Vyper: A Security Comparison with Solidity Based on Common Vulnerabilities

Mudabbir Kaleem, Anastasia Mavridou, Aron Laszka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

30 Scopus citations

Abstract

Vyper has been proposed as a new high-level language for Ethereum smart contract development due to numerous security vulnerabilities and attacks witnessed on contracts written in Solidity since the system's inception. Vyper aims to address these vulnerabilities by providing a language that focuses on simplicity, auditability and security. We present a survey where we study how well-known and commonly-encountered vulnerabilities in Solidity feature in Vyper's development environment. We analyze all such vulnerabilities individually and classify them into five groups based on their status in Vyper. To the best of our knowledge, our survey is the first attempt to study security vulnerabilities in Vyper.

Original languageEnglish (US)
Title of host publication2020 2nd Conference on Blockchain Research and Applications for Innovative Networks and Services, BRAINS 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages107-111
Number of pages5
ISBN (Electronic)9781728170916
DOIs
StatePublished - Sep 2020
Event2nd Conference on Blockchain Research and Applications for Innovative Networks and Services, BRAINS 2020 - Paris, France
Duration: Sep 28 2020Sep 30 2020

Publication series

Name2020 2nd Conference on Blockchain Research and Applications for Innovative Networks and Services, BRAINS 2020

Conference

Conference2nd Conference on Blockchain Research and Applications for Innovative Networks and Services, BRAINS 2020
Country/TerritoryFrance
CityParis
Period9/28/209/30/20

All Science Journal Classification (ASJC) codes

  • Management Information Systems
  • Artificial Intelligence
  • Computer Networks and Communications
  • Decision Sciences (miscellaneous)
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Vyper: A Security Comparison with Solidity Based on Common Vulnerabilities'. Together they form a unique fingerprint.

Cite this