Print Email Facebook Twitter An evaluation of the reentrancy vulnerability on GoQuorum-based smartcontracts Title An evaluation of the reentrancy vulnerability on GoQuorum-based smartcontracts Author Op den Orth, Sara (TU Delft Electrical Engineering, Mathematics and Computer Science) Contributor Liang, K. (mentor) Chen, H. (graduation committee) Scharenborg, O.E. (graduation committee) Degree granting institution Delft University of Technology Programme Computer Science and Engineering Project CSE3000 Research Project Date 2021-07-02 Abstract Within the context of the Ethereum blockchain protocol, reentrancy is a well-known and well-researched smart contract vulnerability. However, when considering GoQuorum, an Ethereum soft fork, barely any research discussing smart contract vulnerabilities exists. This report aims to partly fill this research gap by evaluating the reentrancy smart contract vulnerability in the context of a GoQuorum network. First, the reentrancy attack was demonstrated and its attack features evaluated. Then any known countermeasures were collected. Moreover, it was proposed that some GoQuorum features may also be used as mitigation techniques. Finally, each countermeasure was assessed and categorized. Of all the methods, the checks-effects-interactions pattern is the most direct way to deal with the reentrancy vulnerability. To maximize contract security, however, it is advised to use a combination of the specified prevention and mitigation techniques. Subject GoQuorumQuorumEthereumreentrancysmart contractvulnerabilitysecurityblockchain To reference this document use: http://resolver.tudelft.nl/uuid:05b138a6-595d-4f40-b1d9-92f0779a4049 Part of collection Student theses Document type bachelor thesis Rights © 2021 Sara Op den Orth Files PDF no_email_research_project.pdf 369.67 KB Close viewer /islandora/object/uuid:05b138a6-595d-4f40-b1d9-92f0779a4049/datastream/OBJ/view