SlideShare a Scribd company logo
1 of 20
Blockchain Contract Fortification:
Bytecode Analysis To Check For Smart Contract
Vulnerabilities
Project by:
Mohammed Abdul Lateef
22011DA802
Title:
Agenda
1. Introduction
2. Problem Statement
3. Approach
4. Results
5. Conclusion
6. References
• In today's fast-paced world, traditional methods of
handling transactions face numerous challenges.
• Slow and costly processes, intermediaries, and lack
of transparency are just a few of the pain points.
• Fortunately, emerging technologies like smart
contracts and blockchain offer innovative
solutions.
INTRODUCTION:
•Smart contracts are SELF-EXECUTING AGREEMENTS with
predefined conditions written into code.
•Automatically execute when the conditions are met.
•By combining blockchain's trust and security with automation,
smart contracts unlock tremendous potential.
What is
Agenda
1. Introduction
2. Problem Statement/Objective
3. Approach
4. Result
5. Conclusion
6. References
• Blockchain platforms and smart contracts
are vulnerable to security breaches.
• Security breaches of smart contracts have
led to huge financial losses in terms of
cryptocurrencies and tokens
Smart Contract Vunlerability
Agenda
1. Introduction
2. Problem Statement
3. Approach
4. Results
5. Conclusion
6. References
Case study applied and considered:
• E-voting
function increase() external {
++counter;
}
Breakdown Of High Level Smart Contract Code
Vulnerability Check Tools Other Tools and Software
Agenda
1. Introduction
2. Problem Statement
3. Approach
4. Results
5. Conclusion
6. References
Figure 1: Bytecode and Solidity Code analysis by tools
Agenda
1. Introduction
2. Problem Statement
3. Approach
4. Results
5. Conclusion
6. References
The approach combines automated analysis through tools and
manual examination for inspection of bytecode.
• Overall, the key focus is inclined to have a concise view of
what vulnerabilities in smart contract can be checked
through bytecode analysis.
Concluding statement…
Agenda
1. Introduction
2. Problem Statement
3. Approach
4. Conclusion
5. References
References
1 . A survey on smart contract vulnerabilities: Data sources, detection and repair,
Information and Software Technology,
Volume 159, 2023,107221, ISSN 0950-5849,
* https://doi.org/10.1016/j.infsof.2023.107221
(https://www.sciencedirect.com/science/article/pii/S0950584923000757)
2. https://medium.com/@alexanderzammit_97283/smart-contract-deployment-internals-cc9cca4f4ae6
Blockchain Smart Contract Fortification presentation.pptx

More Related Content

Similar to Blockchain Smart Contract Fortification presentation.pptx

Blockchain demystified
Blockchain demystifiedBlockchain demystified
Blockchain demystifiedAlan Morrison
 
How Blockchain is Solving the Pain Points in the Payments Sector.pptx
How Blockchain is Solving the Pain Points in the Payments Sector.pptxHow Blockchain is Solving the Pain Points in the Payments Sector.pptx
How Blockchain is Solving the Pain Points in the Payments Sector.pptxCigniti Technologies Ltd
 
BlockToken - How to Launch an ICO or STO
BlockToken - How to Launch an ICO or STOBlockToken - How to Launch an ICO or STO
BlockToken - How to Launch an ICO or STOGenson Glier
 
use of block chain technoligy in bankinig
use of block chain technoligy in bankiniguse of block chain technoligy in bankinig
use of block chain technoligy in bankinigifrashafiqueedu
 
Blockchain for Business
Blockchain for BusinessBlockchain for Business
Blockchain for BusinessAhmad Gohar
 
Impact of Blockchain on IT AuditBlockchain Techn.docx
Impact of Blockchain on IT AuditBlockchain Techn.docxImpact of Blockchain on IT AuditBlockchain Techn.docx
Impact of Blockchain on IT AuditBlockchain Techn.docxsheronlewthwaite
 
Blockchain ppt.pptx
Blockchain ppt.pptxBlockchain ppt.pptx
Blockchain ppt.pptxFitddFfe
 
Impact on the financial sector of blockchain technology
Impact on the financial sector of blockchain technologyImpact on the financial sector of blockchain technology
Impact on the financial sector of blockchain technologyBlockchain Council
 
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET- Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET Journal
 
IRJET- Blockchain Technology a Literature Survey
IRJET- Blockchain Technology a Literature SurveyIRJET- Blockchain Technology a Literature Survey
IRJET- Blockchain Technology a Literature SurveyIRJET Journal
 
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...IRJET Journal
 
Supply Chain Management using Blockchain
Supply Chain Management using BlockchainSupply Chain Management using Blockchain
Supply Chain Management using BlockchainYugn27
 
LIVEPLEX BLOCKCHAIN IN BANKING.pdf
LIVEPLEX BLOCKCHAIN IN BANKING.pdfLIVEPLEX BLOCKCHAIN IN BANKING.pdf
LIVEPLEX BLOCKCHAIN IN BANKING.pdfLiveplex
 
BEGIN BLOCKCHAIN - Module 3 FINAL.pptx
BEGIN BLOCKCHAIN - Module 3 FINAL.pptxBEGIN BLOCKCHAIN - Module 3 FINAL.pptx
BEGIN BLOCKCHAIN - Module 3 FINAL.pptxcaniceconsulting
 
4 Challenges Blockchain Can Resolve For Fintech Industry .pdf
4 Challenges Blockchain Can Resolve For Fintech Industry .pdf4 Challenges Blockchain Can Resolve For Fintech Industry .pdf
4 Challenges Blockchain Can Resolve For Fintech Industry .pdfSystango
 
Blockchain technology's impact on the financial sector
Blockchain technology's impact on the financial sectorBlockchain technology's impact on the financial sector
Blockchain technology's impact on the financial sectorGlobal Tech Council
 
Real world blockchain solutions - DevDays Asia 2018 - Taipei
Real world blockchain solutions - DevDays Asia 2018 - TaipeiReal world blockchain solutions - DevDays Asia 2018 - Taipei
Real world blockchain solutions - DevDays Asia 2018 - TaipeiMichael Chi
 
How does blockchain developer help improving the banking & finance sector
How does blockchain developer help improving the banking & finance sector How does blockchain developer help improving the banking & finance sector
How does blockchain developer help improving the banking & finance sector Blockchain Council
 

Similar to Blockchain Smart Contract Fortification presentation.pptx (20)

Blockchain demystified
Blockchain demystifiedBlockchain demystified
Blockchain demystified
 
How Blockchain is Solving the Pain Points in the Payments Sector.pptx
How Blockchain is Solving the Pain Points in the Payments Sector.pptxHow Blockchain is Solving the Pain Points in the Payments Sector.pptx
How Blockchain is Solving the Pain Points in the Payments Sector.pptx
 
BlockToken - How to Launch an ICO or STO
BlockToken - How to Launch an ICO or STOBlockToken - How to Launch an ICO or STO
BlockToken - How to Launch an ICO or STO
 
use of block chain technoligy in bankinig
use of block chain technoligy in bankiniguse of block chain technoligy in bankinig
use of block chain technoligy in bankinig
 
Blockchain for Business
Blockchain for BusinessBlockchain for Business
Blockchain for Business
 
Impact of Blockchain on IT AuditBlockchain Techn.docx
Impact of Blockchain on IT AuditBlockchain Techn.docxImpact of Blockchain on IT AuditBlockchain Techn.docx
Impact of Blockchain on IT AuditBlockchain Techn.docx
 
Blockchain ppt.pptx
Blockchain ppt.pptxBlockchain ppt.pptx
Blockchain ppt.pptx
 
Impact on the financial sector of blockchain technology
Impact on the financial sector of blockchain technologyImpact on the financial sector of blockchain technology
Impact on the financial sector of blockchain technology
 
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
 
IRJET- Blockchain Technology a Literature Survey
IRJET- Blockchain Technology a Literature SurveyIRJET- Blockchain Technology a Literature Survey
IRJET- Blockchain Technology a Literature Survey
 
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
 
Supply Chain Management using Blockchain
Supply Chain Management using BlockchainSupply Chain Management using Blockchain
Supply Chain Management using Blockchain
 
LIVEPLEX BLOCKCHAIN IN BANKING.pdf
LIVEPLEX BLOCKCHAIN IN BANKING.pdfLIVEPLEX BLOCKCHAIN IN BANKING.pdf
LIVEPLEX BLOCKCHAIN IN BANKING.pdf
 
BEGIN BLOCKCHAIN - Module 3 FINAL.pptx
BEGIN BLOCKCHAIN - Module 3 FINAL.pptxBEGIN BLOCKCHAIN - Module 3 FINAL.pptx
BEGIN BLOCKCHAIN - Module 3 FINAL.pptx
 
4 Challenges Blockchain Can Resolve For Fintech Industry .pdf
4 Challenges Blockchain Can Resolve For Fintech Industry .pdf4 Challenges Blockchain Can Resolve For Fintech Industry .pdf
4 Challenges Blockchain Can Resolve For Fintech Industry .pdf
 
Digital Transformation and Blockchain
Digital Transformation and BlockchainDigital Transformation and Blockchain
Digital Transformation and Blockchain
 
mukund.pptx
mukund.pptxmukund.pptx
mukund.pptx
 
Blockchain technology's impact on the financial sector
Blockchain technology's impact on the financial sectorBlockchain technology's impact on the financial sector
Blockchain technology's impact on the financial sector
 
Real world blockchain solutions - DevDays Asia 2018 - Taipei
Real world blockchain solutions - DevDays Asia 2018 - TaipeiReal world blockchain solutions - DevDays Asia 2018 - Taipei
Real world blockchain solutions - DevDays Asia 2018 - Taipei
 
How does blockchain developer help improving the banking & finance sector
How does blockchain developer help improving the banking & finance sector How does blockchain developer help improving the banking & finance sector
How does blockchain developer help improving the banking & finance sector
 

More from Mohammed Abdul Lateef

Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...Mohammed Abdul Lateef
 
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...Mohammed Abdul Lateef
 
Analysis of birthday paradox bounds & Generalization.pptx
Analysis of birthday paradox bounds & Generalization.pptxAnalysis of birthday paradox bounds & Generalization.pptx
Analysis of birthday paradox bounds & Generalization.pptxMohammed Abdul Lateef
 
SECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptxSECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptxMohammed Abdul Lateef
 
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE Mohammed Abdul Lateef
 

More from Mohammed Abdul Lateef (8)

Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
Blockchain Smart Contract Fortification using Bytecode Analysis to Address Vu...
 
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
 
Analysis of birthday paradox bounds & Generalization.pptx
Analysis of birthday paradox bounds & Generalization.pptxAnalysis of birthday paradox bounds & Generalization.pptx
Analysis of birthday paradox bounds & Generalization.pptx
 
SECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptxSECURITY and PRINCIPLES IN 5G Technologies.pptx
SECURITY and PRINCIPLES IN 5G Technologies.pptx
 
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
 
Bio filters/ Biofilteration
Bio filters/ BiofilterationBio filters/ Biofilteration
Bio filters/ Biofilteration
 
Calorific Values
Calorific ValuesCalorific Values
Calorific Values
 
Indian Mathematician
Indian MathematicianIndian Mathematician
Indian Mathematician
 

Recently uploaded

Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelDrAjayKumarYadav4
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257subhasishdas79
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information SystemsAnge Felix NSANZIYERA
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxhublikarsn
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdfKamal Acharya
 

Recently uploaded (20)

Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 

Blockchain Smart Contract Fortification presentation.pptx

  • 1. Blockchain Contract Fortification: Bytecode Analysis To Check For Smart Contract Vulnerabilities Project by: Mohammed Abdul Lateef 22011DA802 Title:
  • 2. Agenda 1. Introduction 2. Problem Statement 3. Approach 4. Results 5. Conclusion 6. References
  • 3. • In today's fast-paced world, traditional methods of handling transactions face numerous challenges. • Slow and costly processes, intermediaries, and lack of transparency are just a few of the pain points. • Fortunately, emerging technologies like smart contracts and blockchain offer innovative solutions. INTRODUCTION:
  • 4.
  • 5. •Smart contracts are SELF-EXECUTING AGREEMENTS with predefined conditions written into code. •Automatically execute when the conditions are met. •By combining blockchain's trust and security with automation, smart contracts unlock tremendous potential. What is
  • 6.
  • 7. Agenda 1. Introduction 2. Problem Statement/Objective 3. Approach 4. Result 5. Conclusion 6. References
  • 8. • Blockchain platforms and smart contracts are vulnerable to security breaches. • Security breaches of smart contracts have led to huge financial losses in terms of cryptocurrencies and tokens Smart Contract Vunlerability
  • 9.
  • 10. Agenda 1. Introduction 2. Problem Statement 3. Approach 4. Results 5. Conclusion 6. References
  • 11. Case study applied and considered: • E-voting function increase() external { ++counter; }
  • 12. Breakdown Of High Level Smart Contract Code
  • 13. Vulnerability Check Tools Other Tools and Software
  • 14. Agenda 1. Introduction 2. Problem Statement 3. Approach 4. Results 5. Conclusion 6. References
  • 15. Figure 1: Bytecode and Solidity Code analysis by tools
  • 16. Agenda 1. Introduction 2. Problem Statement 3. Approach 4. Results 5. Conclusion 6. References
  • 17. The approach combines automated analysis through tools and manual examination for inspection of bytecode. • Overall, the key focus is inclined to have a concise view of what vulnerabilities in smart contract can be checked through bytecode analysis. Concluding statement…
  • 18. Agenda 1. Introduction 2. Problem Statement 3. Approach 4. Conclusion 5. References
  • 19. References 1 . A survey on smart contract vulnerabilities: Data sources, detection and repair, Information and Software Technology, Volume 159, 2023,107221, ISSN 0950-5849, * https://doi.org/10.1016/j.infsof.2023.107221 (https://www.sciencedirect.com/science/article/pii/S0950584923000757) 2. https://medium.com/@alexanderzammit_97283/smart-contract-deployment-internals-cc9cca4f4ae6