ScanAT: Identification of Bytecode-Only Smart Contracts With Multiple Attribute Tags
نویسندگان
چکیده
منابع مشابه
Multiple Object Identification with Passive RFID Tags
We investigate the applicability of passive RFID systems to the task of identifying multiple tagged objects simultaneously, assuming that the number of tags is not known in advance. We present a combinatorial model of the communication mechanism between the reader device and the tags, and use this model to derive the optimal parameter setting for the reading process, based on estimates for the ...
متن کاملSmart RFID Tags
RFID has been identified as one of the cornerstones of the upcoming Internet of Things (IoT) and the focus is moving from conventional RFID towards next generation pervasive networked and interconnected systems. In the future IoT billions of objects are envisioned to report their identity, location, environmental conditions and history over wireless connections. An on-going effort that will sup...
متن کاملCreating a Ubiquitous Environment with Smart-Tags
The ability to retrieve and process static and dynamic data associated with and stored locally on real-life objects is a challenge not to be underestimated when it comes to creating an “ubiquitous”, “pervasive” environment in which a nomadic user can gain access to contextual information based on which he or she can then make educated decisions. This paper presents a scalable, distributed archi...
متن کاملQuantitative Analysis of Smart Contracts
Smart contracts are computer programs that are executed by a network of mutually distrusting agents, without the need of an external trusted authority. Smart contracts handle and transfer assets of considerable value (in the form of crypto-currency like Bitcoin). Hence, it is crucial that their implementation is bug-free. We identify the utility (or expected payoff) of interacting with such sma...
متن کاملBytecode verification on Java smart cards
This article presents a novel approach to the problem of bytecode verification for Java Card applets. By relying on prior off-card bytecode transformations, we simplify the bytecode verifier and reduce its memory requirements to the point where it can be embedded on a smart card, thus increasing significantly the security of post-issuance downloading of applets on Java Cards. This article descr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2019
ISSN: 2169-3536
DOI: 10.1109/access.2019.2927003