Lightweight extension of an execution environment for safer function calls in Solidity/Ethereum Virtual Machine smart contracts

Author(s):  
Sooyeon Lee ◽  
Eun-Sun Cho
2021 ◽  
Author(s):  
Marco Crosara ◽  
Luca Olivieri ◽  
Fausto Spoto ◽  
Fabio Tagliaferro

Author(s):  
YU ZHANG ◽  
FEI XIE ◽  
YUNWEI DONG ◽  
GANG YANG ◽  
XINGSHE ZHOU

Cyber-physical systems (CPS) tightly integrate cyber and physical components and transcend discrete and continuous domains. It is greatly desired that the synergy between cyber and physical components of CPS is explored even before the complete system is put together. Virtualization has potential to play a significant role in exploring such synergy. In this paper, we propose a CPS virtualization approach based on the integration of virtual machine and physical component emulator. It enables real software, virtual hardware, and virtual physical components to execute in a holistic virtual execution environment. We have implemented this approach using QEMU as the virtual machine and Matlab/Simulink as the physical component emulator, respectively. To achieve high-fidelity between the real system and its virtualization, we have developed a strategy for synchronizing the virtual machine and the physical component emulator. To evaluate our approach, we have successfully applied it to real-world control systems. Experiments results have shown that our approach achieves high-fidelity in capturing dynamic behaviors of the entire system. This approach is promising in enabling early development of cyber components of CPS and early exploration of the synergy of cyber and physical components.


Sensors ◽  
2020 ◽  
Vol 20 (11) ◽  
pp. 3172
Author(s):  
Yihuai Liang ◽  
Yan Li ◽  
Byeong-Seok Shin

Crowdsensing applications provide platforms for sharing sensing data collected by mobile devices. A blockchain system has the potential to replace a traditional centralized trusted third party for crowdsensing services to perform operations that involve evaluating the quality of sensing data, finishing payment, and storing sensing data and so forth. The requirements which are codified as smart contracts are executed to evaluate the quality of sensing data in a blockchain. However, regardless of the fact that the quality of sensing data may actually be sufficient, one key challenge is that malicious requesters can deliberately publish abnormal requirements that cause failure to occur in the quality evaluation process. If requesters control a miner node or full node, they can access the data without making payment; this is because of the transparency of data stored in the blockchain. This issue promotes unfair dealing and severely lowers the motivation of workers to participate in crowdsensing tasks. We (i) propose a novel crowdsensing scheme to address this issue using Trusted Execution Environments; (ii) offer a solution for the confidentiality and integrity of sensing data, which is only accessible by the worker and corresponding requester; (iii) and finally, report on the implementation of a prototype and evaluate its performance. Our results demonstrate that the proposed solution can guarantee fairness without a significant increase in overhead.


Author(s):  
Simão Melo de Sousa ◽  
Mário M. Freire ◽  
Rui C. Cardoso

Unlike mobile computing, in which hardware moves, mobile code moves from nodes to other nodes and can change the machines where it is executed. A paradigmatic example of such mobile code are Java applets that can be downloaded from a distant machine and executed by a virtual machine embedded in a browser. Multi-application smart cards (like Javacards) are an example of an execution environment that allows the loading and the execution of (mobile) programs into a card after its issuance. Code mobility allows the software reconfiguration without delivering a physical support, as done by Sun initially with Java to reprogram cable TV boxes, or nowadays, by Microsoft to promptly distribute software patches. PostScript files are another type of mobile programs which execute in printers to produce graphic images. Mobile code may also be used in distributed systems to adapt autonomously in order to balance loads or compensate for hardware failures (Brooks, 2004). Mobile code has received a great deal of interest as a promising solution to increase system flexibility, scalability, and reliability. However, to reach such objectives, some issues need to be matured, namely security issues. This article addresses security issues in mobile code paradigms.


2013 ◽  
Vol 32 (3) ◽  
pp. 831-834
Author(s):  
Jian-ping LU ◽  
Yu-dong GUO ◽  
Xiao-rui WAND ◽  
Yu-chun ZHAO

2018 ◽  
Vol 23 (03) ◽  
pp. 69-69
Author(s):  
Gregor Hohenberg
Keyword(s):  

Die Digitalisierung ist mehr als ein technologischer Trend – sie verändert auch die Organisation im Krankenhaus. Daher ist dieses Thema zur Chefsache geworden. Schließlich geht es um die grundsätzlichen Geschäftsmodelle und daher um die Zukunftsfähigkeit der Einrichtung. Speziell die Blockchaintechnologie wirft grundsätzliche Fragen auf.


Sign in / Sign up

Export Citation Format

Share Document