, who use their clouds to defend customers from larger attacks every year. ...
The paper shows the three basic components of a potent defence against DDoS attacks which are attack detection, traffic classification and attack response. ...
(WebAssembly page size is 64Ki) [18]
How Modules Access APIs A module does not have access to anything but its own memory and sandboxed runtime. ...
doi:10.2313/net-net-2022-07-1
fatcat:rinzenj33rdvdko2kdgp5jzkku
Dagstuhl Reports, Volume 11, Issue 10, October 2021, Complete Issue
[article]
2022
WebAssembly with WASI, for example, could be trivially implemented with native compilation and running the result in a process using Capsicum sandboxing. ...
runtime checks. ...
In this talk, we report on a project that has been ongoing for over 5 years on building a formally verified secure compilation chain for unsafe C components based on a variant of the CompCert compiler ...
doi:10.4230/dagrep.11.10
fatcat:mqui2qttdrdt7p6y3nbkkodoci
Comparison of ethereum and NEO as smart contract platforms
2020
In order to execute the comparison in a structured manner, this thesis derives a catalogue of criteria by extracting criteria used in scientific literature. ...
Furthermore, it enables a discussion about the effects of those differences. ...
A prominent example which is currently discussed are security token. ...
doi:10.34726/hss.2019.66705
fatcat:bs3asgubl5gojllclohhj6ovoy