SoK: TEE-Assisted Confidential Smart Contract

نویسندگان

چکیده

The blockchain-based smart contract lacks privacy, since the state and instruction code are exposed to public. Combining smart-contract execution with Trusted Execution Environments provides an efficient solution, called TEE-assisted contracts (TCSC), for protecting confidentiality of states. However, combination approaches varied, a systematic study is absent. Newly released systems may fail draw upon experience learned from existing protocols, such as repeating known design mistakes or applying TEE technology in insecure ways. In this paper, we first investigate categorize into two types: layer-one solution layer-two solution. Then, establish analysis framework capture their common aspects, covering desired properties (for services), threat models, security considerations underlying systems). Based on our taxonomy, identify ideal functionalities, uncover fundamental flaws challenges each specification’s design. We believe that work would provide guide development contracts, well evaluate future TCSC systems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey of Attacks on Ethereum Smart Contracts (SoK)

Smart contracts are computer programs that can be correctly executed by a network of mutually distrusting nodes, without the need of an external trusted authority. Since smart contracts handle and transfer assets of considerable value, besides their correct execution it is also crucial that their implementation is secure against attacks which aim at stealing or tampering the assets. We study th...

متن کامل

Scilla: a Smart Contract Intermediate-Level LAnguage

This paper outlines key design principles of Scilla—an intermediatelevel language for verified smart contracts. Scilla provides a clean separation between the communication aspect of smart contracts on a blockchain, allowing for the rich interaction patterns, and a programming component, which enjoys principled semantics and is amenable to formal verification. Scilla is not meant to be a high-l...

متن کامل

SoK: XML Parser Vulnerabilities

The Extensible Markup Language (XML) has become a widely used data structure for web services, SingleSign On, and various desktop applications. The core of the entire XML processing is the XML parser. Attacks on XML parsers, such as the Billion Laughs and the XML External Entity (XXE) Attack are known since 2002. Nevertheless even experienced companies such as Google, and Facebook were recently...

متن کامل

Intermediate TEE

Over 56,000 aortic valves are replaced annually in the United States, making AS the second most common reason for heart surgery, behind only coronary artery disease. The intraoperative echocardiographer plays a part in confirming the diagnosis of AS, quantifying its severity, and ensuring proper prosthetic valve function postoperatively. However, the aortic valve is only one component of the ao...

متن کامل

Smart Contract-Based Access Control for the Internet of Things

This paper investigates a critical access control issue in the Internet of Things (IoT). In particular, we propose a smart contract-based framework, which consists of multiple access control contracts (ACCs), one judge contract (JC) and one register contract (RC), to achieve distributed and trustworthy access control for IoT systems. Each ACC provides one access control method for a subject-obj...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings on Privacy Enhancing Technologies

سال: 2022

ISSN: ['2299-0984']

DOI: https://doi.org/10.56553/popets-2022-0093