DeepAI AI Chat
Log In Sign Up

(B)LOCKBOX – Secure Software Architecture with Blockchain Verification

by   Erik Heiland, et al.

According to experts, one third of all IT vulnerabilities today are due to inadequate software verification. Internal program processes are not sufficiently secured against manipulation by attackers, especially if access has been gained. There is a lack of internal control instances that can monitor and control program flows. Especially when a software vulnerability becomes known, quick action is required, whereby the consequences for an individual application are often not foreseeable. With our approach (B)LOCKBOX, software building blocks act as verified entities within a transaction-based blockchain network. Source Code, binaries and application execution become supervised. Unwanted interference and manipulation are prevented by the integrity of the distributed system.


Formalising and verifying smart contracts with Solidifier: a bounded model checker for Solidity

The exploitation of smart-contract vulnerabilities can have catastrophic...

Referencing Source Code Artifacts: a Separate Concern in Software Citation

Among the entities involved in software citation, software source code r...

The Secure Machine: Efficient Secure Execution On Untrusted Platforms

In this work we present the Secure Machine, SeM for short, a CPU archite...

Sphinx: A Secure Architecture Based on Binary Code Diversification and Execution Obfuscation

Sphinx, a hardware-software co-design architecture for binary code and r...

Practical and Scalable Security Verification of Secure Architectures

We present a new and practical framework for security verification of se...

Blockchain-based System Evaluation: The Effectiveness of Blockchain on E-Procurements

Electronic systems tend to simplify the tedious traditional scheme and b...

Securely Compiling Verified F* Programs With IO

We propose a secure compilation chain for statically verified partial pr...