Work place: School of Computer Science and Engineering (SCOPE), Vellore Institute of Technology, Vellore, India, 632014
E-mail: hritish42@gmail.com
Website:
Research Interests: Information-Theoretic Security, Network Security, Information Security
Biography
Hritish Kumar is from Gurgaon, India. He is a Security Researcher, Content Developer, Infosec Consultant, and a B.Tech. undergraduate in Computer Science from the Department of Computer Science and Engineering (CSE), Vellore Institute of Technology. His research interests lie primarily in the area of Information Security and Blockchain Security. He currently serves as an offensive security engineer and a content developer. In his leisure time, he likes to listen to music and play video games.
By Kakelli Anil Kumar Aena Verma Hritish Kumar
DOI: https://doi.org/10.5815/ijmsc.2022.03.03, Pub. Date: 8 Aug. 2022
Along with the advancements in blockchain technology, many blockchain-based successful projects have been done mainly on the ethereum platform, most of which deal with transactions. Still, it also carries various risks when it comes to security, as evident from past attacks. Most big projects like uniswap, decentraland, and others use smart contracts, deployed on the ethereum platform, leading to similar projects via code reuse. Code reuse practice is quite frequent as a survey suggests 26% of contract code deployed is via code reuse. Smart contract code obfuscation techniques can be used on solidity code that is publicly verified, published (in the case of Ethereum), and on the deployment address. All the above techniques work by replacing characters with their random counterpart, known as statistical substitution. A statistical substitution is a process of transforming an input string into a new string where each character has been replaced by a random character drawn from a stock of all possible 'random' characters. Therefore, we proposed numerous methods in this paper to solve the above problems using various smart contract code obfuscation techniques. These techniques can be really useful in blockchain projects and can save millions of dollars to investors & companies by enhancing code security and preventing code reusability. Techniques mentioned in this paper when compared with other techniques. Our methods are not expensive to implement, very easy to use, and provide a developer-friendly selective increment in code complexity.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals