SlideShare a Scribd company logo
BLOCKCHAIN, SMART CONTRACTS, AND ICOS:
BUILDING SECURITY INTO THE DECENTRALIZED DIGITAL ECONOMY
Adam Cecchetti
CEO, Deja vu Security
The Realities of Enterprise Blockchain
dejavusecurity.com
THE REALITIES TEMPORALITY
OF ENTERPRISE
BLOCKCHAIN
Adam Cecchetti
Deja vu Security
Greetings!
 Adam Cecchetti
 Founder / CEO Deja vu Security
Early Ledger Technology
 Estimated to be ~5,000+ years old
 Based on Clay Technology
 A fork of the dirt project
 Record transactions using Stick and Cuneiform
 Bake at 500-600 C to mint a tablet
 Add an entry into the codex then stack to chain
records
 Downsides
 Shatter to erase record
 Very low transaction throughput and high latency
 Difficult but not impossible to forge
 Just need to be literate ~4000 years ago
Early Ledger Tech : Not Privacy
Preserving!
“A stockpile of 12,000 trade accounts left by Assyrian
merchants in the 19th century BCE has been used to find
half a dozen locations. The researchers used
mathematical models based on the prices of goods and
the frequency of trips between trade hubs to pinpoint
where the cities once stood.”[0]
Blockchain
 Transactional ledger of time and events
 Global stack of ordered clay tablets
 Thee that holds this token pay two lambskins of wine to
 One sheep and a bolt of textile for thy that can sign this stone
 Everyone gets a copy of every tablet every time a new
tablet is baked and agreed upon as the latest snapshot of
reality
 In reality : usually flat file Database that is represented
as a graph of transactions or program state
 Databases representing this state have gotten fairly large
 Every node has to verify every transaction or run every
program to validate each of the blocks
 BTC : 155 GB Ethereum : 263 GB Dash : 4.6 GB
Blockchain
 Verified by
 Proof of Work : Cryptographic Hashing
 Proof of Stake : Lock coins in special voting wallet
 Voting : Membership, vote, centralized ordering
 Stores properties for ordered transactions
 Not private nor privacy enforcing
 Difficult but not impossible to forge a block
 Just need more
 Petahash power to perform a 51% attack
 Tokens that you can stake any transaction you want
 Members to perform a cabal, sunset, or collusion attack
 Access to the various Private Keys
 About as trivial as being literate 4000 years ago
Something old Something
new…
 Ethereum Blockchain Block #4678523
 In Sumerian Tablet Using Late Cuneiform
Better AlphabetBetter Alphabet
Later Cuneiform
Early Computing : Mainframe
 Turing complete multi-user
computer
 Flat memory address space
 Compute and storage
expensive
 Little data or code protection
 Large focus on data throughput
 Accessible to anyone with a
direct terminal, X.25
connection, or this ARPANET
thing.
Ethereum : a “new” computer
 Turing complete computer with a virtual machine
(EVM)
 Flat memory address space
 Distributed system accessible via the P2P network
 Tracks program and data state on the blockchain
 Storage and compute currently expensive
 Smart Contract are programs that gate changes to
the Blockchain via the EVM
 By default users can see all data and call contract
functions
 Byzantium changes beginning to address data privacy
challenges (Elliptic curve add/mul zkSNARKS, big int
mod)
Early Program Storage Tech:
ROM
 Collection of data or code
 Diode Matrix or later EEPROM
 Store data or code
 Diode Matrix “Immutable”
 Blow diodes to write a program or
bits
 Write once read multiple (WORM)
 Data or code readable by anyone
that knows where the chip is or
what bus it is on
 Destroy by blanking with
Commands, UV, or physically
destroying the chip
Smart Contracts
 Collection of various data and code
 Functions to perform logic, read, writes stored
on block chain
 Immutable code written to Ethereum contract
account address
 Compiled EVM bytes
 Cannot be updated or patched
 Destroy by calling special code Suicide
Smart Contract Bug Classes
 Newness of the EVM computer
 Lack of clean well coded audited examples
 Solidity code very difficult to get right
 Difficulty in understanding side-effects in the programming environment
 Contract data or code public readable/callable/alterable
 Exceptions can take different logical flows depending on the version of Solidity
 Fallback function of the contract calling your contract can execute by default
depending on the state, function called, or out of gas
 Memory layout in the EVM can have side effects for mappings and other complex
structures
 Multi inheritance ordering
 Solidity compiler can optimize out conditionals
 Solidity compiler auto-gen functions
 Modifiers wrap entire functions changing expected behavior
 Classic security issues of int overflows, flow control, etc
 The list goes on and on and on…
Sharding The Ethereum
Network
 Sharding will split the network into multiple
parts requiring a hybrid Proof of Stake / Work
 Casper upgrades required for sharding
 Hybrid Proof of Work/Proof of Stake
 “Goal to have same transaction scale as VISA
network”
 Ethereum : ~7.5-20 TX/sec
 VISA : ~1667 TX/sec
 There’s some ground to go
Ethereum
 Globally accessible computer of carefully
managed applications stored in a ROM like
fashion
 These programs gate logical access to writing
changes to the blockchain that stores the
applications state and data
 State of data and code are put into blocks are
mined and put onto the blockchain by a Proof
of Work
Ethereum
 Significant effort currently focused on scale
and data throughput
 Just like early mainframe days
 TX throughput, Bus Latency, etc
 Just like early days of any new computers
seeing the same issues
 Patching, Data Privacy, User Privileges, Process
separation
 Code isolation, Latency, Throughput, Availability,
etc
This sounds familiar
Computers: Great At Looping
Humans
 Every time we build a new computer we build the same 10 problems
 Determinism, Reliable, Available, Communication, Security, Distributed, Fault
Tolerant, Scalable, Isolation, Identity
 New computer  new side effects  new security issues
Comp Dete
r
Relia
b
Avali Com Sec Dist FT Scal Isol ID
Main X X X X X
PC X X X
Web X X X X X X
Mobile X X X X X X X X
Cloud X * * X X * * X X
IoT X X X X
DAPP X X X X X X
How Cross Org Syncing Is Still
Done
 SFTP TX, Engineering, or Media Files
 BATCH HTTPS pushes which send flat files
 Shipping hard drives and tapes of records
 Manual conflict resolution is still common
 Call up the person and hand edit data merged
 Resolution can take weeks
Where can Enterprises use
Blockchain?
 Cross team or cross organization transactions,
auditing, and dispute resolution
 Auditable – Chain keeps audit record of data
and state
 Instant auditability if transactions are properly
synced
 Maintenance records, accounting, etc
 Permissioned – gated by member system
 Privacy – If properly utilized
Quorum
 Ethereum based
 Enterprise version of a distributed ledger system
 Sponsored by JPMC Led by Amber Baldet
 Built to provide permissioned system access and TX privacy
 Replaces Proof of Work with Raft nodes based consensus
system with a leader minting new blocks
 Instead of miners doing proof of work
 P2P Network permissioned nodes to participate
 Enables cross organizations
 To access a blockchain and run smart contracts in a
 Permissioned
 Private manner
 Minus all the mining work
Quorum
 Permissioned Network
 Whitelist of valid network nodes
 Private Transactions
 Transaction data is replaced with a hash of the
encrypted data
 Encrypted data is encrypted and decrypted via
key management system called Constellation
Hyper Ledger Fabric
 IBM Sponsored Project
 Functionally similar to Quorum
 Membership Service gates enrollment
 Ordinal Service organizes the blocks
 Uses voting with Node and Endorsing Peers
 Public and Private chains
 Smart Contracts are called Chain Code
Quorum and Hyperledger
 Focused on solving the scalability, privacy, and
isolation issues with current block chain
system
 New blocks ever 50 millisecond vs 7 second to
10 minutes
 Private transaction data
 Private blockchains
Where to from here?
BLOCKCHAIN, SMART CONTRACTS, AND ICOS:
BUILDING SECURITY INTO THE DECENTRALIZED DIGITAL ECONOMY
Adam Cecchetti
CEO, Deja vu Security
The Realities of Enterprise Blockchain
dejavusecurity.com
BLOCKCHAIN, SMART CONTRACTS, AND ICOS:
BUILDING SECURITY INTO THE DECENTRALIZED DIGITAL ECONOMY
dejavusecurity.com
IN PARTNERSHIP WITH:

More Related Content

What's hot

Blockchain and Smart Contracts (Series: Blockchain Basics)
Blockchain and Smart Contracts (Series: Blockchain Basics)Blockchain and Smart Contracts (Series: Blockchain Basics)
Blockchain and Smart Contracts (Series: Blockchain Basics)
Financial Poise
 
Security in the blockchain
Security in the blockchainSecurity in the blockchain
Security in the blockchain
Bellaj Badr
 
Deja vu Security - Blockchain Security Summit - Akshay Aggarwal
Deja vu Security - Blockchain Security Summit - Akshay AggarwalDeja vu Security - Blockchain Security Summit - Akshay Aggarwal
Deja vu Security - Blockchain Security Summit - Akshay Aggarwal
Scott Strang
 
Deja vu Security - Blockchain Security Summit - Navneet Suman
Deja vu Security - Blockchain Security Summit - Navneet SumanDeja vu Security - Blockchain Security Summit - Navneet Suman
Deja vu Security - Blockchain Security Summit - Navneet Suman
Scott Strang
 
Use case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTUUse case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTU
Rohit Verma
 
Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges
Merlec Mpyana
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain Presentation
Zied GUESMI
 
Blockchain workshop 101
Blockchain workshop 101Blockchain workshop 101
Blockchain workshop 101
Karthikeyan VK
 
Webinar: Blockchain – A Revolution You Can’t Stop | by Intellectsoft
Webinar: Blockchain – A Revolution You Can’t Stop | by IntellectsoftWebinar: Blockchain – A Revolution You Can’t Stop | by Intellectsoft
Webinar: Blockchain – A Revolution You Can’t Stop | by Intellectsoft
Intellectsoft
 
Komodo Blockchain Security Service Brochure
Komodo Blockchain Security Service BrochureKomodo Blockchain Security Service Brochure
Komodo Blockchain Security Service Brochure
Jean-Phi N✅
 
Blockchain tutorial
Blockchain tutorial Blockchain tutorial
Blockchain tutorial
Rohit Verma
 
How does blockchain work
How does blockchain workHow does blockchain work
How does blockchain work
Shishir Aryal
 
Blockchain technology amplify your enterprise / IBM
Blockchain technology amplify your enterprise / IBMBlockchain technology amplify your enterprise / IBM
Blockchain technology amplify your enterprise / IBM
Diego Alberto Tamayo
 
Blockchain notes b tech aktu by krazy kreation (kulbhushan)
Blockchain notes b tech aktu by krazy kreation (kulbhushan)Blockchain notes b tech aktu by krazy kreation (kulbhushan)
Blockchain notes b tech aktu by krazy kreation (kulbhushan)
rahulmondol
 
Blockchain Technologies
Blockchain TechnologiesBlockchain Technologies
Blockchain Technologies
Adri Jovin
 
Transaction speed
Transaction speedTransaction speed
Transaction speed
OliviaJune1
 
Blockchain Technology Fundamentals
Blockchain Technology FundamentalsBlockchain Technology Fundamentals
Blockchain Technology Fundamentals
Experfy
 
How to Create Blockchain Products by Slice.Market CTO
How to Create Blockchain Products by Slice.Market CTOHow to Create Blockchain Products by Slice.Market CTO
How to Create Blockchain Products by Slice.Market CTO
Product School
 
Banking on a Blockchain
Banking on a BlockchainBanking on a Blockchain
Banking on a Blockchain
Altoros
 
Brief Introduction to Blockchain Security
Brief Introduction to Blockchain SecurityBrief Introduction to Blockchain Security
Brief Introduction to Blockchain Security
Johnson, Chuan Zhang CISM CCSK OSCP
 

What's hot (20)

Blockchain and Smart Contracts (Series: Blockchain Basics)
Blockchain and Smart Contracts (Series: Blockchain Basics)Blockchain and Smart Contracts (Series: Blockchain Basics)
Blockchain and Smart Contracts (Series: Blockchain Basics)
 
Security in the blockchain
Security in the blockchainSecurity in the blockchain
Security in the blockchain
 
Deja vu Security - Blockchain Security Summit - Akshay Aggarwal
Deja vu Security - Blockchain Security Summit - Akshay AggarwalDeja vu Security - Blockchain Security Summit - Akshay Aggarwal
Deja vu Security - Blockchain Security Summit - Akshay Aggarwal
 
Deja vu Security - Blockchain Security Summit - Navneet Suman
Deja vu Security - Blockchain Security Summit - Navneet SumanDeja vu Security - Blockchain Security Summit - Navneet Suman
Deja vu Security - Blockchain Security Summit - Navneet Suman
 
Use case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTUUse case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTU
 
Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain Presentation
 
Blockchain workshop 101
Blockchain workshop 101Blockchain workshop 101
Blockchain workshop 101
 
Webinar: Blockchain – A Revolution You Can’t Stop | by Intellectsoft
Webinar: Blockchain – A Revolution You Can’t Stop | by IntellectsoftWebinar: Blockchain – A Revolution You Can’t Stop | by Intellectsoft
Webinar: Blockchain – A Revolution You Can’t Stop | by Intellectsoft
 
Komodo Blockchain Security Service Brochure
Komodo Blockchain Security Service BrochureKomodo Blockchain Security Service Brochure
Komodo Blockchain Security Service Brochure
 
Blockchain tutorial
Blockchain tutorial Blockchain tutorial
Blockchain tutorial
 
How does blockchain work
How does blockchain workHow does blockchain work
How does blockchain work
 
Blockchain technology amplify your enterprise / IBM
Blockchain technology amplify your enterprise / IBMBlockchain technology amplify your enterprise / IBM
Blockchain technology amplify your enterprise / IBM
 
Blockchain notes b tech aktu by krazy kreation (kulbhushan)
Blockchain notes b tech aktu by krazy kreation (kulbhushan)Blockchain notes b tech aktu by krazy kreation (kulbhushan)
Blockchain notes b tech aktu by krazy kreation (kulbhushan)
 
Blockchain Technologies
Blockchain TechnologiesBlockchain Technologies
Blockchain Technologies
 
Transaction speed
Transaction speedTransaction speed
Transaction speed
 
Blockchain Technology Fundamentals
Blockchain Technology FundamentalsBlockchain Technology Fundamentals
Blockchain Technology Fundamentals
 
How to Create Blockchain Products by Slice.Market CTO
How to Create Blockchain Products by Slice.Market CTOHow to Create Blockchain Products by Slice.Market CTO
How to Create Blockchain Products by Slice.Market CTO
 
Banking on a Blockchain
Banking on a BlockchainBanking on a Blockchain
Banking on a Blockchain
 
Brief Introduction to Blockchain Security
Brief Introduction to Blockchain SecurityBrief Introduction to Blockchain Security
Brief Introduction to Blockchain Security
 

Similar to Deja vu Security - Blockchain Security Summit - Adam Cecchetti

Introduction to Ethereum Blockchain & Smart Contract
Introduction to Ethereum Blockchain & Smart ContractIntroduction to Ethereum Blockchain & Smart Contract
Introduction to Ethereum Blockchain & Smart Contract
Thanh Nguyen
 
Ethereum Devcon1 Report (summary writing)
Ethereum Devcon1 Report (summary writing)Ethereum Devcon1 Report (summary writing)
Ethereum Devcon1 Report (summary writing)
Tomoaki Sato
 
The world computer (short)
The world computer (short)The world computer (short)
The world computer (short)
gavofyork
 
Block chain - Smart contacts.pptx
Block chain - Smart contacts.pptxBlock chain - Smart contacts.pptx
Block chain - Smart contacts.pptx
shraddhaphirke1
 
Ethereum vs fabric vs corda
Ethereum vs fabric vs cordaEthereum vs fabric vs corda
Ethereum vs fabric vs corda
Jean-Christophe Busnel
 
All About Ethereum
All About EthereumAll About Ethereum
All About Ethereum
Oodles Technologies Pvt. Ltd.
 
Blockchain Based Decentralized Cloud System
Blockchain Based Decentralized Cloud SystemBlockchain Based Decentralized Cloud System
Blockchain Based Decentralized Cloud System
Dhruvdoshi25071999
 
The world computer general
The world computer generalThe world computer general
The world computer general
gavofyork
 
Block chains and crypto currencies - introduction
Block chains and crypto currencies - introductionBlock chains and crypto currencies - introduction
Block chains and crypto currencies - introduction
Initio
 
Blockchain for good
Blockchain for goodBlockchain for good
Blockchain for good
MobileInception
 
Intro to blockchain - Concordium
Intro to blockchain - ConcordiumIntro to blockchain - Concordium
Intro to blockchain - Concordium
GeorgeBenton4
 
How to design, code, deploy and execute a smart contract
How to design, code, deploy and execute a smart contractHow to design, code, deploy and execute a smart contract
How to design, code, deploy and execute a smart contract
Joseph Holbrook, Chief Learning Officer (CLO)
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart Contracts
Saad Zaher
 
Resource slides for blockchain related question
Resource slides for blockchain related questionResource slides for blockchain related question
Resource slides for blockchain related question
Lin Lin (Wendy)
 
Blockchain for Notaries
Blockchain for NotariesBlockchain for Notaries
Blockchain for Notaries
Patrice Kerremans
 
Adoption Blockchain Smart Contracts in Developing Information Systems.pdf
Adoption Blockchain Smart Contracts in Developing Information Systems.pdfAdoption Blockchain Smart Contracts in Developing Information Systems.pdf
Adoption Blockchain Smart Contracts in Developing Information Systems.pdf
Mahdi_Fahmideh
 
Overview on Blockchain
Overview on BlockchainOverview on Blockchain
Overview on Blockchain
Raviteja​ Avadhanula
 
Top open source blockchain platforms of 2018
Top open source blockchain platforms of 2018Top open source blockchain platforms of 2018
Top open source blockchain platforms of 2018
Parangat Technologies
 
Blockchain Technology ,Architecture and its Structure
Blockchain Technology ,Architecture and its StructureBlockchain Technology ,Architecture and its Structure
Blockchain Technology ,Architecture and its Structure
kasthurimukila
 

Similar to Deja vu Security - Blockchain Security Summit - Adam Cecchetti (20)

Introduction to Ethereum Blockchain & Smart Contract
Introduction to Ethereum Blockchain & Smart ContractIntroduction to Ethereum Blockchain & Smart Contract
Introduction to Ethereum Blockchain & Smart Contract
 
Ethereum Devcon1 Report (summary writing)
Ethereum Devcon1 Report (summary writing)Ethereum Devcon1 Report (summary writing)
Ethereum Devcon1 Report (summary writing)
 
The world computer (short)
The world computer (short)The world computer (short)
The world computer (short)
 
Block chain - Smart contacts.pptx
Block chain - Smart contacts.pptxBlock chain - Smart contacts.pptx
Block chain - Smart contacts.pptx
 
Ethereum vs fabric vs corda
Ethereum vs fabric vs cordaEthereum vs fabric vs corda
Ethereum vs fabric vs corda
 
All About Ethereum
All About EthereumAll About Ethereum
All About Ethereum
 
Blockchain Based Decentralized Cloud System
Blockchain Based Decentralized Cloud SystemBlockchain Based Decentralized Cloud System
Blockchain Based Decentralized Cloud System
 
The world computer general
The world computer generalThe world computer general
The world computer general
 
Block chains and crypto currencies - introduction
Block chains and crypto currencies - introductionBlock chains and crypto currencies - introduction
Block chains and crypto currencies - introduction
 
Blockchain for good
Blockchain for goodBlockchain for good
Blockchain for good
 
Intro to blockchain - Concordium
Intro to blockchain - ConcordiumIntro to blockchain - Concordium
Intro to blockchain - Concordium
 
How to design, code, deploy and execute a smart contract
How to design, code, deploy and execute a smart contractHow to design, code, deploy and execute a smart contract
How to design, code, deploy and execute a smart contract
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart Contracts
 
Resource slides for blockchain related question
Resource slides for blockchain related questionResource slides for blockchain related question
Resource slides for blockchain related question
 
BlockChain Public
BlockChain PublicBlockChain Public
BlockChain Public
 
Blockchain for Notaries
Blockchain for NotariesBlockchain for Notaries
Blockchain for Notaries
 
Adoption Blockchain Smart Contracts in Developing Information Systems.pdf
Adoption Blockchain Smart Contracts in Developing Information Systems.pdfAdoption Blockchain Smart Contracts in Developing Information Systems.pdf
Adoption Blockchain Smart Contracts in Developing Information Systems.pdf
 
Overview on Blockchain
Overview on BlockchainOverview on Blockchain
Overview on Blockchain
 
Top open source blockchain platforms of 2018
Top open source blockchain platforms of 2018Top open source blockchain platforms of 2018
Top open source blockchain platforms of 2018
 
Blockchain Technology ,Architecture and its Structure
Blockchain Technology ,Architecture and its StructureBlockchain Technology ,Architecture and its Structure
Blockchain Technology ,Architecture and its Structure
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

Deja vu Security - Blockchain Security Summit - Adam Cecchetti

  • 1. BLOCKCHAIN, SMART CONTRACTS, AND ICOS: BUILDING SECURITY INTO THE DECENTRALIZED DIGITAL ECONOMY Adam Cecchetti CEO, Deja vu Security The Realities of Enterprise Blockchain dejavusecurity.com
  • 2. THE REALITIES TEMPORALITY OF ENTERPRISE BLOCKCHAIN Adam Cecchetti Deja vu Security
  • 3. Greetings!  Adam Cecchetti  Founder / CEO Deja vu Security
  • 4. Early Ledger Technology  Estimated to be ~5,000+ years old  Based on Clay Technology  A fork of the dirt project  Record transactions using Stick and Cuneiform  Bake at 500-600 C to mint a tablet  Add an entry into the codex then stack to chain records  Downsides  Shatter to erase record  Very low transaction throughput and high latency  Difficult but not impossible to forge  Just need to be literate ~4000 years ago
  • 5. Early Ledger Tech : Not Privacy Preserving! “A stockpile of 12,000 trade accounts left by Assyrian merchants in the 19th century BCE has been used to find half a dozen locations. The researchers used mathematical models based on the prices of goods and the frequency of trips between trade hubs to pinpoint where the cities once stood.”[0]
  • 6. Blockchain  Transactional ledger of time and events  Global stack of ordered clay tablets  Thee that holds this token pay two lambskins of wine to  One sheep and a bolt of textile for thy that can sign this stone  Everyone gets a copy of every tablet every time a new tablet is baked and agreed upon as the latest snapshot of reality  In reality : usually flat file Database that is represented as a graph of transactions or program state  Databases representing this state have gotten fairly large  Every node has to verify every transaction or run every program to validate each of the blocks  BTC : 155 GB Ethereum : 263 GB Dash : 4.6 GB
  • 7. Blockchain  Verified by  Proof of Work : Cryptographic Hashing  Proof of Stake : Lock coins in special voting wallet  Voting : Membership, vote, centralized ordering  Stores properties for ordered transactions  Not private nor privacy enforcing  Difficult but not impossible to forge a block  Just need more  Petahash power to perform a 51% attack  Tokens that you can stake any transaction you want  Members to perform a cabal, sunset, or collusion attack  Access to the various Private Keys  About as trivial as being literate 4000 years ago
  • 8. Something old Something new…  Ethereum Blockchain Block #4678523  In Sumerian Tablet Using Late Cuneiform
  • 11. Early Computing : Mainframe  Turing complete multi-user computer  Flat memory address space  Compute and storage expensive  Little data or code protection  Large focus on data throughput  Accessible to anyone with a direct terminal, X.25 connection, or this ARPANET thing.
  • 12. Ethereum : a “new” computer  Turing complete computer with a virtual machine (EVM)  Flat memory address space  Distributed system accessible via the P2P network  Tracks program and data state on the blockchain  Storage and compute currently expensive  Smart Contract are programs that gate changes to the Blockchain via the EVM  By default users can see all data and call contract functions  Byzantium changes beginning to address data privacy challenges (Elliptic curve add/mul zkSNARKS, big int mod)
  • 13. Early Program Storage Tech: ROM  Collection of data or code  Diode Matrix or later EEPROM  Store data or code  Diode Matrix “Immutable”  Blow diodes to write a program or bits  Write once read multiple (WORM)  Data or code readable by anyone that knows where the chip is or what bus it is on  Destroy by blanking with Commands, UV, or physically destroying the chip
  • 14. Smart Contracts  Collection of various data and code  Functions to perform logic, read, writes stored on block chain  Immutable code written to Ethereum contract account address  Compiled EVM bytes  Cannot be updated or patched  Destroy by calling special code Suicide
  • 15. Smart Contract Bug Classes  Newness of the EVM computer  Lack of clean well coded audited examples  Solidity code very difficult to get right  Difficulty in understanding side-effects in the programming environment  Contract data or code public readable/callable/alterable  Exceptions can take different logical flows depending on the version of Solidity  Fallback function of the contract calling your contract can execute by default depending on the state, function called, or out of gas  Memory layout in the EVM can have side effects for mappings and other complex structures  Multi inheritance ordering  Solidity compiler can optimize out conditionals  Solidity compiler auto-gen functions  Modifiers wrap entire functions changing expected behavior  Classic security issues of int overflows, flow control, etc  The list goes on and on and on…
  • 16. Sharding The Ethereum Network  Sharding will split the network into multiple parts requiring a hybrid Proof of Stake / Work  Casper upgrades required for sharding  Hybrid Proof of Work/Proof of Stake  “Goal to have same transaction scale as VISA network”  Ethereum : ~7.5-20 TX/sec  VISA : ~1667 TX/sec  There’s some ground to go
  • 17. Ethereum  Globally accessible computer of carefully managed applications stored in a ROM like fashion  These programs gate logical access to writing changes to the blockchain that stores the applications state and data  State of data and code are put into blocks are mined and put onto the blockchain by a Proof of Work
  • 18. Ethereum  Significant effort currently focused on scale and data throughput  Just like early mainframe days  TX throughput, Bus Latency, etc  Just like early days of any new computers seeing the same issues  Patching, Data Privacy, User Privileges, Process separation  Code isolation, Latency, Throughput, Availability, etc
  • 20. Computers: Great At Looping Humans  Every time we build a new computer we build the same 10 problems  Determinism, Reliable, Available, Communication, Security, Distributed, Fault Tolerant, Scalable, Isolation, Identity  New computer  new side effects  new security issues Comp Dete r Relia b Avali Com Sec Dist FT Scal Isol ID Main X X X X X PC X X X Web X X X X X X Mobile X X X X X X X X Cloud X * * X X * * X X IoT X X X X DAPP X X X X X X
  • 21. How Cross Org Syncing Is Still Done  SFTP TX, Engineering, or Media Files  BATCH HTTPS pushes which send flat files  Shipping hard drives and tapes of records  Manual conflict resolution is still common  Call up the person and hand edit data merged  Resolution can take weeks
  • 22. Where can Enterprises use Blockchain?  Cross team or cross organization transactions, auditing, and dispute resolution  Auditable – Chain keeps audit record of data and state  Instant auditability if transactions are properly synced  Maintenance records, accounting, etc  Permissioned – gated by member system  Privacy – If properly utilized
  • 23. Quorum  Ethereum based  Enterprise version of a distributed ledger system  Sponsored by JPMC Led by Amber Baldet  Built to provide permissioned system access and TX privacy  Replaces Proof of Work with Raft nodes based consensus system with a leader minting new blocks  Instead of miners doing proof of work  P2P Network permissioned nodes to participate  Enables cross organizations  To access a blockchain and run smart contracts in a  Permissioned  Private manner  Minus all the mining work
  • 24. Quorum  Permissioned Network  Whitelist of valid network nodes  Private Transactions  Transaction data is replaced with a hash of the encrypted data  Encrypted data is encrypted and decrypted via key management system called Constellation
  • 25. Hyper Ledger Fabric  IBM Sponsored Project  Functionally similar to Quorum  Membership Service gates enrollment  Ordinal Service organizes the blocks  Uses voting with Node and Endorsing Peers  Public and Private chains  Smart Contracts are called Chain Code
  • 26. Quorum and Hyperledger  Focused on solving the scalability, privacy, and isolation issues with current block chain system  New blocks ever 50 millisecond vs 7 second to 10 minutes  Private transaction data  Private blockchains
  • 27. Where to from here?
  • 28. BLOCKCHAIN, SMART CONTRACTS, AND ICOS: BUILDING SECURITY INTO THE DECENTRALIZED DIGITAL ECONOMY Adam Cecchetti CEO, Deja vu Security The Realities of Enterprise Blockchain dejavusecurity.com
  • 29. BLOCKCHAIN, SMART CONTRACTS, AND ICOS: BUILDING SECURITY INTO THE DECENTRALIZED DIGITAL ECONOMY dejavusecurity.com IN PARTNERSHIP WITH: