최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Procedia computer science, v.177, 2020년, pp.613 - 617
Poston, Howard
Abstract The OWASP Top Ten List is a widely-recognized tool for identifying vulnerabilities in web applications. Since blockchain-specific security guidance is currently lacking, mapping existing frameworks, such as OWASP, to the blockchain can help in the identification of potential vulnerabilitie...
NCC Group, “DASP - Top 10,” 2018. [Online]. Available: https://dasp.co/
OWASP, “OWASP Top Ten Web Application Security Risks,” 2017. [Online]. Available: https://owasp.org/www-project-top-ten/.
S. Khandelwal, “Critical RCE Flaw Discovered in Blockchain-Based EOS Smart Contract System,” 29 May 2018. [Online]. Available: https://thehackernews.com/2018/05/eos-blockchain-smart-contract.html.
J. Aumasson, “Blockchains: How to Steal Millions in 2^64 Operations,” 16 January 2018. [Online]. Available: https://research.kudelskisecurity.com/2018/01/16/blockchains-how-to-steal-millions-in-264-operations/.
I. Thomson, “Parity’s $280m Ethereum wallet freeze was no accident: It was a hack, claims angry upstart,” 10 November 2017. [Online]. Available: https://www.theregister.com/2017/11/10/parity_280m_ethereum_wallet_lockdown_hack/.
M. William, “Report: Misconfigured Ethereum Clients Have Resulted in Hack of Around $20 Mln,” 13 June 2018. [Online]. Available: https://cointelegraph.com/news/report-misconfigured-ethereum-clients-have-resulted-in-hack-of-around-20-mln.
“The transaction that can XSS attack unprepared block explorers,” 2017. [Online]. Available: https://blockpath.com/r/Interesting/comments/1g/the_transaction_that_can_xss_attack_unprepared/.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.