Special Issue "Blockchain Security"

Submission Deadline: 15 May 2021 (closed)
Guest Editors
Prof. Zhihong Tian, Guangzhou University, China
Prof. Yanhui Guo, University of Illinois Springfield, USA
Prof. Shen Su, Guangzhou University, China
Prof. Hui Lu, Guangzhou University, China

Summary

Motivated by the fast evolvement of blockchain technology, cloud-edge platforms, intelligent transportation systems, smart grid, vehicular networks, location based services, and other IoT applications have achieved significant breakthrough during recent years. Nowadays, blockchain based researches and projects are super-hot topics and focuses for both research and industrial communities. However, most of the current blockchain projects still suffer from insufficient security concerns. The defects of the underlying protocol make the node communication vulnerable to be hijacked, and further exacerbate the fork problem; smart contracts can hardly be fully tested before deployment because of the evolving blockchain platforms, while the smart contracts updating is impossible (or very complicated); current data privacy protection techniques are either inefficient or inaccurate; sharing and cross-chain schemes brought new security problems together with its TPS promotion. The intrinsic security vulnerabilities make the current blockchain based systems and architectures prone to be assaulted, and further do harm to the confidence of the investment on the blockchain industrial. Worse still, blockchain turns out to play a critical role in a lot of existing security solutions, which would be useless if the blockchain is insecure.

 

This special issue aims to bring together researchers, engineers, students in both academic and industrial communities to share and present their recent insights and emerging results of the blockchain security technologies.


Keywords
Potential topics include but are not limited to:
• Key management schemes for blockchain
• Theoretical model for blockchain
• Transaction anonymization techniques
• Smart contract vulnerability mining and formal verification methods
• Online transaction protection for smart contract
• Supervisory control and governance in blockchain networks
• Security solutions for cross-chain communication and multi-chain technology
• Security solutions for sharding techniques
• Network security of blockchain
• Data privacy protection scheme for blockchain data and network
• Security solutions for external data collection
• Security of consensus protocol
• Initialization and reconstruction schemes for blockchain
• Defense mechanism for blockchain cyber attacks
• Blockchain-based security reinforcement solutions

Published Papers
  • A Deletable and Modifiable Blockchain Scheme Based on Record Verification Trees and the Multisignature Mechanism
  • Abstract As one of the most valuable technologies, blockchains have received extensive attention from researchers and industry circles and are widely applied in various scenarios. However, data on a blockchain cannot be deleted. As a result, it is impossible to clean invalid and sensitive data and correct erroneous data. This, to a certain extent, hinders the application of blockchains in supply chains and Internet of Things. To address this problem, this study presents a deletable and modifiable blockchain scheme (DMBlockChain) based on record verification trees (RVTrees) and the multisignature scheme. (1) In this scheme, an RVTree structure is designed and added… More
  •   Views:122       Downloads:113        Download PDF

  • An Adversarial Smart Contract Honeypot in Ethereum
  • Abstract A smart contract honeypot is a special type of smart contract. This type of contract seems to have obvious vulnerabilities in contract design. If a user transfers a certain amount of funds to the contract, then the user can withdraw the funds in the contract. However, once users try to take advantage of this seemingly obvious vulnerability, they will fall into a real trap. Consequently, the user’s investment in the contract cannot be retrieved. The honeypot induces other accounts to launch funds, which seriously threatens the security of property on the blockchain. Detection methods for honeypots are available. However, studying… More
  •   Views:115       Downloads:107        Download PDF

  • Attribute-Based Keyword Search over the Encrypted Blockchain
  • Abstract To address privacy concerns, data in the blockchain should be encrypted in advance to avoid data access from all users in the blockchain. However, encrypted data cannot be directly retrieved, which hinders data sharing in the blockchain. Several works have been proposed to deal with this problem. However, the data retrieval in these schemes requires the participation of data owners and lacks finer-grained access control. In this paper, we propose an attribute-based keyword search scheme over the encrypted blockchain, which allows users to search encrypted files over the blockchain based on their attributes. In addition, we build a file chain… More
  •   Views:128       Downloads:97        Download PDF

  • Mining Bytecode Features of Smart Contracts to Detect Ponzi Scheme on Blockchain
  • Abstract The emergence of smart contracts has increased the attention of industry and academia to blockchain technology, which is tamper-proofing, decentralized, autonomous, and enables decentralized applications to operate in untrustworthy environments. However, these features of this technology are also easily exploited by unscrupulous individuals, a typical example of which is the Ponzi scheme in Ethereum. The negative effect of unscrupulous individuals writing Ponzi scheme-type smart contracts in Ethereum and then using these contracts to scam large amounts of money has been significant. To solve this problem, we propose a detection model for detecting Ponzi schemes in smart contracts using bytecode. In… More
  •   Views:241       Downloads:263        Download PDF

  • Stereo Matching Method Based on Space-Aware Network Model
  • Abstract The stereo matching method based on a space-aware network is proposed, which divides the network into three sections: Basic layer, scale layer, and decision layer. This division is beneficial to integrate residue network and dense network into the space-aware network model. The vertical splitting method for computing matching cost by using the space-aware network is proposed for solving the limitation of GPU RAM. Moreover, a hybrid loss is brought forward to boost the performance of the proposed deep network. In the proposed stereo matching method, the space-aware network is used to calculate the matching cost and then cross-based cost aggregation… More
  •   Views:374       Downloads:286        Download PDF