Sharma, Mayank (2023) Optimizing Detection of Reentrancy attacks in Solidity Smart Contracts. Masters thesis, Dublin, National College of Ireland.
Preview |
PDF (Master of Science)
Download (895kB) | Preview |
Preview |
PDF (Configuration manual)
Download (4MB) | Preview |
Abstract
Smart contracts, which are self-executing contracts with the terms of the agreement between buyer and seller being directly written into lines of code, have the potential to automate and improve efficiency in various industries such as supply chain management, financial transactions, and legal agreements by storing the contract on a distributed ledger. However, vulnerabilities in the code of smart contracts can be exploited by malicious actors, leading to unauthorized access to funds or sensitive information, disruption of contract execution, and other harmful effects. One type of attack on smart contracts is the reentrancy attack, in which a contract function is repeatedly called before its execution is complete, potentially allowing for the manipulation of data or draining of funds.
The proposed solution combines manual testing with static code analysis and the use of tools such as Hardhat and Slither to optimize and maximize the detection of reentrancy attacks and other vulnerabilities in smart contracts. By following this approach, developers can help to ensure the reliability and trustworthiness of their contracts and protect against attacks. This research aims to provide a solution for detecting reentrancy attacks in smart contracts that involve a combination of manual testing using the Hardhat test runner and static analysis with the Slither tool. Initial evaluation of this approach has shown promising results in efficiently detecting vulnerabilities and mitigating risks prior to deployment. Further research is needed to fully assess the effectiveness of this solution and explore potential improvements.
Item Type: | Thesis (Masters) |
---|---|
Supervisors: | Name Email Sahni, Vikas UNSPECIFIED |
Subjects: | Q Science > QA Mathematics > Electronic computers. Computer science T Technology > T Technology (General) > Information Technology > Electronic computers. Computer science Q Science > QA Mathematics > Computer software > Computer Security T Technology > T Technology (General) > Information Technology > Computer software > Computer Security H Social Sciences > HD Industries. Land use. Labor > Business Logistics > Supply Chain Management |
Divisions: | School of Computing > Master of Science in Cyber Security |
Depositing User: | Tamara Malone |
Date Deposited: | 04 May 2023 16:53 |
Last Modified: | 04 May 2023 16:53 |
URI: | https://norma.ncirl.ie/id/eprint/6543 |
Actions (login required)
View Item |