Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








6 Hits in 3.1 sec

SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks [chapter]

Wenhao Wang, Benjamin Ferrell, Xiaoyang Xu, Kevin W. Hamlen, Shuang Hao
2018 Lecture Notes in Computer Science  
The approach addresses a new wave of cryptojacking attacks, including XSS-assisted, web gadget-exploiting counterfeit mining.  ...  A method of detecting and interrupting unauthorized, browserbased cryptomining is proposed, based on semantic signature-matching.  ...  In general, the miners we tested incurred a runtime overhead of roughly 100%.  ... 
doi:10.1007/978-3-319-98989-1_7 fatcat:ubgcajsf4zfwpbcr762fclrlni

An overview on smart contracts: Challenges, advances and platforms

Zibin Zheng, Shaoan Xie, Hong-Ning Dai, Weili Chen, Xiangping Chen, Jian Weng, Muhammad Imran
2019 Future generations computer systems  
Although smart contracts are promising to drive the new wave of innovation in business processes, there are a number of challenges to be tackled.This paper presents a survey on smart contracts.  ...  As a result, smart contracts can cut down administration and save services costs, improve the efficiency of business processes and reduce the risks.  ...  In particular, a formal verification method was proposed in [54] to analyze and verify both the runtime safety and the functional correctness of smart contracts (e.g., Ethereum contracts).  ... 
doi:10.1016/j.future.2019.12.019 fatcat:usxpqm6vpzhefekeeukbwj4sku

Proceedings of the Seminar Innovative Internet Technologies and Mobile Communications (IITM), Winter Semester 2021/2022

Georg Carle, Stephan Günther, Benedikt Jaeger, Chair Of Network Architectures
2022
This has created a large demand for DDoS Protection Services (DPS) in the last decade, who use their clouds to defend customers from larger attacks every year.  ...  The paper shows the three basic components of a potent defence against DDoS attacks which are attack detection, traffic classification and attack response.  ...  (WebAssembly page size is 64Ki) [18] How Modules Access APIs A module does not have access to anything but its own memory and sandboxed runtime.  ... 
doi:10.2313/net-2022-07-1 fatcat:uui75dwe6zb5phttvrmuijsq7m

Proceedings of the Seminar Innovative Internet Technologies and Mobile Communications (IITM), Winter Semester 2021/2022

Georg Carle, Stephan Günther, Benedikt Jaeger, Chair Of Network Architectures
2022
This has created a large demand for DDoS Protection Services (DPS) in the last decade, who use their clouds to defend customers from larger attacks every year.  ...  The paper shows the three basic components of a potent defence against DDoS attacks which are attack detection, traffic classification and attack response.  ...  (WebAssembly page size is 64Ki) [18] How Modules Access APIs A module does not have access to anything but its own memory and sandboxed runtime.  ... 
doi:10.2313/net-net-2022-07-1 fatcat:rinzenj33rdvdko2kdgp5jzkku

Dagstuhl Reports, Volume 11, Issue 10, October 2021, Complete Issue [article]

2022
WebAssembly with WASI, for example, could be trivially implemented with native compilation and running the result in a process using Capsicum sandboxing.  ...  runtime checks.  ...  In this talk, we report on a project that has been ongoing for over 5 years on building a formally verified secure compilation chain for unsafe C components based on a variant of the CompCert compiler  ... 
doi:10.4230/dagrep.11.10 fatcat:mqui2qttdrdt7p6y3nbkkodoci

Comparison of ethereum and NEO as smart contract platforms

Marco Bareis, Monika di Angelo
2020
In order to execute the comparison in a structured manner, this thesis derives a catalogue of criteria by extracting criteria used in scientific literature.  ...  Furthermore, it enables a discussion about the effects of those differences.  ...  A prominent example which is currently discussed are security token.  ... 
doi:10.34726/hss.2019.66705 fatcat:bs3asgubl5gojllclohhj6ovoy