Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts

作者: Ting Chen , Jin Li , Qiben Yan , Nikolay Ivanov , Jianzhi Lou

DOI:

关键词:

摘要: … them in source codes of five popular smart contracts with … to remain dormant during the testing phase and activate only … , the smart contract does not contain any explicitly malicious code, …

参考文章(19)
Lorrie Faith Cranor, Jason I. Hong, Serge Egelman, Yue Zhang, Phinding Phish: An Evaluation of Anti-Phishing Toolbars network and distributed system security symposium. ,(2006)
Steven D. Gribble, Tobias Holgers, David E. Watson, Cutting through the confusion: a measurement study of homograph attacks usenix annual technical conference. pp. 24- 24 ,(2006)
Mark Felegyhazi, Chris Kanich, Jonathan Spring, Balazs Kocso, Janos Szurdi, Gabor Cseh, The long Taile of typosquatting domain names usenix security symposium. pp. 191- 206 ,(2014)
Ajaya Neupane, Md. Lutfor Rahman, Nitesh Saxena, Leanne Hirshfield, A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings computer and communications security. pp. 479- 491 ,(2015) , 10.1145/2810103.2813660
Ajaya Neupane, Nitesh Saxena, Keya Kuruvilla, Michael Georgescu, Rajesh Kana, Neural Signatures of User-Centered Security: An fMRI Study of Phishing, and Malware Warnings. network and distributed system security symposium. ,(2014) , 10.14722/NDSS.2014.23056
Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Little, The methodology and an application to fight against Unicode attacks symposium on usable privacy and security. pp. 91- 101 ,(2006) , 10.1145/1143120.1143132
Marria Nazif, Brian Ryner, Colin Whittaker, Large-Scale Automatic Classification of Phishing Pages network and distributed system security symposium. ,(2010)
Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, Aquinas Hobor, Making Smart Contracts Smarter computer and communications security. pp. 254- 269 ,(2016) , 10.1145/2976749.2978309
Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli, A Survey of Attacks on Ethereum Smart Contracts SoK principles of security and trust. ,vol. 10204, pp. 164- 186 ,(2017) , 10.1007/978-3-662-54455-6_8
Petar Tsankov, Andrei Dan, Dana Drachsler-Cohen, Arthur Gervais, Florian Bünzli, Martin Vechev, Securify: Practical Security Analysis of Smart Contracts computer and communications security. pp. 67- 82 ,(2018) , 10.1145/3243734.3243780