Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

MS Powerpoint

Kennesaw State University

Articles 1 - 1 of 1

Full-Text Articles in Other Computer Engineering

Blockchain And Ethereum Vulnerabilities, Daniel Chen Nov 2023

Blockchain And Ethereum Vulnerabilities, Daniel Chen

Symposium of Student Scholars

Blockchain and Ethereum (ETH) technology stands poised to revolutionize the digital world, offering unprecedented decentralization, transparency, and immutability of data across various industries; however, new technologies raise new security concerns. By overcoming key vulnerabilities in ETH, it allows a multitude of groundbreaking technologies such as Web3, Decentralized Finance (DeFi), Decentralized Apps (dApps), Non-Fungible Tokens (NFTs), and cryptocurrency wallets to become commonplace. This revolutionary crypto-dependent future of the internet relies on finding solutions to security vulnerabilities. We aim to pinpoint key security flaws and develop robust smart contract solutions within the Ethereum blockchain to enable the widespread adoption of Blockchain technology.