It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_columbia

Record ID marc_columbia/Columbia-extract-20221130-029.mrc:138303023:5419
Source marc_columbia
Download Link /show-records/marc_columbia/Columbia-extract-20221130-029.mrc:138303023:5419?format=raw

LEADER: 05419cam a2200781Mi 4500
001 14435540
005 20220604225919.0
006 m eo d
007 cr cn||||m|||a
008 190417s2019 nyua fob 001 0 eng d
035 $a(OCoLC)on1102625314
035 $a(NNC)14435540
040 $aNYMPP$beng$erda$cNYMPP$dYDX$dOCLCF$dOCLCQ$dOCLCO$dN$T$dOCLCO
020 $a1949449378
020 $a9781949449372$q(electronic bk.)
020 $z9781949449365$q(print)
035 $a(OCoLC)1102625314
050 4 $aHG1710$b.M37 2019eb
082 04 $a332.178$223
049 $aZCUA
100 1 $aMa, Richard,$eauthor.
245 10 $aFundamentals of smart contract security /$cRichard Ma, Jan Gorzny, Edward Zulkoski, Kacper Bak, and Olga V. Mack ; foreword by Keisuke Honda.
264 1 $aNew York, New York (222 East 46th Street, New York, NY 10017) :$bMomentum Press,$c2019.
300 $a1 online resource (1 PDF (xxiv, 137 pages)) :$billustrations (some color)
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2isbdmedia
338 $aonline resource$bcr$2rdacarrier
490 1 $aComputer engineering foundations, currents, and trajectories collection
504 $aIncludes bibliographical references (pages 119-124) and index.
505 0 $a1. Introduction. 1.1. What are smart contracts? ; 1.2. A brief history of smart contracts ; 1.3. Uses of smart contracts ; 1.4. Where can smart contracts be used? ; 1.5. Major hacks ; 1.6. The need for secure smart contracts -- 2. The state of blockchain security. 2.1. Blockchain fundamentals ; 2.2. Blockchain environment security layers -- 3. Design choices, design flaws, and cryptoeconomics. 3.1. Design choices ; 3.2. Design flaws ; 3.3. Cryptoeconomics -- 4. Common security flaws. 4.1. Transactions on ethereum in depth ; 4.2. Integer overflows and underflows ; 4.3. Race conditions in ERC20 ; 4.4 Re-entrancy ; 4.5. Transaction-ordering dependence (TOD) and front running ; 4.6. Timestamp dependence ; 4.7. Denial-of-service: exceeding block gas limit ; 4.8. Denial-of-service: transaction revert ; 4.9. Attempts to generate random numbers ; 4.10. Ensuring contracts are called by humans ; 4.11. Zero initial balance assumption ; 4.12. Deprecated call stack depth attack ; 4.13. Library design flaws ; 4.14. Exception handling ; 4.15. Validated arguments and the ethereum short address attack -- 5. Writing secure smart contracts. 5.1. Engineering processes and standards; 5.2. Testing ; 5.3. Automated smart contract analysis with symbolic execution ; 5.4. Securify ; 5.5. Audits ; 5.6. Guidelines -- 6. Conclusion. 6.1. Security is a business strategy, not just a technical challenge ; 6.2. Applying an iterative approach to security ; 6.3. Security is a holistic problem that involves people, systems and processes ; 6.4. Building the world of programmable money together.
520 3 $aSmart contracts are an innovative application of blockchain technology. Acting as decentralized custodians of digital assets, they allow us to transfer value and information more effectively by reducing the need to trust a third party. By eliminating the need for intermediaries, smart contracts have the potential to massively scale the world economy and unleash the potential for faster and more effcient solutions than traditional systems could ever provide. But there's one catch: while blockchains are secure, smart contracts are not. Security vulnerabilities in smart contracts have led to over 250 million USD in value to be lost or stolen. For smart contract technology to achieve its full potential, these security vulnerabilities need to be addressed. Written by security experts at the forefront of this dynamic industry, this book teaches state-of-the-art smart contract security principles and practices. Help us secure the future of blockchain technology and join us at the forefront today.
588 0 $aPDF viewed 05/28/2019.
650 0 $aBlockchains (Databases)
650 0 $aData encryption (Computer science)
650 0 $aElectronic funds transfers.
650 6 $aChaînes de blocs.
650 6 $aChiffrement (Informatique)
650 6 $aTransferts électroniques de fonds.
650 7 $aBlockchains (Databases)$2fast$0(OCoLC)fst01981761
650 7 $aData encryption (Computer science)$2fast$0(OCoLC)fst00887935
650 7 $aElectronic funds transfers.$2fast$0(OCoLC)fst00907204
653 $aBlockchain.
653 $aSmart contracts.
653 $aSmart contracts law.
653 $aSecurity.
653 $aCybersecurity.
653 $aDLT.
653 $aDistributed ledger technology.
653 $aEthereum.
653 $aCryptocurrencies.
653 $aBitcoin.
653 $aFintech.
653 $aInnovation.
653 $aDecentralization.
653 $aBlockchain programming.
653 $aBlockchain applications.
653 $aSolidity.
653 $aCryptography.
655 4 $aElectronic books.
700 1 $aGorzny, Jan,$eauthor.
700 1 $aZulkoski, Edward,$eauthor.
700 1 $aBak, Kacper,$eauthor.
700 1 $aMack, Olga V.,$eauthor.
700 1 $aHonda, Keisuke,$ewriter of foreword.
776 08 $iPrint version:$z9781949449365
830 0 $aComputer engineering foundations, currents, and trajectories collection.
856 40 $uhttp://www.columbia.edu/cgi-bin/cul/resolve?clio14435540$zAll EBSCO eBooks
852 8 $blweb$hEBOOKS