DeepAI AI Chat
Log In Sign Up

Extorsionware: Exploiting Smart Contract Vulnerabilities for Fun and Profit

by   Alessandro Brighente, et al.

Smart Contracts (SCs) publicly deployed on blockchain have been shown to include multiple vulnerabilities, which can be maliciously exploited by users. In this paper, we present extorsionware, a novel attack exploiting the public nature of vulnerable SCs to gain control over the victim's SC assets. Thanks to the control gained over the SC, the attacker obliges the victim to pay a price to re-gain exclusive control of the SC.


A Survey on Vulnerabilities of Ethereum Smart Contracts

Smart contract (SC) is an extension of BlockChain technology. Ethereum B...

ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks

In recent years, smart contracts have suffered major exploits, costing m...

Smart Contract Vulnerabilities: Does Anyone Care?

In the last year we have seen a great deal of both academic and practica...

Metamorphic Testing for Smart Contract Vulnerabilities Detection

Despite the rapid growth of smart contracts, they are suffering numerous...

Why Do Smart Contracts Self-Destruct? Investigating the Selfdestruct Function on Ethereum

The Selfdestruct function is provided by Ethereum smart contracts to des...

Smart Contracts Software Metrics: a First Study

Smart contracts (SC) are software codes which reside and run over a bloc...

Building a National Smart Campus to support sustainable business development: An ecosystem approach

Universities are racing towards making their campuses and cities smart i...