Page 58 - Demo
P. 58


                                    56Blockchain ecosystem securityAlthough blockchain has built-in security features, the blockchain ecosystem is riddled with loopholes and vulnerabilities. Components such as blockchain platforms, smart contracts, thirdparty services, frontends, and the communication network are all susceptible to cyberattacks. Prof. Luo%u2019s team has developed a dual-pronged strategy to comprehensively fortify blockchain ecosystems. The first prong concentrates on detecting security vulnerabilities, with an intense focus on zero-day vulnerabilities %u2013 security flaws that are not yet known and therefore have no existing fix, making them particularly dangerous as they can be exploited by attackers before they can be addressed. These investigations have exposed significant flaws in major blockchain infrastructures. Leading companies and developers have recognised the value of these crucial discoveries and offered bug bounties %u2013 financial rewards for reporting security flaws. Prof. Luo%u2019s team has also pioneered the development of innovative tools to streamline the detection of vulnerabilities in smart contracts and blockchain platforms. A notable achievement is their creation of the first GPU-based fuzzer for smart contracts %u2013 a tool that uses GPUs to test smart contracts for vulnerabilities. This tool can process and test smart contracts ten times faster than existing state-of-the-art techniques. The second prong of the team%u2019s strategy shields blockchain ecosystems from a range of attacks. The team has introduced novel techniques to detect and counter various forms of advanced malware, including malicious smart contracts and apps. These techniques have been adopted by leading IT companies. The team has also designed cutting-edge methods to identify and mitigate different attacks targeting blockchain ecosystems, thereby increasing user protection.IN SAFE HANDS
                                
   52   53   54   55   56   57   58   59   60   61   62