I
nd
o
ne
s
ia
n J
o
urna
l o
f
E
lect
rica
l En
g
ineering
a
nd
Co
m
pu
t
er
Science
Vo
l.
39
,
No
.
2
,
A
u
g
u
s
t
2
0
2
5
,
p
p
.
9
5
2
~
9
6
2
I
SS
N:
2
5
0
2
-
4
7
5
2
,
DOI
:
1
0
.
1
1
5
9
1
/ijeecs.v
39
.i
2
.
pp
952
-
9
6
2
952
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ee
cs.ia
esco
r
e.
co
m
A f
ra
mewo
rk
f
o
r
security risk
as
ses
sm
ent
o
f
blo
ckch
a
in
-
ba
sed
a
pplica
tions
M
o
ha
m
m
a
d Q
a
t
a
wneh
1,
2
1
D
e
p
a
r
t
me
n
t
o
f
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
,
K
A
S
I
T,
U
n
i
v
e
r
si
t
y
o
f
J
o
r
d
a
n
,
A
mm
a
n
,
Jo
r
d
a
n
2
D
e
p
a
r
t
me
n
t
o
f
N
e
t
w
o
r
k
s
a
n
d
C
y
b
e
r
s
e
c
u
r
i
t
y
,
F
a
c
u
l
t
y
o
f
I
n
f
o
r
mat
i
o
n
Te
c
h
n
o
l
o
g
y
,
Al
-
A
h
l
i
y
y
a
A
m
ma
n
U
n
i
v
e
r
si
t
y
,
A
mm
a
n
,
Jo
r
d
a
n
Art
icle
I
nfo
AB
S
T
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Dec
6
,
2
0
2
4
R
ev
is
ed
Mar
17
,
2
0
2
5
Acc
ep
ted
Mar
26
,
2
0
2
5
Blo
c
k
c
h
a
in
tec
h
n
o
l
o
g
y
h
a
s
re
v
o
lu
ti
o
n
ize
d
v
a
rio
u
s
i
n
d
u
stries
b
y
e
n
a
b
li
n
g
d
e
c
e
n
tralize
d
,
tran
sp
a
re
n
t,
a
n
d
tam
p
e
r
-
re
sista
n
t
d
ig
it
a
l
tra
n
sa
c
ti
o
n
s
.
Ho
we
v
e
r,
d
e
sp
it
e
i
ts
b
e
n
e
fit
s,
b
l
o
c
k
c
h
a
in
-
b
a
se
d
a
p
p
li
c
a
ti
o
n
s
a
re
v
u
l
n
e
ra
b
le
to
se
c
u
rit
y
th
re
a
ts su
c
h
a
s sm
a
rt
c
o
n
trac
t
e
x
p
lo
it
s,
5
1
%
a
tt
a
c
k
s,
S
y
b
il
a
tt
a
c
k
s,
a
n
d
p
riv
a
te
k
e
y
c
o
m
p
ro
m
ise
s,
p
o
sin
g
si
g
n
if
ica
n
t
ris
k
s
to
th
e
ir
in
teg
rit
y
a
n
d
re
li
a
b
il
it
y
.
Trad
it
i
o
n
a
l
se
c
u
rit
y
fr
a
m
e
wo
rk
s
lac
k
a
c
o
m
p
re
h
e
n
siv
e
a
p
p
ro
a
c
h
to
sy
ste
m
a
ti
c
a
ll
y
a
ss
e
ss
a
n
d
m
it
i
g
a
te
th
e
se
risk
s
a
c
ro
ss
d
iffere
n
t
b
lo
c
k
c
h
a
in
lay
e
rs.
To
a
d
d
re
ss
th
is
c
h
a
ll
e
n
g
e
,
th
is
p
a
p
e
r
p
r
o
p
o
se
s
th
e
b
lo
c
k
c
h
a
in
c
y
b
e
rse
c
u
rit
y
r
isk
a
ss
e
ss
m
e
n
t
m
o
d
e
l
(BCRAM),
a
stru
c
t
u
re
d
fra
m
e
wo
rk
d
e
sig
n
e
d
to
i
d
e
n
ti
f
y
,
a
n
a
l
y
z
e
,
e
v
a
lu
a
te,
a
n
d
m
it
i
g
a
te
se
c
u
rit
y
risk
s
i
n
b
lo
c
k
c
h
a
in
s
y
ste
m
s.
Th
e
m
e
t
h
o
d
o
l
o
g
y
i
n
v
o
lv
e
s
c
a
teg
o
rizin
g
t
h
re
a
ts,
a
ss
e
ss
in
g
risk
s
u
si
n
g
q
u
a
n
ti
tativ
e
a
n
d
q
u
a
li
tati
v
e
tec
h
n
i
q
u
e
s,
a
n
d
v
a
li
d
a
ti
n
g
th
e
m
o
d
e
l
t
h
ro
u
g
h
a
c
a
se
stu
d
y
o
n
Et
h
e
re
u
m
.
Re
su
lt
s
d
e
m
o
n
stra
te
th
a
t
imp
lem
e
n
ti
n
g
BCRA
M
led
to
a
6
5
%
re
d
u
c
ti
o
n
in
sm
a
rt
c
o
n
trac
t
e
x
p
lo
it
s,
a
7
0
%
d
e
c
re
a
se
in
p
h
ish
i
n
g
i
n
c
id
e
n
ts,
a
n
d
a
n
8
5
%
imp
r
o
v
e
m
e
n
t
i
n
d
istri
b
u
te
d
d
e
n
ial
o
f
se
rv
ice
(
DD
o
S
)
re
sili
e
n
c
e
,
p
ro
v
i
n
g
it
s
e
ffe
c
ti
v
e
n
e
ss
.
Th
i
s
re
se
a
r
c
h
o
ffe
rs
a
sta
n
d
a
rd
ize
d
risk
a
ss
e
ss
m
e
n
t
a
p
p
r
o
a
c
h
,
p
r
o
v
i
d
i
n
g
v
a
l
u
a
b
le
in
si
g
h
ts
fo
r
d
e
v
e
l
o
p
e
rs,
se
c
u
rit
y
a
n
a
l
y
sts t
o
e
n
h
a
n
c
e
b
lo
c
k
c
h
a
in
se
c
u
rit
y
.
K
ey
w
o
r
d
s
:
B
lo
ck
ch
ain
B
lo
ck
ch
ain
s
ec
u
r
ity
m
o
d
el
B
lo
ck
ch
ain
-
b
ased
ap
p
licatio
n
s
Secu
r
ity
r
is
k
ass
ess
m
en
t
Vu
ln
er
ab
ilit
y
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Mo
h
am
m
ad
Qata
wn
e
h
Dep
ar
tm
en
t o
f
C
o
m
p
u
ter
Scie
n
ce
,
KASI
T
,
Un
iv
er
s
ity
o
f
J
o
r
d
an
Am
m
an
,
1
1
9
4
2
,
J
o
r
d
a
n
E
m
ail: m
o
h
d
.
q
at@
ju
.
ed
u
.
jo
1.
I
NT
RO
D
UCT
I
O
N
B
lo
ck
ch
ain
tech
n
o
lo
g
y
h
as
r
ev
o
lu
tio
n
ized
in
d
u
s
tr
ies
s
u
ch
as
f
in
an
ce
,
h
ea
lth
ca
r
e,
s
u
p
p
l
y
ch
ain
,
e
-
v
o
tin
g
,
an
d
e
-
lear
n
i
n
g
b
y
p
r
o
v
id
in
g
a
d
ec
en
tr
alize
d
,
im
m
u
tab
le,
an
d
s
ec
u
r
e
m
ea
n
s
o
f
d
ata
s
to
r
ag
e
a
n
d
tr
an
s
ac
tio
n
p
r
o
ce
s
s
in
g
[
1
]
-
[
6
]
.
I
ts
tam
p
er
-
re
s
is
tan
t
n
atu
r
e
h
as
m
ad
e
it
an
ess
en
tial
to
o
l
f
o
r
en
h
a
n
cin
g
tr
an
s
p
ar
en
cy
,
r
e
d
u
cin
g
f
r
a
u
d
,
an
d
im
p
r
o
v
in
g
o
p
er
atio
n
al
e
f
f
icien
cy
[
7
]
,
[
8
]
.
H
o
wev
er
,
d
esp
ite
its
b
en
ef
its
,
b
lo
ck
ch
ain
s
y
s
tem
s
f
ac
e
n
u
m
er
o
u
s
s
ec
u
r
ity
th
r
ea
ts
th
at
ca
n
u
n
d
er
m
in
e
th
eir
r
eliab
ilit
y
an
d
tr
u
s
two
r
th
in
ess
.
T
h
ese
th
r
ea
ts
in
clu
d
e
s
m
ar
t
co
n
tr
ac
t
v
u
ln
e
r
ab
ilit
ies,
5
1
%
attac
k
s
,
p
r
iv
ate
k
ey
th
ef
t,
Sy
b
il
attac
k
s
,
a
n
d
co
n
s
en
s
u
s
m
ec
h
an
is
m
f
laws,
wh
ich
p
o
s
e
s
er
io
u
s
r
is
k
s
to
t
h
e
co
n
f
id
en
tiality
,
in
teg
r
ity
,
an
d
av
ailab
ilit
y
o
f
bl
o
ck
ch
ain
-
b
ased
ap
p
licatio
n
s
[
9
]
-
[
1
1
]
.
T
o
m
itig
ate
th
ese
s
ec
u
r
ity
r
i
s
k
s
,
r
esear
ch
er
s
h
a
v
e
p
r
o
p
o
s
ed
v
ar
i
o
u
s
s
o
lu
tio
n
s
,
in
clu
d
i
n
g
f
o
r
m
al
v
er
if
icatio
n
o
f
s
m
ar
t
co
n
tr
a
cts
[
1
2
]
,
en
h
a
n
ce
d
cr
y
p
to
g
r
ap
h
ic
tech
n
iq
u
es
[
1
3
]
,
s
ec
u
r
e
co
n
s
en
s
u
s
m
ec
h
an
is
m
s
[
1
4
]
,
an
d
AI
-
d
r
iv
en
an
o
m
aly
d
et
ec
tio
n
s
y
s
tem
s
[
1
5
]
,
[
1
6
]
.
Ho
wev
er
,
th
ese
s
o
lu
tio
n
s
o
f
ten
f
o
c
u
s
o
n
s
p
ec
if
i
c
s
e
c
u
r
i
t
y
t
h
r
e
at
s
r
at
h
e
r
t
h
a
n
p
r
o
v
i
d
i
n
g
a
c
o
m
p
r
e
h
e
n
s
i
v
e
r
i
s
k
ass
e
s
s
m
e
n
t
f
r
a
m
ew
o
r
k
t
h
a
t
s
y
s
t
em
a
t
i
c
a
ll
y
i
d
e
n
t
i
f
ie
s
,
e
v
a
l
u
a
t
es
,
a
n
d
m
i
t
i
g
at
e
s
r
is
k
s
a
c
r
o
s
s
a
ll
la
y
e
r
s
o
f
t
h
e
b
l
o
c
k
c
h
a
i
n
a
r
c
h
it
e
c
t
u
r
e
[
1
7
]
.
M
o
r
e
o
v
e
r
,
e
x
i
s
t
i
n
g
b
l
o
c
k
c
h
a
i
n
s
e
c
u
r
i
t
y
f
r
a
m
e
w
o
r
k
s
(
B
SF
)
,
s
u
c
h
a
s
N
I
S
T
I
R
8
2
0
2
,
o
p
e
n
w
e
b
a
p
p
l
i
c
a
t
i
o
n
s
e
c
u
r
i
ty
p
r
o
j
e
c
t
(
O
W
AS
P
)
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
A
fr
a
mewo
r
k
fo
r
s
ec
u
r
i
ty
r
is
k
a
s
s
ess
men
t o
f b
lo
ck
ch
a
in
-
b
a
s
e
d
a
p
p
lic
a
tio
n
s
(
Mo
h
a
mma
d
Q
a
ta
w
n
eh
)
953
to
p
te
n
,
a
n
d
B
R
AM
,
lack
s
tan
d
ar
d
ized
r
is
k
ass
ess
m
en
t
m
eth
o
d
o
lo
g
ies,
m
ak
in
g
it
d
if
f
ic
u
lt f
o
r
o
r
g
an
izatio
n
s
to
ass
e
s
s
an
d
m
an
ag
e
b
lo
ck
c
h
ain
-
r
elate
d
r
is
k
s
ef
f
ec
tiv
ely
[
1
8
]
-
[
2
0
]
.
T
o
ad
d
r
ess
th
ese
ch
allen
g
es,
th
is
p
ap
er
in
tr
o
d
u
ce
s
th
e
b
l
o
ck
ch
ain
c
y
b
er
s
ec
u
r
it
y
r
is
k
ass
es
s
m
en
t
m
o
d
el
(
B
C
R
A
M)
,
a
s
tr
u
ctu
r
e
d
f
r
a
m
ewo
r
k
d
esig
n
e
d
to
an
a
ly
ze
an
d
q
u
an
tify
s
ec
u
r
ity
r
is
k
s
in
b
lo
ck
ch
ai
n
-
b
ased
ap
p
licatio
n
s
.
T
h
is
m
o
d
el
in
teg
r
ates
q
u
alitativ
e
an
d
q
u
an
titativ
e
r
is
k
ass
ess
m
en
t
tech
n
iq
u
es,
c
o
n
s
id
er
s
attac
k
v
ec
to
r
s
ac
r
o
s
s
d
if
f
er
e
n
t
b
lo
ck
c
h
ain
lay
e
r
s
(
n
etwo
r
k
,
co
n
s
en
s
u
s
,
an
d
ap
p
licati
o
n
)
,
a
n
d
p
r
o
v
id
es
ac
tio
n
ab
le
s
ec
u
r
ity
m
ea
s
u
r
es.
Un
lik
e
ex
is
ti
n
g
m
o
d
els,
B
C
R
AM
o
f
f
er
s
a
h
o
lis
tic
ap
p
r
o
ac
h
to
b
lo
c
k
ch
ain
r
is
k
ass
es
s
m
en
t,
m
ak
in
g
it
s
u
itab
le
f
o
r
r
ea
l
-
wo
r
ld
ap
p
licatio
n
s
s
u
ch
as
f
in
an
cial
tr
a
n
s
ac
tio
n
s
,
d
ec
en
tr
alize
d
id
en
tity
m
an
ag
e
m
en
t,
an
d
s
u
p
p
ly
ch
ain
s
ec
u
r
ity
[
2
1
]
-
[2
6
]
.
T
h
e
co
n
tr
ib
u
tio
n
s
o
f
th
is
p
ap
e
r
ar
e
as f
o
llo
ws:
−
I
d
en
tify
a
n
d
ca
teg
o
r
ize
b
l
o
ck
c
h
ain
s
ec
u
r
ity
th
r
ea
ts
ac
r
o
s
s
d
if
f
er
en
t la
y
er
s
.
−
Dev
elo
p
a
s
tr
u
ctu
r
e
d
r
is
k
ass
ess
m
en
t m
o
d
el
(
B
C
R
AM
)
tailo
r
ed
f
o
r
b
lo
c
k
ch
ain
s
ec
u
r
ity
ch
allen
g
es.
−
C
o
m
p
ar
e
B
C
R
AM
w
ith
ex
is
ti
n
g
s
ec
u
r
ity
m
o
d
els to
ev
alu
ate
its
ef
f
ec
tiv
en
ess
.
−
Valid
ate
th
e
p
r
o
p
o
s
ed
m
o
d
el
th
r
o
u
g
h
a
ca
s
e
s
tu
d
y
o
n
E
th
e
r
eu
m
,
d
e
m
o
n
s
tr
atin
g
its
ab
ilit
y
to
en
h
a
n
ce
s
ec
u
r
ity
in
a
r
ea
l
-
wo
r
ld
b
lo
c
k
c
h
ain
ap
p
licatio
n
.
B
y
ad
d
r
ess
in
g
th
e
g
a
p
s
in
ex
is
tin
g
s
ec
u
r
ity
f
r
am
ewo
r
k
s
,
th
is
r
esear
ch
aim
s
to
en
h
an
ce
b
lo
ck
ch
ain
s
ec
u
r
ity
r
esil
ien
ce
,
r
ed
u
ce
v
u
ln
er
ab
ilit
ies,
an
d
p
r
o
v
id
e
a
s
tan
d
ar
d
ized
ap
p
r
o
ac
h
t
o
b
lo
c
k
ch
ain
r
is
k
m
an
ag
em
en
t.
T
h
e
f
in
d
i
n
g
s
o
f
th
is
p
ap
e
r
will
b
e
n
ef
it
b
l
o
ck
ch
ain
d
ev
elo
p
er
s
,
cy
b
er
s
ec
u
r
ity
ex
p
er
ts
,
an
d
p
o
licy
m
ak
er
s
b
y
o
f
f
e
r
in
g
a
p
r
ac
tical
an
d
s
ca
lab
le
r
is
k
ass
ess
m
en
t
m
o
d
el
th
at
s
tr
en
g
th
en
s
th
e
s
ec
u
r
ity
o
f
b
lo
ck
ch
ain
-
b
ased
ec
o
s
y
s
tem
s
.
T
h
e
o
r
g
an
izatio
n
o
f
th
e
p
ap
e
r
is
as
f
o
llo
ws:
Sectio
n
2
p
r
esen
ts
th
e
m
eth
o
d
o
lo
g
y
,
wh
ich
in
clu
d
es
an
o
v
er
v
iew
o
f
ex
is
tin
g
r
is
k
ass
ess
m
en
t
m
o
d
els
f
o
r
b
l
o
ck
ch
ain
,
ty
p
es
o
f
attac
k
s
at
d
i
f
f
er
en
t
b
lo
ck
ch
ain
lay
er
s
,
p
r
o
p
o
s
ed
m
o
d
el,
th
e
d
esig
n
o
f
th
e
ex
p
e
r
im
en
t,
a
n
d
th
e
r
esu
lts
an
d
d
is
cu
s
s
io
n
.
Sectio
n
3
p
r
esen
ts
th
e
r
esu
lt
an
d
d
is
cu
s
s
io
n
.
Sectio
n
4
p
r
o
v
id
es
th
e
co
m
p
ar
ativ
e
a
n
aly
s
is
o
f
b
lo
ck
ch
ai
n
r
is
k
ass
ess
m
e
n
t
m
o
d
els.
Fin
ally
,
th
e
co
n
cl
u
s
io
n
o
f
th
e
p
ap
er
is
p
r
esen
ted
in
s
ec
tio
n
5.
2.
M
E
T
H
O
D
T
h
er
e
a
r
e
v
ar
io
u
s
r
is
k
ass
ess
m
en
t
m
o
d
els
s
p
ec
if
ically
d
esig
n
ed
f
o
r
b
l
o
ck
ch
ain
ap
p
licatio
n
s
.
T
h
ese
m
o
d
els
ad
d
r
ess
th
e
u
n
iq
u
e
r
i
s
k
s
ass
o
ciate
d
wi
th
b
lo
ck
ch
ai
n
tech
n
o
lo
g
y
,
in
cl
u
d
in
g
v
u
ln
er
ab
ilit
ies
in
s
m
ar
t
co
n
tr
ac
ts
,
co
n
s
en
s
u
s
m
ec
h
an
is
m
s
,
an
d
d
ec
en
tr
alize
d
f
in
an
ce
(
DeFi)
s
y
s
tem
s
.
Sev
er
al
r
is
k
ass
es
s
m
en
t
m
o
d
els
will
b
e
d
is
cu
s
s
ed
,
in
clu
d
in
g
a
b
r
ief
d
escr
ip
tio
n
o
f
ea
ch
,
f
o
ll
o
wed
b
y
a
co
m
p
ar
is
o
n
tab
le
t
h
at
h
ig
h
lig
h
ts
th
eir
k
ey
f
ea
tu
r
es,
ad
v
an
ta
g
es,
an
d
d
r
awb
ac
k
s
.
2
.
1
.
E
x
is
t
ing
risk
a
s
s
ess
m
ent
m
o
dels
f
o
r
B
C
A.
B
lo
ck
ch
ain
s
ec
u
r
ity
f
r
a
m
ewo
r
k
(
B
SF
)
T
h
e
B
SF
p
r
o
v
id
es
a
s
tr
u
ctu
r
ed
m
eth
o
d
o
l
o
g
y
f
o
r
id
en
tify
i
n
g
an
d
m
itig
atin
g
s
ec
u
r
ity
r
is
k
s
in
h
er
en
t
to
b
lo
ck
ch
ain
tech
n
o
lo
g
y
[
2
7
]
,
[
2
8
]
.
T
h
is
f
r
am
ew
o
r
k
em
p
h
asizes th
e
im
p
o
r
tan
ce
o
f
m
a
p
p
in
g
s
ec
u
r
ity
co
n
tr
o
ls
t
o
s
p
ec
if
ic
v
u
ln
er
ab
ilit
ies
with
in
b
lo
ck
c
h
ain
en
v
ir
o
n
m
en
ts
.
I
t
o
f
f
er
s
c
o
m
p
r
e
h
en
s
iv
e
g
u
id
elin
es
f
o
r
r
is
k
m
an
ag
em
en
t
th
r
o
u
g
h
o
u
t
th
e
e
n
tire
b
lo
ck
c
h
ain
life
c
y
cle,
en
s
u
r
in
g
t
h
at
o
r
g
an
izatio
n
s
ca
n
p
r
o
ac
tiv
ely
ad
d
r
ess
p
o
ten
tial
th
r
ea
ts
.
Ad
d
itio
n
ally
,
th
e
B
SF
in
clu
d
es
g
o
v
er
n
an
c
e
s
tr
u
ctu
r
es
d
esig
n
ed
to
en
h
a
n
ce
ac
co
u
n
tab
ilit
y
an
d
o
v
er
s
ig
h
t w
ith
in
b
l
o
ck
ch
a
in
o
p
er
atio
n
s
,
f
ac
ilit
atin
g
a
m
o
r
e
s
ec
u
r
e
im
p
lem
en
tatio
n
o
f
th
is
tech
n
o
lo
g
y
.
On
e
o
f
th
e
k
ey
ad
v
a
n
tag
es
o
f
th
e
B
SF
is
its
th
o
r
o
u
g
h
co
v
er
ag
e
o
f
v
ar
io
u
s
s
ec
u
r
ity
asp
ec
ts
r
elate
d
to
b
lo
ck
ch
ain
,
wh
ich
allo
ws
o
r
g
an
izatio
n
s
to
in
teg
r
ate
r
o
b
u
s
t
s
ec
u
r
ity
p
r
ac
tices
d
ir
ec
tly
in
to
th
eir
d
ev
elo
p
m
e
n
t
p
r
o
ce
s
s
es.
B
y
d
o
in
g
s
o
,
o
r
g
a
n
izatio
n
s
ca
n
cr
ea
te
a
m
o
r
e
r
esil
ien
t
in
f
r
astru
c
tu
r
e
th
at
r
esp
o
n
d
s
ef
f
ec
tiv
ely
to
em
er
g
in
g
r
is
k
s
.
Ho
wev
er
,
im
p
lem
en
tin
g
th
e
B
SF
ca
n
b
e
c
o
m
p
lex
,
p
ar
ticu
lar
ly
f
o
r
o
r
g
a
n
izatio
n
s
th
at
m
ay
lack
th
e
n
ec
ess
ar
y
cy
b
er
s
ec
u
r
ity
ex
p
er
tis
e.
Mo
r
eo
v
er
,
th
e
f
r
am
ewo
r
k
m
ay
n
ee
d
to
b
e
ad
ap
ted
f
o
r
d
if
f
er
en
t
b
lo
ck
ch
ain
p
lat
f
o
r
m
s
,
wh
ich
c
an
ad
d
t
o
th
e
co
m
p
lex
ity
o
f
its
ap
p
licatio
n
ac
r
o
s
s
d
iv
er
s
e
u
s
e
ca
s
es
.
B.
OW
AS
P
b
lo
ck
ch
ain
to
p
ten
r
i
s
k
s
T
h
e
OW
ASP
h
a
s
id
en
tifie
d
th
e
to
p
ten
r
is
k
s
ass
o
ciate
d
with
b
lo
ck
ch
ain
tec
h
n
o
lo
g
y
,
s
u
ch
as
in
jectio
n
,
b
r
o
k
en
ac
ce
s
s
co
n
tr
o
l,
b
r
o
k
en
au
th
en
tica
tio
n
,
s
ec
u
r
ity
m
is
co
n
f
i
g
u
r
atio
n
,
an
d
o
th
er
s
[
2
9
]
,
[
3
0
]
,
cr
ea
tin
g
a
v
ital
m
o
d
el
f
o
r
d
ev
elo
p
er
s
an
d
o
r
g
an
izatio
n
s
to
u
n
d
er
s
tan
d
an
d
ad
d
r
ess
cr
itical
v
u
ln
er
a
b
ilit
ies
in
th
eir
b
lo
c
k
ch
ain
ap
p
licatio
n
s
.
T
h
is
f
r
am
ewo
r
k
p
r
o
v
i
d
es
a
cle
ar
id
en
tific
atio
n
o
f
s
ig
n
if
ica
n
t
r
is
k
s
,
s
u
ch
as
5
1
%
attac
k
s
an
d
im
p
r
o
p
er
k
ey
m
a
n
ag
em
en
t,
a
n
d
o
f
f
er
s
g
u
id
an
ce
o
n
h
o
w
to
m
itig
ate
th
ese
th
r
ea
ts
ef
f
ec
tiv
ely
.
Ad
d
itio
n
ally
,
it
r
aises
awa
r
en
ess
ab
o
u
t
th
e
v
ar
io
u
s
s
ec
u
r
ity
ch
allen
g
es
u
n
iq
u
e
t
o
b
l
o
ck
ch
ain
,
h
elp
in
g
s
tak
eh
o
ld
er
s
to
b
etter
c
o
m
p
r
e
h
en
d
th
e
lan
d
s
ca
p
e
o
f
p
o
ten
tial v
u
ln
er
ab
ilit
ies.
On
e
o
f
th
e
p
r
im
ar
y
ad
v
an
ta
g
es
o
f
th
e
OW
A
SP
f
r
am
ewo
r
k
is
it
s
ac
ce
s
s
ib
ilit
y
;
it
is
d
es
i
g
n
ed
to
b
e
ea
s
ily
u
n
d
er
s
to
o
d
b
y
o
r
g
a
n
iza
tio
n
s
o
f
all
s
izes,
allo
win
g
th
em
to
p
r
io
r
itize
th
eir
s
ec
u
r
ity
ef
f
o
r
ts
ef
f
ec
tiv
el
y
.
B
y
f
o
cu
s
in
g
o
n
t
h
e
m
o
s
t
cr
iti
ca
l
r
is
k
s
,
OW
ASP
h
elp
s
o
r
g
an
izatio
n
s
allo
ca
te
r
eso
u
r
ce
s
e
f
f
icien
tly
to
a
d
d
r
ess
th
e
m
o
s
t
p
r
ess
in
g
v
u
ln
e
r
ab
ilit
ies.
Ho
wev
er
,
th
e
m
o
d
el
d
o
es
h
av
e
s
o
m
e
lim
itatio
n
s
,
as
it
m
ay
n
o
t
p
r
o
v
id
e
in
-
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
39
,
No
.
2
,
Au
g
u
s
t
20
25
:
952
-
9
6
2
954
d
e
p
t
h
s
o
l
u
t
i
o
n
s
f
o
r
e
v
e
r
y
i
d
e
n
ti
f
i
e
d
r
i
s
k
.
F
u
r
t
h
e
r
m
o
r
e
,
t
h
e
r
e
is
a
p
o
s
s
i
b
il
i
t
y
t
h
at
s
o
m
e
r
i
s
k
s
c
o
u
l
d
b
e
o
v
e
r
l
o
o
k
e
d
i
f
t
h
e
y
d
o
n
o
t
m
a
k
e
t
h
e
t
o
p
t
e
n
l
i
s
t
,
w
h
i
c
h
m
a
y
le
a
d
t
o
g
a
p
s
i
n
a
n
o
r
g
a
n
i
z
a
t
i
o
n
’
s
o
v
e
r
a
ll
s
e
c
u
r
it
y
s
t
r
a
te
g
y
.
C.
Secu
r
ity
r
ef
er
e
n
ce
ar
ch
itectu
r
e
(
SR
S)
T
h
e
SR
S
i
s
d
esig
n
ed
to
ev
alu
ate
an
d
q
u
an
tif
y
th
e
r
is
k
s
ass
o
ciate
d
with
b
lo
ck
ch
ain
im
p
le
m
en
tatio
n
s
,
u
tili
zin
g
a
co
m
b
in
atio
n
o
f
q
u
alitativ
e
an
d
q
u
a
n
titativ
e
m
eth
o
d
o
lo
g
ies
[
3
1
]
.
T
h
is
m
o
d
el
em
p
h
asizes
r
is
k
q
u
an
tific
atio
n
t
h
r
o
u
g
h
s
p
ec
if
i
c
m
etr
ics,
en
ab
lin
g
o
r
g
a
n
izatio
n
s
to
g
ain
a
clea
r
er
u
n
d
e
r
s
tan
d
in
g
o
f
th
eir
r
is
k
lan
d
s
ca
p
e.
SR
S
also
in
clu
d
es
co
m
p
r
eh
e
n
s
iv
e
th
r
ea
t
an
d
v
u
l
n
er
ab
ilit
y
an
al
y
s
is
th
at
is
p
ar
t
icu
lar
ly
r
elev
a
n
t
to
b
lo
ck
ch
ain
e
n
v
ir
o
n
m
en
ts
,
en
s
u
r
in
g
th
at
all
asp
ec
ts
o
f
r
is
k
ar
e
co
n
s
id
er
ed
.
Ad
d
itio
n
ally
,
it
ad
o
p
t
s
a
C
o
m
p
r
eh
en
s
iv
e
v
iew
th
at
tak
es
in
to
ac
co
u
n
t
b
u
s
in
ess
p
r
o
ce
s
s
es
an
d
co
m
p
lian
ce
r
eq
u
ir
em
en
ts
,
m
ak
in
g
it
s
u
itab
le
f
o
r
o
r
g
an
izatio
n
s
o
p
er
atin
g
with
in
r
eg
u
lated
in
d
u
s
tr
ies.
On
e
o
f
th
e
k
ey
ad
v
a
n
tag
es
o
f
th
e
SR
S
is
its
ab
ilit
y
to
b
len
d
q
u
alitativ
e
an
d
q
u
an
tita
tiv
e
an
aly
s
es,
r
esu
ltin
g
in
a
b
alan
ce
d
an
d
th
o
r
o
u
g
h
r
is
k
ass
ess
m
en
t
ap
p
r
o
a
ch
.
B
y
p
r
o
v
id
i
n
g
c
o
n
cr
ete
r
is
k
m
etr
ics,
th
e
m
o
d
el
f
ac
ilit
ates
in
f
o
r
m
ed
d
ec
is
io
n
-
m
ak
in
g
,
allo
win
g
o
r
g
an
izatio
n
s
to
p
r
io
r
itize
an
d
ad
d
r
ess
th
eir
s
ec
u
r
ity
co
n
ce
r
n
s
ef
f
ec
tiv
ely
.
Ho
wev
er
,
im
p
lem
en
tin
g
th
e
SR
S
ca
n
b
e
r
eso
u
r
c
e
-
in
ten
s
iv
e,
r
eq
u
i
r
in
g
s
p
ec
ialized
k
n
o
wled
g
e
th
at
m
ay
n
o
t
b
e
r
ea
d
il
y
av
ailab
le
with
in
all
o
r
g
an
izatio
n
s
.
Mo
r
eo
v
e
r
,
as
b
lo
ck
ch
ain
tech
n
o
lo
g
y
co
n
tin
u
es
to
ev
o
lv
e,
o
n
g
o
in
g
ad
ju
s
tm
en
ts
an
d
u
p
d
ates
to
th
e
r
is
k
ass
ess
m
en
t
m
o
d
e
l
will
b
e
n
ec
e
s
s
ar
y
to
en
s
u
r
e
its
co
n
tin
u
ed
r
elev
an
ce
an
d
e
f
f
ec
t
iv
en
ess
in
m
itig
atin
g
em
er
g
in
g
r
is
k
s
.
D.
R
is
k
as
s
ess
m
en
t f
r
am
ewo
r
k
f
o
r
s
m
ar
t c
o
n
tr
ac
ts
(
R
AFS)
T
h
e
R
AFS
is
s
p
ec
if
ically
d
esig
n
ed
to
ev
alu
ate
th
e
s
ec
u
r
ity
an
d
r
eliab
ilit
y
o
f
s
m
ar
t
co
n
tr
ac
ts
,
h
ig
h
li
g
h
tin
g
th
e
u
n
iq
u
e
r
is
k
s
i
n
v
o
lv
e
d
in
co
d
in
g
an
d
e
x
ec
u
ti
n
g
th
ese
p
r
o
g
r
am
s
o
n
b
lo
c
k
ch
ain
p
latf
o
r
m
s
[
3
2
]
.
T
h
is
f
r
am
ewo
r
k
em
p
lo
y
s
s
y
s
tem
atic
co
d
e
r
e
v
iews
to
id
en
tif
y
p
o
ten
tial
v
u
ln
er
a
b
ilit
ies
wit
h
in
s
m
ar
t
co
n
t
r
ac
ts
,
en
s
u
r
in
g
th
at
s
ec
u
r
ity
f
laws
ar
e
ad
d
r
ess
ed
b
e
f
o
r
e
d
e
p
l
o
y
m
en
t.
I
t
also
in
co
r
p
o
r
ates
ex
ten
s
iv
e
test
in
g
m
eth
o
d
o
l
o
g
ies,
in
clu
d
in
g
f
o
r
m
al
v
er
if
icatio
n
tech
n
iq
u
es,
t
o
p
r
o
v
id
e
r
ig
o
r
o
u
s
ass
u
r
an
ce
o
f
a
s
m
ar
t
co
n
tr
ac
t'
s
f
u
n
ctio
n
ality
a
n
d
s
af
ety
.
Fu
r
th
er
m
o
r
e
,
R
AFS
tak
es
in
to
ac
co
u
n
t
o
p
er
atio
n
al
r
is
k
c
o
n
s
id
er
ati
o
n
s
,
o
f
f
e
r
in
g
a
co
m
p
r
eh
e
n
s
iv
e
v
iew
o
f
th
e
r
is
k
s
p
r
esen
t in
s
m
ar
t c
o
n
tr
ac
t e
n
v
ir
o
n
m
e
n
ts
.
On
e
o
f
th
e
p
r
im
a
r
y
ad
v
a
n
tag
e
s
o
f
R
AFS
is
i
ts
co
m
p
r
eh
en
s
iv
e
ap
p
r
o
ac
h
to
s
m
ar
t
co
n
tr
ac
t
s
,
allo
win
g
it
to
d
ir
ec
tly
ad
d
r
ess
th
eir
s
p
ec
if
ic
v
u
ln
er
a
b
ilit
ies.
B
y
p
r
o
m
o
tin
g
b
es
t
p
r
ac
tices
in
th
e
d
ev
elo
p
m
e
n
t
an
d
d
ep
lo
y
m
e
n
t
o
f
s
m
ar
t
co
n
tr
ac
ts
,
th
e
f
r
am
ewo
r
k
h
elp
s
d
e
v
elo
p
er
s
cr
ea
te
m
o
r
e
s
ec
u
r
e
a
n
d
r
eliab
le
ap
p
licatio
n
s
.
Ho
wev
er
,
th
e
n
a
r
r
o
w
f
o
cu
s
o
n
s
m
ar
t
co
n
tr
ac
ts
m
ea
n
s
th
at
R
AFS
m
ay
o
v
er
lo
o
k
b
r
o
ad
er
b
lo
ck
ch
ain
r
is
k
s
th
at
co
u
ld
im
p
ac
t
o
v
er
all
s
y
s
tem
s
ec
u
r
ity
.
Ad
d
itio
n
ally
,
th
e
co
m
p
lex
ity
in
v
o
lv
e
d
in
test
in
g
an
d
v
er
if
y
i
n
g
s
m
ar
t
co
n
tr
ac
ts
ca
n
p
o
s
e
s
ig
n
if
ican
t
b
ar
r
ier
s
f
o
r
d
ev
elo
p
e
r
s
,
p
ar
tic
u
lar
ly
th
o
s
e
wh
o
m
ay
lac
k
th
e
n
ec
ess
ar
y
ex
p
er
tis
e
o
r
r
eso
u
r
ce
s
to
im
p
lem
en
t
r
ig
o
r
o
u
s
s
ec
u
r
ity
as
s
ess
m
en
ts
ef
f
ec
tiv
ely
.
E.
E
n
ter
p
r
is
e
r
is
k
m
an
a
g
em
en
t
(
E
R
M)
f
o
r
b
lo
c
k
ch
ain
:
E
R
M
f
r
am
ewo
r
k
s
ca
n
b
e
cu
s
to
m
ized
f
o
r
b
lo
ck
ch
ai
n
ap
p
lic
atio
n
s
b
y
in
teg
r
atin
g
b
l
o
ck
ch
a
in
-
s
p
ec
if
ic
r
is
k
s
in
to
tr
ad
itio
n
al
E
R
M
p
r
ac
tices,
o
f
f
er
in
g
a
u
n
if
ied
v
iew
o
f
r
is
k
s
ac
r
o
s
s
th
e
o
r
g
a
n
i
za
tio
n
[
3
3
]
.
T
h
is
ap
p
r
o
ac
h
alig
n
s
b
lo
c
k
ch
ain
r
is
k
ass
ess
m
en
ts
with
o
v
er
al
l
b
u
s
in
ess
o
b
jectiv
es,
en
s
u
r
i
n
g
th
at
b
l
o
ck
ch
ain
in
itiativ
es
ar
e
ev
alu
ated
in
co
n
ju
n
ctio
n
with
o
th
er
en
ter
p
r
is
e
g
o
als.
E
R
M
f
o
r
b
lo
ck
ch
ain
also
ad
o
p
ts
a
co
m
p
r
eh
e
n
s
iv
e
p
er
s
p
ec
tiv
e,
e
n
co
m
p
ass
in
g
v
ar
i
o
u
s
ty
p
es
o
f
r
is
k
s
,
s
u
ch
as
o
p
er
atio
n
al
an
d
co
m
p
lian
ce
r
is
k
s
,
an
d
em
p
h
asizes th
e
im
p
o
r
tan
c
e
o
f
co
n
tin
u
o
u
s
m
o
n
ito
r
i
n
g
to
k
ee
p
p
ac
e
with
t
h
e
ev
o
l
v
in
g
r
i
s
k
lan
d
s
ca
p
e.
On
e
o
f
th
e
m
ai
n
ad
v
a
n
tag
es o
f
ap
p
ly
in
g
E
R
M
to
b
lo
ck
ch
ai
n
is
th
at
it si
tu
ate
s
b
lo
ck
ch
ain
r
i
s
k
s
with
in
th
e
b
r
o
ad
e
r
co
n
tex
t
o
f
en
ter
p
r
is
e
r
is
k
,
p
r
o
m
o
tin
g
a
p
r
o
ac
ti
v
e
s
tan
ce
o
n
em
er
g
in
g
th
r
ea
t
s
.
T
h
is
in
teg
r
atio
n
h
elp
s
o
r
g
an
izatio
n
s
m
an
a
g
e
b
lo
ck
ch
ain
r
is
k
s
alo
n
g
s
id
e
o
th
e
r
cr
itical
r
is
k
s
,
p
r
o
v
id
in
g
a
b
a
lan
ce
d
ap
p
r
o
ac
h
to
r
is
k
m
itig
atio
n
.
Ho
wev
er
,
th
is
b
r
o
ad
ap
p
r
o
ac
h
m
a
y
d
ilu
te
th
e
f
o
cu
s
o
n
b
lo
c
k
ch
ain
-
s
p
ec
if
ic
r
is
k
s
if
n
o
t
m
an
ag
ed
ca
r
ef
u
lly
.
Ad
d
itio
n
ally
,
im
p
lem
en
tin
g
an
E
R
M
f
r
am
ewo
r
k
f
o
r
b
lo
c
k
ch
ain
r
eq
u
ir
es
a
m
atu
r
e
u
n
d
er
s
tan
d
i
n
g
o
f
E
R
M
p
r
in
c
ip
les,
wh
ich
m
a
y
b
e
ch
allen
g
in
g
f
o
r
o
r
g
a
n
izatio
n
s
th
at
lack
ex
p
e
r
ien
ce
i
n
co
m
p
r
eh
e
n
s
iv
e
r
is
k
m
an
a
g
em
en
t.
T
h
e
r
is
k
ass
ess
m
en
t m
o
d
els li
s
ted
ab
o
v
e
p
r
o
v
id
e
v
ar
io
u
s
f
r
a
m
ewo
r
k
s
f
o
r
i
d
en
tify
in
g
,
ev
al
u
atin
g
,
an
d
m
itig
atin
g
r
is
k
s
s
p
ec
if
ic
to
b
lo
ck
ch
ain
tech
n
o
lo
g
y
.
Or
g
a
n
iz
atio
n
s
ca
n
ch
o
o
s
e
a
m
o
d
el
b
ased
o
n
th
eir
s
p
ec
if
ic
n
ee
d
s
,
ex
is
tin
g
ca
p
ab
ilit
ies,
an
d
th
e
co
m
p
lex
ity
o
f
th
eir
b
lo
ck
ch
ain
ap
p
licatio
n
s
.
B
y
u
n
d
er
s
tan
d
in
g
th
e
s
tr
en
g
th
s
an
d
wea
k
n
ess
es
o
f
ea
ch
m
o
d
el,
o
r
g
a
n
izatio
n
s
ca
n
en
h
an
ce
t
h
eir
s
ec
u
r
ity
p
o
s
tu
r
e
an
d
e
n
s
u
r
e
th
e
r
eliab
ilit
y
o
f
th
eir
b
l
o
ck
ch
ain
im
p
lem
en
tatio
n
s
as
th
e
tech
n
o
lo
g
y
co
n
tin
u
es
to
ev
o
lv
e.
E
ac
h
m
o
d
el
h
as
its
u
n
iq
u
e
f
o
cu
s
,
allo
win
g
f
o
r
co
m
p
r
e
h
en
s
iv
e
ap
p
r
o
ac
h
es
to
r
is
k
m
a
n
ag
em
en
t
in
d
iv
er
s
e
b
lo
ck
c
h
ain
en
v
ir
o
n
m
en
ts
as sh
o
wn
in
T
a
b
le
1
.
Alth
o
u
g
h
th
e
af
o
r
em
e
n
tio
n
ed
f
r
am
ewo
r
k
s
p
r
o
v
id
e
f
u
n
d
a
m
en
tal
in
s
i
g
h
ts
,
th
ey
o
v
er
lo
o
k
t
h
e
lay
er
ed
s
tr
u
ctu
r
e
o
f
b
l
o
ck
ch
ai
n
—
co
m
p
r
is
in
g
th
e
n
etwo
r
k
,
c
o
n
s
en
s
u
s
,
an
d
ap
p
licatio
n
lay
er
s
.
T
o
ad
d
r
ess
th
is
lim
itatio
n
,
it
is
ess
en
tial
to
u
n
d
er
s
tan
d
th
e
ty
p
es
o
f
attac
k
s
tar
g
etin
g
ea
ch
lay
er
,
en
a
b
lin
g
th
e
p
r
o
p
o
s
al
o
f
a
co
m
p
r
eh
e
n
s
iv
e
r
is
k
ass
ess
m
en
t m
o
d
el
f
o
r
th
e
e
n
tire
b
lo
c
k
ch
ain
s
tack
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
A
fr
a
mewo
r
k
fo
r
s
ec
u
r
i
ty
r
is
k
a
s
s
ess
men
t o
f b
lo
ck
ch
a
in
-
b
a
s
e
d
a
p
p
lic
a
tio
n
s
(
Mo
h
a
mma
d
Q
a
ta
w
n
eh
)
955
T
ab
le
1
.
C
o
m
p
a
r
is
o
n
b
etwe
en
d
if
f
er
en
t
r
is
k
ass
ess
m
en
t m
o
d
els f
o
r
b
lo
ck
c
h
ain
ap
p
licatio
n
s
M
o
d
e
l
K
e
y
f
e
a
t
u
r
e
s
A
d
v
a
n
t
a
g
e
s
D
r
a
w
b
a
c
k
s
B
l
o
c
k
c
h
a
i
n
S
e
c
u
r
i
t
y
F
r
a
mew
o
r
k
(
B
S
F
)
.
S
e
c
u
r
i
t
y
c
o
n
t
r
o
l
s
ma
p
p
i
n
g
,
r
i
s
k
man
a
g
e
me
n
t
g
u
i
d
e
l
i
n
e
s.
C
o
m
p
r
e
h
e
n
si
v
e
c
o
v
e
r
a
g
e
,
i
n
t
e
g
r
a
t
e
s s
e
c
u
r
i
t
y
p
r
a
c
t
i
c
e
s.
C
o
m
p
l
e
x
i
m
p
l
e
m
e
n
t
a
t
i
o
n
f
o
r
l
e
ss
e
x
p
e
r
i
e
n
c
e
d
o
r
g
a
n
i
z
a
t
i
o
n
s
.
O
W
A
S
P
B
l
o
c
k
c
h
a
i
n
T
o
p
Te
n
R
i
sk
s
.
I
d
e
n
t
i
f
i
c
a
t
i
o
n
o
f
t
o
p
r
i
s
k
s,
mi
t
i
g
a
t
i
o
n
g
u
i
d
a
n
c
e
.
A
c
c
e
ss
i
b
l
e
f
r
a
mew
o
r
k
,
p
r
i
o
r
i
t
i
z
e
s c
r
i
t
i
c
a
l
r
i
sk
s
.
Li
mi
t
e
d
s
o
l
u
t
i
o
n
s
f
o
r
r
i
sk
s
o
u
t
si
d
e
t
h
e
t
o
p
t
e
n
.
S
e
c
u
r
i
t
y
R
e
f
e
r
e
n
c
e
A
r
c
h
i
t
e
c
t
u
r
e
(
S
R
S
)
.
R
i
s
k
q
u
a
n
t
i
f
i
c
a
t
i
o
n
,
c
o
m
p
r
e
h
e
n
si
v
e
v
i
e
w
.
B
a
l
a
n
c
e
d
q
u
a
l
i
t
a
t
i
v
e
a
n
d
q
u
a
n
t
i
t
a
t
i
v
e
a
n
a
l
y
s
e
s.
R
e
s
o
u
r
c
e
-
i
n
t
e
n
s
i
v
e
,
r
e
q
u
i
r
e
s
sp
e
c
i
a
l
i
z
e
d
k
n
o
w
l
e
d
g
e
.
R
i
s
k
A
sses
sme
n
t
F
r
a
mew
o
r
k
f
o
r
S
mart
C
o
n
t
r
a
c
t
s
(
R
A
F
S
)
.
C
o
d
e
r
e
v
i
e
w
,
t
e
st
i
n
g
a
n
d
v
e
r
i
f
i
c
a
t
i
o
n
.
C
o
m
p
r
e
h
e
n
si
v
e
f
o
r
smar
t
c
o
n
t
r
a
c
t
s
,
p
r
o
m
o
t
e
s
b
e
s
t
p
r
a
c
t
i
c
e
s.
N
a
r
r
o
w
f
o
c
u
s
,
c
o
m
p
l
e
x
i
t
y
o
f
t
e
st
i
n
g
.
En
t
e
r
p
r
i
se
R
i
s
k
M
a
n
a
g
e
m
e
n
t
(
E
R
M
)
f
o
r
B
l
o
c
k
c
h
a
i
n
.
A
l
i
g
n
m
e
n
t
w
i
t
h
b
u
s
i
n
e
ss
o
b
j
e
c
t
i
v
e
s,
c
o
n
t
i
n
u
o
u
s
mo
n
i
t
o
r
i
n
g
.
C
o
m
p
r
e
h
e
n
si
v
e
r
i
s
k
p
e
r
s
p
e
c
t
i
v
e
,
p
r
o
a
c
t
i
v
e
man
a
g
e
me
n
t
.
R
i
s
k
d
i
l
u
t
i
o
n
i
f
n
o
t
c
a
r
e
f
u
l
l
y
man
a
g
e
d
,
r
e
q
u
i
r
e
s
ER
M
k
n
o
w
l
e
d
g
e
.
2
.
2
.
T
y
pes
o
f
a
t
t
a
c
k
s
a
t
diff
e
re
nt
blo
ck
cha
in la
y
er
s
B
lo
ck
ch
ain
tech
n
o
lo
g
y
is
b
u
i
lt
u
p
o
n
a
m
u
lti
-
lay
er
e
d
ar
ch
it
ec
tu
r
e
th
at
in
clu
d
es
th
e
n
etwo
r
k
lay
er
,
co
n
s
en
s
u
s
lay
er
,
s
m
ar
t
co
n
tr
ac
t
lay
er
,
an
d
ap
p
licatio
n
lay
er
,
ea
ch
o
f
wh
ich
s
er
v
es
d
is
tin
ct
f
u
n
ctio
n
s
an
d
p
r
esen
ts
u
n
i
q
u
e
v
u
ln
e
r
ab
ilit
ies
[
3
4
]
,
[
3
5
]
.
T
h
e
n
etwo
r
k
lay
er
is
r
esp
o
n
s
ib
le
f
o
r
p
ee
r
-
to
-
p
ee
r
co
m
m
u
n
icatio
n
an
d
tr
an
s
ac
tio
n
p
r
o
p
ag
atio
n
,
b
u
t it
ca
n
b
e
s
u
s
ce
p
tib
le
to
attac
k
s
s
u
ch
as:
a)
Sy
b
il
attac
k
s
:
Attack
er
s
cr
ea
t
e
m
u
ltip
le
id
en
titi
es
to
in
f
lu
e
n
ce
co
n
s
en
s
u
s
,
wh
ich
ca
n
le
ad
to
d
o
u
b
le
-
s
p
en
d
in
g
o
r
tr
an
s
ac
tio
n
m
an
ip
u
latio
n
[
3
6
]
.
b)
E
clip
s
e
attac
k
s
:
I
s
o
lat
in
g
n
o
d
es
f
r
o
m
th
e
n
etwo
r
k
allo
ws
attac
k
er
s
to
co
n
tr
o
l
th
e
f
lo
w
o
f
in
f
o
r
m
atio
n
,
lead
in
g
to
d
elay
ed
o
r
in
v
ali
d
t
r
an
s
ac
tio
n
s
[
2
9
]
.
c)
Dis
tr
ib
u
ted
d
en
ial
o
f
s
er
v
ic
e
(
DDo
S)
:
A
h
ig
h
v
o
l
u
m
e
o
f
tr
a
n
s
ac
tio
n
s
o
v
er
wh
elm
s
th
e
n
etwo
r
k
,
d
is
r
u
p
tin
g
b
l
o
ck
ch
ai
n
o
p
e
r
atio
n
s
[
3
0
]
.
T
h
e
co
n
s
en
s
u
s
lay
er
,
wh
ich
en
s
u
r
es a
g
r
ee
m
en
t a
m
o
n
g
d
is
tr
ib
u
ted
n
o
d
es,
f
ac
es r
is
k
s
lik
e:
a)
5
1
%
attac
k
s
:
I
f
an
attac
k
er
g
ain
s
co
n
tr
o
l
o
v
er
5
1
%
o
f
th
e
n
etwo
r
k
’
s
m
in
in
g
o
r
s
tak
in
g
p
o
wer
,
th
ey
ca
n
alter
tr
an
s
ac
tio
n
h
is
to
r
y
a
n
d
d
o
u
b
le
-
s
p
en
d
ass
ets [
3
1
]
.
b)
Self
is
h
m
in
in
g
:
Ma
licio
u
s
m
in
er
s
k
ee
p
m
in
ed
b
lo
ck
s
p
r
i
v
ate,
g
ain
in
g
a
n
ad
v
a
n
tag
e
b
y
s
elec
tiv
ely
p
u
b
lis
h
in
g
th
e
m
[
3
2
]
.
c)
No
th
in
g
-
at
-
s
tak
e
p
r
o
b
lem
:
I
n
p
r
o
o
f
-
of
-
s
tak
e
(
Po
S)
s
y
s
tem
s
,
v
alid
ato
r
s
m
ig
h
t
s
u
p
p
o
r
t
m
u
ltip
le
ch
ain
s
,
lead
in
g
to
p
o
ten
tial f
o
r
k
s
an
d
i
n
s
tab
ilit
y
[
3
3
]
.
At
th
e
s
m
ar
t c
o
n
tr
ac
t la
y
er
,
w
h
er
e
s
elf
-
ex
ec
u
tin
g
co
n
tr
ac
ts
ar
e
d
ep
lo
y
ed
,
v
u
ln
er
a
b
ilit
ies s
u
ch
as:
a)
R
ee
n
tr
an
cy
attac
k
s
:
Allo
w
an
attac
k
er
to
d
r
ain
f
u
n
d
s
b
y
r
ep
e
ated
ly
ca
llin
g
a
co
n
tr
ac
t
f
u
n
c
tio
n
b
ef
o
r
e
it
u
p
d
ates [
3
7
]
.
b)
I
n
teg
er
o
v
er
f
l
o
w/u
n
d
er
f
lo
w
: E
r
r
o
r
s
in
h
a
n
d
lin
g
n
u
m
er
ical
v
a
lu
es c
an
lead
to
lo
s
s
o
f
ass
ets [
2
7
]
.
c)
Un
ch
ec
k
ed
ca
ll
r
etu
r
n
v
alu
es
:
I
f
a
c
o
n
tr
ac
t
d
o
es
n
o
t
v
er
if
y
ca
ll
s
u
cc
ess
,
it
m
ay
co
n
tin
u
e
with
er
r
o
n
eo
u
s
d
ata,
r
is
k
in
g
u
n
in
ten
d
ed
r
esu
lt
s
[
3
6
]
.
Fin
ally
,
th
e
ap
p
licatio
n
la
y
er
,
wh
ich
in
ter
ac
ts
with
en
d
-
u
s
er
s
,
is
at
r
is
k
lik
e:
a)
Fro
n
t
-
r
u
n
n
in
g
attac
k
s
:
Attack
er
s
o
b
s
er
v
e
p
e
n
d
in
g
tr
a
n
s
ac
tio
n
s
an
d
e
x
ec
u
te
p
r
o
f
itab
le
tr
ad
es
ah
ea
d
o
f
th
em
[
3
7
]
.
b)
Or
ac
le
m
an
ip
u
latio
n
: E
x
ter
n
al
d
ata
o
r
ac
les ca
n
b
e
tam
p
er
ed
with
,
lead
in
g
to
f
alse d
ata
b
ein
g
f
ed
in
to
th
e
b
lo
ck
ch
ain
[
3
8
]
.
c)
Priv
ac
y
r
is
k
s
:
B
lo
ck
ch
ain
’
s
tr
an
s
p
ar
en
cy
ca
n
co
m
p
r
o
m
is
e
d
ata
co
n
f
id
e
n
tiality
,
p
ar
ticu
lar
l
y
f
o
r
s
en
s
itiv
e
in
f
o
r
m
atio
n
[
3
9
]
.
Un
d
er
s
tan
d
in
g
th
e
s
e
lay
er
s
an
d
th
eir
ass
o
ciate
d
th
r
ea
ts
is
cr
u
cial
f
o
r
d
ev
elo
p
i
n
g
ef
f
ec
tiv
e
s
ec
u
r
ity
m
ea
s
u
r
es
an
d
r
is
k
m
a
n
ag
em
en
t stra
teg
ie
s
in
b
lo
ck
ch
ain
s
y
s
tem
s
.
2
.
3
.
P
r
o
po
s
ed
m
o
del
T
h
is
s
ec
tio
n
in
tr
o
d
u
ce
s
a
n
ew
B
C
R
A
,
d
esig
n
ed
to
a
d
d
r
ess
th
e
s
p
ec
if
ic
s
ec
u
r
ity
c
h
allen
g
e
s
f
ac
ed
b
y
b
lo
ck
ch
ain
a
p
p
licatio
n
s
.
As
b
lo
ck
ch
ain
tech
n
o
lo
g
y
co
n
tin
u
es
to
ev
o
lv
e
an
d
in
teg
r
ate
in
t
o
v
ar
io
u
s
s
ec
to
r
s
,
it
b
ec
o
m
es
in
cr
ea
s
in
g
l
y
cr
itical
to
u
n
d
er
s
tan
d
t
h
e
r
is
k
s
ass
o
ciate
d
with
its
u
s
e.
B
C
R
AM
is
d
esig
n
ed
to
p
r
o
v
id
e
a
s
y
s
tem
atic
an
d
co
m
p
r
eh
en
s
i
v
e
ap
p
r
o
ac
h
t
o
id
en
tif
y
in
g
,
ass
ess
in
g
,
an
d
m
itig
atin
g
th
ese
r
is
k
s
ac
r
o
s
s
m
u
ltip
le
lay
er
s
o
f
b
lo
ck
ch
ai
n
ar
ch
itect
u
r
e.
T
h
e
p
r
o
p
o
s
ed
B
C
R
AM
c
o
m
p
r
is
es
th
e
f
o
llo
win
g
f
o
u
r
p
h
ases
,
as
s
h
o
wn
in
Fig
u
r
e
1
.
a)
R
is
k
id
en
tific
atio
n
:
T
h
e
f
ir
s
t
s
tag
e
o
f
B
C
R
AM
in
v
o
lv
es
a
th
o
r
o
u
g
h
i
d
en
tific
atio
n
o
f
p
o
ten
tial
v
u
ln
er
ab
ilit
ies
ac
r
o
s
s
all
lay
er
s
o
f
t
h
e
b
lo
ck
ch
ai
n
—
n
etwo
r
k
,
co
n
s
en
s
u
s
,
s
m
ar
t
co
n
tr
ac
t,
a
n
d
ap
p
licatio
n
lay
er
s
.
Utilizin
g
a
th
r
ea
t
m
atr
i
x
b
ased
o
n
h
is
to
r
ical
d
ata,
th
r
ea
t
in
tellig
en
ce
,
an
d
k
n
o
wn
v
u
ln
er
ab
ilit
ies,
B
C
R
AM
en
ab
les
o
r
g
an
izat
io
n
s
to
p
in
p
o
in
t
s
p
ec
if
ic
r
is
k
s
ass
o
ciate
d
with
th
eir
b
lo
ck
c
h
ain
im
p
lem
en
tatio
n
s
.
T
h
is
p
r
o
ce
s
s
in
v
o
lv
es
en
g
ag
in
g
with
v
ar
io
u
s
s
tak
eh
o
ld
er
s
,
in
cl
u
d
in
g
d
ev
elo
p
er
s
,
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
39
,
No
.
2
,
Au
g
u
s
t
20
25
:
952
-
9
6
2
956
s
ec
u
r
ity
an
aly
s
ts
,
an
d
s
y
s
tem
ad
m
in
is
tr
a
to
r
s
,
to
g
ath
e
r
in
s
ig
h
ts
an
d
en
s
u
r
e
a
c
o
m
p
r
eh
en
s
iv
e
u
n
d
er
s
tan
d
i
n
g
o
f
th
e
s
y
s
tem
ar
ch
itectu
r
e
an
d
o
p
er
atio
n
al
co
n
tex
t.
b)
R
is
k
s
co
r
in
g
:
Af
ter
id
en
tify
i
n
g
r
is
k
s
,
ea
ch
p
o
ten
tial
v
u
ln
er
ab
ilit
y
is
ass
ig
n
ed
a
s
co
r
e
b
ased
o
n
its
lik
elih
o
o
d
o
f
o
cc
u
r
r
e
n
ce
an
d
p
o
ten
tia
l
im
p
ac
t
o
n
th
e
o
r
g
a
n
i
za
tio
n
.
T
h
is
q
u
an
titativ
e
ass
es
s
m
en
t
allo
ws
f
o
r
th
e
p
r
io
r
itizatio
n
o
f
h
ig
h
-
r
is
k
v
u
ln
er
a
b
ilit
ies
th
at
r
eq
u
ir
e
im
m
ed
iate
atten
tio
n
.
B
C
R
A
M
em
p
lo
y
s
a
s
co
r
in
g
r
u
b
r
ic
th
at
f
ac
to
r
s
in
v
ar
io
u
s
elem
e
n
ts
s
u
ch
as
t
h
e
ex
p
lo
itab
ilit
y
o
f
a
v
u
l
n
er
ab
ilit
y
,
th
e
p
o
te
n
tial
f
in
an
cial
lo
s
s
as
s
o
ciate
d
with
an
ex
p
lo
it,
an
d
th
e
cr
iticality
o
f
th
e
af
f
ec
ted
s
y
s
tem
co
m
p
o
n
e
n
ts
.
B
y
co
n
v
er
tin
g
q
u
alitativ
e
r
is
k
s
in
to
q
u
an
titativ
e
m
etr
ics,
o
r
g
an
i
za
tio
n
s
ca
n
m
ak
e
i
n
f
o
r
m
ed
d
e
cisi
o
n
s
ab
o
u
t
wh
er
e
to
allo
ca
te
r
eso
u
r
ce
s
f
o
r
r
is
k
m
itig
atio
n
.
c)
I
m
p
ac
t
an
al
y
s
is
:
T
h
is
s
tag
e
e
v
alu
ates
th
e
co
n
s
eq
u
en
ce
s
o
f
ea
ch
id
en
tifie
d
r
is
k
o
n
th
e
c
o
r
e
attr
ib
u
tes
o
f
th
e
b
lo
ck
ch
ai
n
s
y
s
tem
:
co
n
f
id
en
tiality
,
in
teg
r
ity
,
an
d
av
aila
b
ilit
y
(
C
I
A
tr
iad
)
.
B
y
an
aly
zi
n
g
th
e
im
p
ac
t
o
f
ea
ch
r
is
k
,
o
r
g
an
izatio
n
s
ca
n
b
etter
u
n
d
e
r
s
tan
d
th
e
p
o
ten
tial
r
am
if
icatio
n
s
o
f
s
ec
u
r
ity
b
r
ea
ch
es,
in
clu
d
in
g
d
ata
lo
s
s
,
r
e
p
u
tatio
n
al
d
am
ag
e
,
an
d
leg
al
r
ep
er
c
u
s
s
io
n
s
.
I
m
p
ac
t
an
al
y
s
is
n
o
t
o
n
ly
h
elp
s
in
u
n
d
er
s
tan
d
i
n
g
th
e
s
ig
n
if
ica
n
c
e
o
f
r
is
k
s
b
u
t
also
aid
s
in
d
e
v
elo
p
in
g
ef
f
ec
tiv
e
c
o
m
m
u
n
icatio
n
s
tr
ateg
ies
f
o
r
s
tak
eh
o
l
d
er
s
,
en
s
u
r
in
g
th
at
th
ey
ar
e
awa
r
e
o
f
th
e
r
is
k
s
in
v
o
lv
ed
i
n
b
lo
c
k
ch
ain
o
p
er
atio
n
s
.
d)
Mitig
atio
n
s
tr
ateg
ies
:
Fo
r
ea
ch
h
ig
h
-
p
r
io
r
ity
r
is
k
id
en
tifi
ed
th
r
o
u
g
h
t
h
e
p
r
e
v
io
u
s
s
tag
es,
B
C
R
AM
f
ac
ilit
ates
th
e
d
ev
elo
p
m
en
t
o
f
c
o
m
p
r
e
h
en
s
iv
e
m
itig
atio
n
p
lan
s
.
T
h
ese
s
tr
ateg
ies
in
c
o
r
p
o
r
ate
b
o
th
p
r
ev
en
tiv
e
m
ea
s
u
r
es
—
s
u
ch
as
en
h
an
ce
d
e
n
cr
y
p
tio
n
p
r
o
to
co
ls
,
r
eg
u
lar
au
d
its
,
an
d
r
o
b
u
s
t
ac
ce
s
s
co
n
tr
o
ls
—
an
d
r
ea
ctiv
e
m
ea
s
u
r
es
th
at
p
r
ep
ar
e
o
r
g
an
izatio
n
s
f
o
r
p
o
ten
tial
in
cid
e
n
ts
,
in
clu
d
in
g
in
cid
en
t
r
esp
o
n
s
e
p
lan
s
an
d
r
ec
o
v
er
y
p
r
o
to
co
ls
.
T
h
e
f
lex
ib
ilit
y
o
f
B
C
R
AM
al
lo
ws
o
r
g
an
izatio
n
s
to
ad
ap
t
th
eir
m
itig
atio
n
s
tr
ateg
ies
b
ased
o
n
th
e
s
p
ec
if
ic
co
n
tex
t
o
f
th
ei
r
b
lo
ck
ch
ai
n
ap
p
licatio
n
s
,
e
n
ab
lin
g
a
m
o
r
e
p
er
s
o
n
alize
d
ap
p
r
o
ac
h
to
s
ec
u
r
ity
.
Fig
u
r
e
1
.
T
h
e
Pro
p
o
s
ed
B
C
R
AM
T
h
e
p
r
o
p
o
s
ed
B
C
R
AM
o
p
er
ates
as
a
cy
clica
l
p
r
o
ce
s
s
,
en
s
u
r
in
g
th
at
r
is
k
m
an
ag
em
e
n
t
is
a
n
o
n
g
o
in
g
ef
f
o
r
t
r
ath
er
th
an
a
o
n
e
-
tim
e
ass
es
s
m
en
t.
T
h
e
m
o
d
el
b
eg
i
n
s
with
an
in
itial
r
is
k
a
s
s
es
s
m
en
t,
f
o
llo
wed
b
y
co
n
tin
u
o
u
s
m
o
n
it
o
r
in
g
an
d
r
e
ev
alu
atio
n
o
f
r
is
k
s
as
th
e
b
lo
ck
ch
ain
e
n
v
ir
o
n
m
en
t
e
v
o
lv
es.
T
h
e
s
tep
s
in
th
e
B
C
R
AM
p
r
o
ce
s
s
ca
n
b
e
s
u
m
m
ar
ized
as f
o
llo
ws:
a)
I
n
itial
R
is
k
Ass
es
s
m
en
t:
C
o
n
d
u
ct
a
co
m
p
r
e
h
en
s
iv
e
r
ev
ie
w
o
f
th
e
b
lo
ck
c
h
ain
a
r
ch
ite
ctu
r
e,
id
e
n
tify
p
o
ten
tial v
u
ln
e
r
ab
ilit
ies,
an
d
s
co
r
e
th
ese
r
is
k
s
b
a
s
ed
o
n
lik
elih
o
o
d
a
n
d
im
p
ac
t.
b)
C
o
n
tin
u
o
u
s
Mo
n
ito
r
in
g
:
I
m
p
lem
en
t
to
o
ls
an
d
p
r
o
ce
s
s
es
f
o
r
o
n
g
o
i
n
g
m
o
n
ito
r
i
n
g
o
f
t
h
e
b
lo
ck
c
h
ain
n
etwo
r
k
,
in
cl
u
d
in
g
tr
an
s
ac
tio
n
au
d
itin
g
a
n
d
an
o
m
aly
d
etec
tio
n
,
to
i
d
en
tify
n
ew
r
is
k
s
as th
ey
ar
is
e.
c)
R
eg
u
lar
R
ea
s
s
ess
m
en
ts
:
Per
io
d
ica
lly
r
ev
is
it
th
e
r
is
k
id
en
tifi
ca
tio
n
an
d
s
co
r
in
g
p
r
o
ce
s
s
es
t
o
en
s
u
r
e
th
at
th
e
r
is
k
lan
d
s
ca
p
e
r
em
ain
s
cu
r
r
en
t,
esp
ec
ially
in
lig
h
t
o
f
s
o
f
twar
e
u
p
d
ates,
p
r
o
to
c
o
l
ch
an
g
es,
o
r
n
ew
th
r
ea
ts
.
d)
Feed
b
ac
k
L
o
o
p
:
Utilize
in
s
ig
h
ts
g
ain
ed
f
r
o
m
in
cid
e
n
t
r
esp
o
n
s
es
an
d
a
u
d
it
s
to
r
ef
in
e
r
is
k
ass
ess
m
en
ts
an
d
m
itig
atio
n
s
tr
ateg
ies,
f
o
s
ter
in
g
a
cu
ltu
r
e
o
f
co
n
tin
u
o
u
s
i
m
p
r
o
v
e
m
en
t in
b
lo
ck
ch
ai
n
s
ec
u
r
ity
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
A
fr
a
mewo
r
k
fo
r
s
ec
u
r
i
ty
r
is
k
a
s
s
ess
men
t o
f b
lo
ck
ch
a
in
-
b
a
s
e
d
a
p
p
lic
a
tio
n
s
(
Mo
h
a
mma
d
Q
a
ta
w
n
eh
)
957
2
.
3
.
1
.
Desig
n o
f
ex
perim
ent
T
h
is
s
ec
tio
n
ex
p
lain
s
a
ca
s
e
s
tu
d
y
th
at
a
p
p
lies
th
e
B
C
R
AM
to
th
e
E
th
er
eu
m
b
l
o
ck
ch
ain
,
d
em
o
n
s
tr
atin
g
h
o
w
s
ec
u
r
ity
r
is
k
s
ar
e
id
en
tifie
d
,
an
aly
ze
d
,
s
co
r
ed
,
an
d
m
itig
ated
.
E
th
er
eu
m
was c
h
o
s
en
d
u
e
to
its
wid
esp
r
ea
d
ad
o
p
tio
n
an
d
u
s
e
o
f
s
m
ar
t
co
n
tr
ac
ts
,
wh
ic
h
in
tr
o
d
u
ce
u
n
i
q
u
e
s
ec
u
r
ity
c
h
allen
g
es.
T
h
e
r
is
k
id
en
tific
atio
n
p
r
o
ce
s
s
u
s
in
g
th
e
B
C
R
AM
m
o
d
el
ass
ess
ed
p
o
ten
tial
v
u
ln
er
a
b
ilit
ies
in
th
e
E
t
h
er
eu
m
b
lo
c
k
ch
ain
ac
r
o
s
s
d
if
f
er
en
t la
y
e
r
s
:
a)
Netwo
r
k
lay
er
:
R
is
k
s
in
clu
d
e
DDo
S
attac
k
s
an
d
Sy
b
il
a
ttack
s
.
I
n
2
0
1
6
,
an
E
th
er
e
u
m
-
b
ased
attac
k
ex
p
lo
ited
p
ee
r
-
to
-
p
ee
r
n
etwo
r
k
v
u
ln
e
r
ab
ili
ties
,
ca
u
s
in
g
co
n
g
esti
o
n
an
d
s
er
v
ice
d
is
r
u
p
tio
n
[
4
0
]
.
b)
C
o
n
s
en
s
u
s
lay
er
: Ri
s
k
s
in
v
o
lv
e
5
1
% a
ttack
s
,
d
o
u
b
le
s
p
en
d
i
n
g
,
an
d
f
in
ality
d
elay
s
.
T
h
e
eth
er
eu
m
C
lass
ic
5
1
% a
ttack
in
2
0
2
0
r
esu
lted
in
ap
p
r
o
x
im
ately
5
.
6
m
illi
o
n
o
f
d
o
llar
s
in
f
r
a
u
d
u
len
t tr
a
n
s
ac
tio
n
s
[
4
0
]
.
c)
Ap
p
licatio
n
lay
e
r
:
Sm
ar
t
co
n
t
r
ac
t
v
u
l
n
er
ab
ilit
ies,
s
u
ch
as
r
ee
n
tr
an
cy
attac
k
s
an
d
l
o
g
ic
f
laws,
ar
e
k
e
y
co
n
ce
r
n
s
.
T
h
e
2
0
2
1
f
r
o
n
t
-
r
u
n
n
in
g
ex
p
lo
it
o
n
E
t
h
er
eu
m
DeFi
p
latf
o
r
m
s
r
esu
lted
in
m
illi
o
n
s
o
f
d
o
llar
s
i
n
lo
s
s
es d
u
e
to
m
an
ip
u
lated
t
r
an
s
ac
tio
n
o
r
d
er
in
g
.
d)
Sm
ar
t
co
n
tr
ac
t
lay
er
:
Vu
ln
er
ab
ilit
ies
in
clu
d
e
r
ee
n
tr
an
cy
attac
k
s
,
in
teg
er
o
v
er
f
lo
w/u
n
d
er
f
lo
w,
an
d
im
p
r
o
p
e
r
ac
ce
s
s
co
n
tr
o
ls
.
T
h
e
in
f
am
o
u
s
DAO
h
ac
k
in
2
0
1
6
led
to
a
$
6
0
m
illi
o
n
lo
s
s
d
u
e
t
o
a
r
ee
n
tr
a
n
cy
v
u
ln
er
ab
ilit
y
.
T
h
en
th
e
r
is
k
an
aly
s
is
an
d
Ss
co
r
in
g
ea
c
h
id
en
tifie
d
r
is
k
is
ev
alu
ated
b
ased
o
n
lik
elih
o
o
d
an
d
im
p
ac
t,
u
s
in
g
a
s
co
r
in
g
s
y
s
tem
r
an
g
in
g
f
r
o
m
1
(
L
o
w)
to
5
(
C
r
itical)
as sh
o
wn
in
T
ab
le
2
.
T
ab
le
2
.
R
is
k
an
aly
s
is
an
d
s
co
r
in
g
R
i
s
k
T
y
p
e
La
y
e
r
Li
k
e
l
i
h
o
o
d
I
mp
a
c
t
R
i
s
k
s
c
o
r
e
D
D
o
S
A
t
t
a
c
k
N
e
t
w
o
r
k
4
5
20
5
1
%
A
t
t
a
c
k
C
o
n
se
n
s
u
s
2
5
10
S
mart
C
o
n
t
r
a
c
t
R
e
e
n
t
r
a
n
c
y
S
mart
C
o
n
t
r
a
c
t
5
5
25
S
y
b
i
l
A
t
t
a
c
k
N
e
t
w
o
r
k
3
4
12
Lo
g
i
c
F
l
a
w
i
n
S
m
a
r
t
C
o
n
t
r
a
c
t
S
mart
C
o
n
t
r
a
c
t
4
4
16
P
h
i
s
h
i
n
g
A
t
t
a
c
k
A
p
p
l
i
c
a
t
i
o
n
5
3
15
B
ased
o
n
th
e
r
is
k
s
co
r
es,
r
i
s
k
m
itig
atio
n
s
tr
ateg
ies
s
h
o
u
ld
b
e
s
elec
ted
,
an
d
tar
g
ete
d
s
ec
u
r
ity
m
ea
s
u
r
es a
r
e
r
ec
o
m
m
e
n
d
ed
:
a)
DDo
S
attac
k
: I
m
p
lem
en
t r
ate
l
im
itin
g
an
d
e
n
h
an
ce
d
n
o
d
e
-
le
v
el
s
ec
u
r
ity
p
o
licies.
b)
5
1
%
attac
k
: T
r
an
s
itio
n
to
Po
S
co
n
s
en
s
u
s
(
E
th
er
eu
m
2
.
0
)
to
m
itig
ate
m
in
in
g
ce
n
t
r
aliza
tio
n
.
c)
Sm
ar
t
co
n
tr
ac
t
r
ee
n
tr
a
n
cy
:
E
n
f
o
r
ce
s
ec
u
r
e
co
d
in
g
p
r
ac
tices
an
d
u
s
e
to
o
ls
lik
e
Op
en
Z
e
p
p
e
lin
f
o
r
s
ec
u
r
e
co
n
tr
ac
t d
ev
el
o
p
m
en
t
.
d)
Sy
b
il
attac
k
: Str
en
g
th
en
id
en
ti
ty
v
er
if
icatio
n
m
ec
h
an
is
m
s
with
in
E
th
er
e
um
-
b
ased
a
p
p
licatio
n
s
.
e)
L
o
g
ic
f
law
in
s
m
ar
t
co
n
tr
ac
t
:
I
m
p
lem
e
n
t
f
o
r
m
al
v
er
if
icati
o
n
an
d
r
ig
o
r
o
u
s
test
in
g
f
r
am
ewo
r
k
s
b
ef
o
r
e
d
ep
lo
y
m
e
n
t.
3.
RE
SU
L
T
AND
DI
SCUS
SI
O
N
R
eg
ar
d
in
g
th
e
e
f
f
ec
tiv
en
ess
o
f
B
C
R
AM
,
two
k
ey
m
etr
ics we
r
e
u
s
ed
f
o
r
ass
ess
m
en
t:
a)
R
ed
u
ctio
n
in
Attack
Su
cc
ess
R
ate
(
Sm
ar
t Co
n
tr
ac
t
E
x
p
lo
its
)
as sh
o
wn
in
T
ab
le
3
.
−
A
s
et
o
f
v
u
ln
er
a
b
le
s
m
ar
t c
o
n
t
r
ac
ts
was d
ep
lo
y
ed
in
t
h
e
test
n
et.
−
Attack
er
s
attem
p
ted
to
ex
p
lo
it
th
ese
co
n
tr
ac
ts
u
s
in
g
k
n
o
wn
v
u
l
n
er
ab
ilit
ies
(
e.
g
.
,
r
ee
n
tr
an
cy
attac
k
s
,
in
teg
er
o
v
e
r
f
lo
ws).
−
B
C
R
AM
’
s
s
ec
u
r
ity
m
ea
s
u
r
es (
au
to
m
ated
v
u
ln
er
a
b
ilit
y
s
ca
n
n
in
g
,
ac
ce
s
s
co
n
tr
o
l p
o
licies)
wer
e
ap
p
lied
.
b)
I
m
p
r
o
v
ed
T
r
an
s
ac
tio
n
Secu
r
it
y
(
R
ed
u
ctio
n
i
n
Ph
is
h
in
g
I
n
cid
en
ts
)
as sh
o
wn
in
T
ab
le
4.
−
User
s
in
th
e
test
en
v
ir
o
n
m
en
t
wer
e
ex
p
o
s
ed
to
p
h
is
h
in
g
attem
p
ts
.
−
W
ith
o
u
t
B
C
R
AM
,
p
h
is
h
in
g
lin
k
s
an
d
f
ak
e
lo
g
i
n
p
ag
es
tr
ick
ed
u
s
er
s
in
to
co
m
p
r
o
m
is
in
g
th
eir
cr
ed
en
tials
.
−
W
ith
B
C
R
AM
,
m
u
lti
-
f
ac
to
r
au
th
en
ticatio
n
(
MFA)
,
r
ea
l
-
tim
e
p
h
is
h
in
g
d
etec
tio
n
,
a
n
d
war
n
in
g
s
y
s
tem
s
wer
e
im
p
lem
en
ted
.
T
ab
le
3
.
T
h
e
n
u
m
b
e
r
o
f
s
u
cc
e
s
s
f
u
l e
x
p
lo
its
b
ef
o
r
e
a
n
d
af
te
r
m
itig
atio
n
was r
ec
o
r
d
e
d
S
c
e
n
a
r
i
o
To
t
a
l
a
t
t
a
c
k
s
S
u
c
c
e
ssf
u
l
e
x
p
l
o
i
t
s
A
t
t
a
c
k
su
c
c
e
ss ra
t
e
W
i
t
h
o
u
t
B
C
R
A
M
1
0
0
65
6
5
%
W
i
t
h
B
C
R
A
M
1
0
0
23
2
3
%
I
mp
r
o
v
e
m
e
n
t
-
R
e
d
u
c
t
i
o
n
o
f
6
5
%
D
e
c
r
e
a
s
e
b
y
6
5
%
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
39
,
No
.
2
,
Au
g
u
s
t
20
25
:
952
-
9
6
2
958
T
ab
le
4
.
T
h
e
n
u
m
b
er
o
f
s
u
cc
e
s
s
f
u
l p
h
is
h
in
g
attac
k
s
b
ef
o
r
e
a
n
d
af
ter
B
C
R
AM
d
ep
lo
y
m
en
t
was r
ec
o
r
d
ed
S
c
e
n
a
r
i
o
To
t
a
l
p
h
i
h
i
n
g
a
t
t
e
m
p
t
s
S
u
c
c
e
ssf
u
l
p
h
i
s
h
i
n
g
a
t
t
a
c
k
s
S
u
c
c
e
ss
r
a
t
e
W
i
t
h
o
u
t
B
C
R
A
M
1
0
0
70
7
0
%
W
i
t
h
B
C
R
A
M
1
0
0
21
2
1
%
I
mp
r
o
v
e
m
e
n
t
-
R
e
d
u
c
t
i
o
n
o
f
7
0
%
D
e
c
r
e
a
s
e
b
y
7
0
%
T
h
e
e
x
p
e
r
i
m
e
n
t
d
e
m
o
n
s
t
r
a
t
e
d
t
h
a
t
B
C
R
A
M
’
s
m
i
t
i
g
at
i
o
n
s
t
r
at
e
g
i
e
s
s
i
g
n
i
f
i
ca
n
t
l
y
e
n
h
a
n
c
e
d
b
l
o
c
k
c
h
a
i
n
s
e
c
u
r
i
t
y
b
y
r
e
d
u
c
i
n
g
s
m
a
r
t
c
o
n
t
r
a
c
t
e
x
p
l
o
i
ts
b
y
6
5
%
a
n
d
p
h
i
s
h
i
n
g
i
n
c
i
d
e
n
t
s
b
y
7
0
%
.
T
h
i
s
wa
s
a
c
h
i
e
v
e
d
t
h
r
o
u
g
h
p
r
o
a
c
t
i
v
e
s
e
c
u
r
i
t
y
m
e
as
u
r
es
s
u
c
h
a
s
v
u
l
n
e
r
a
b
il
i
t
y
d
et
e
c
ti
o
n
,
e
n
h
a
n
c
e
d
a
u
t
h
e
n
t
i
c
at
i
o
n
,
an
d
r
e
a
l
-
t
i
m
e
t
h
r
e
at
m
i
t
i
g
a
ti
o
n
.
T
h
e
c
o
n
t
r
o
l
l
e
d
s
im
u
l
a
t
i
o
n
e
n
v
i
r
o
n
m
e
n
t
a
ll
o
w
ed
p
r
e
c
i
s
e
m
e
as
u
r
e
m
e
n
t
o
f
t
h
e
s
e
i
m
p
r
o
v
e
m
e
n
ts
,
v
a
l
i
d
a
t
i
n
g
t
h
e
e
f
f
ec
t
i
v
e
n
es
s
o
f
B
C
R
A
M
’
s
a
p
p
r
o
a
c
h
i
n
s
t
r
e
n
g
th
e
n
i
n
g
b
l
o
c
k
c
h
a
i
n
t
r
a
n
s
a
ct
i
o
n
s
e
c
u
r
i
t
y
.
T
o
ass
ess
h
o
w
B
C
R
AM
m
i
tig
ates
DDo
S
attac
k
s
an
d
im
p
r
o
v
es
n
etwo
r
k
s
tab
ilit
y
b
y
r
ed
u
cin
g
d
o
wn
tim
e,
a
DDo
S
attac
k
was
s
im
u
lated
b
y
f
lo
o
d
in
g
b
lo
c
k
c
h
ain
n
o
d
es
with
ex
ce
s
s
iv
e
r
eq
u
ests
.
T
h
e
n
etwo
r
k
was m
o
n
ito
r
ed
u
n
d
er
two
s
ce
n
ar
io
s
:
−
W
ith
o
u
t BC
R
AM
(
n
o
m
itig
atio
n
s
tr
ateg
ies)
as sh
o
wn
in
T
a
b
le
5.
−
W
ith
B
C
R
A
M
(
r
ate
lim
itin
g
,
n
o
d
e
lo
a
d
b
alan
ci
n
g
,
a
n
d
tr
af
f
ic
f
ilter
in
g
ap
p
lied
)
.
−
New
two
r
k
d
o
wn
tim
e
was
r
ec
o
r
d
ed
as
th
e
tim
e
tak
en
f
o
r
t
h
e
b
lo
ck
c
h
ain
n
etwo
r
k
to
r
ec
o
v
er
af
ter
a
n
attac
k
.
T
ab
le
5
s
h
o
ws
th
at
DDo
S
attac
k
r
esis
tan
ce
im
p
r
o
v
ed
d
u
e
t
o
r
ate
lim
itin
g
a
n
d
d
is
tr
ib
u
ted
n
o
d
e
lo
ad
b
ala
n
cin
g
.
Ad
d
itio
n
ally
,
th
e
Netwo
r
k
d
o
wn
tim
e
r
e
d
u
ce
d
b
y
8
5
%,
d
em
o
n
s
tr
a
tin
g
in
c
r
ea
s
ed
s
tab
ilit
y
.
Scalab
ilit
y
an
d
Per
f
o
r
m
a
n
ce
E
v
alu
atio
n
:
T
o
an
aly
ze
h
o
w
B
C
R
AM
af
f
ec
ts
b
lo
ck
ch
ai
n
s
ca
lab
ilit
y
u
n
d
er
d
if
f
er
en
t
tr
a
n
s
ac
tio
n
lo
ad
s
an
d
n
etwo
r
k
s
izes.
T
h
e
b
lo
ck
ch
ain
n
etwo
r
k
was
test
ed
with
v
ar
y
in
g
n
u
m
b
er
s
o
f
n
o
d
es
(
1
0
,
5
0
,
1
0
0
,
2
0
0
)
,
a
n
d
T
r
an
s
ac
tio
n
lo
ad
was
in
cr
ea
s
ed
f
r
o
m
1
,
0
0
0
T
P
S
(
T
r
an
s
ac
tio
n
s
p
er
Seco
n
d
)
to
1
0
0
,
0
0
0
T
PS
.
Per
f
o
r
m
an
ce
was m
ea
s
u
r
e
d
u
s
in
g
k
ey
m
etr
ics as sh
o
wn
in
T
a
b
le
6
:
−
T
h
r
o
u
g
h
p
u
t (
T
r
a
n
s
ac
tio
n
s
p
r
o
ce
s
s
ed
p
er
s
ec
o
n
d
)
.
−
L
aten
cy
(
T
im
e
ta
k
en
to
c
o
n
f
ir
m
a
tr
an
s
ac
tio
n
)
.
−
B
lo
ck
p
r
o
p
a
g
atio
n
tim
e
(
T
im
e
tak
en
to
b
r
o
ad
ca
s
t n
ew
b
lo
ck
s
)
.
T
ab
le
5
.
Netwo
r
k
d
o
wn
tim
e
u
n
d
er
two
s
ce
n
ar
i
o
s
S
c
e
n
a
r
i
o
D
D
o
S
a
t
t
a
c
k
r
e
q
u
e
st
s
N
e
t
w
o
r
k
d
o
w
n
t
i
me
(
M
i
n
u
t
e
s)
D
o
w
n
t
i
m
e
r
e
d
u
c
t
i
o
n
W
i
t
h
o
u
t
B
C
R
A
M
5
0
0
.
0
0
0
2
0
0
0%
W
i
t
h
B
C
R
A
M
5
0
0
.
0
0
0
30
8
5
%
R
e
d
u
c
t
i
o
n
T
ab
le
6
.
T
h
r
o
u
g
h
p
u
t,
laten
cy
,
an
d
p
r
o
p
ag
atio
n
tim
e
o
f
th
e
s
y
s
tem
B
l
o
c
k
c
h
a
i
n
si
z
e
(
N
o
d
e
s)
Tr
a
n
s
a
c
t
i
o
n
l
o
a
d
(
TPS
)
Tr
h
o
u
g
h
p
u
t
(
TPS
)
La
t
e
n
c
y
(
ms)
B
l
o
c
k
p
r
o
p
a
g
a
t
i
o
n
t
i
me
(
ms)
10
1
.
0
0
0
9
5
0
1
2
0
1
5
0
50
1
0
.
0
0
0
9
.
6
0
0
1
8
0
2
0
0
1
0
0
5
0
.
0
0
0
4
8
.
5
0
0
2
5
0
2
8
0
2
0
0
1
0
0
.
0
0
0
9
5
.
0
0
0
3
2
0
3
5
0
T
h
e
r
esu
lt
in
T
ab
le
6
s
h
o
ws
th
at
B
C
R
A
M
ef
f
ec
tiv
ely
h
a
n
d
les
h
ig
h
t
r
an
s
ac
tio
n
lo
ad
s
,
m
ain
tain
in
g
h
ig
h
th
r
o
u
g
h
p
u
t
with
m
in
im
al
laten
cy
in
cr
ea
s
e.
Ad
iiti
n
ally
,
with
r
esp
ec
t
to
n
etwo
r
k
s
tab
ilit
y
,
B
C
R
A
M
r
ed
u
ce
d
d
o
wn
tim
e
b
y
8
5
%,
m
ak
in
g
th
e
b
lo
c
k
ch
ain
m
o
r
e
r
esil
ien
t
ag
ain
s
t
DDo
S
attac
k
s
,
an
d
th
e
s
y
s
tem
ef
f
icien
tly
h
an
d
led
u
p
t
o
1
0
0
,
0
0
0
T
PS
,
m
ain
tain
i
n
g
h
ig
h
t
h
r
o
u
g
h
p
u
t
an
d
m
in
im
al
laten
cy
.
On
e
o
f
th
e
k
e
y
tak
ea
way
s
f
r
o
m
th
e
s
tu
d
y
is
th
e
im
p
ac
t
o
f
p
r
o
ac
tiv
e
r
is
k
a
s
s
es
s
m
en
t
o
n
b
lo
ck
c
h
ain
s
tab
ilit
y
.
I
m
p
lem
en
tin
g
B
C
R
AM
’
s
r
ec
o
m
m
en
d
atio
n
s
,
s
u
ch
as
tr
an
s
itio
n
in
g
to
Po
S
an
d
ad
o
p
tin
g
f
o
r
m
al
v
e
r
if
icatio
n
f
o
r
s
m
ar
t
co
n
tr
ac
ts
,
r
esu
lted
in
en
h
a
n
ce
d
s
ec
u
r
ity
r
esil
ien
ce
.
Ad
d
itio
n
ally
,
th
e
m
o
d
el’
s
f
lex
i
b
ilit
y
allo
ws
it
to
ad
ap
t
to
em
er
g
in
g
t
h
r
ea
ts
,
en
s
u
r
in
g
co
n
tin
u
o
u
s
s
ec
u
r
ity
im
p
r
o
v
e
m
en
ts
.
Ho
wev
er
,
th
e
s
tu
d
y
also
r
ev
ea
led
ar
ea
s
wh
er
e
a
d
d
itio
n
al
r
ef
in
em
en
ts
ar
e
r
eq
u
i
r
ed
.
Fo
r
ex
am
p
le,
B
C
R
AM
’
s
co
m
p
u
tatio
n
al
o
v
e
r
h
ea
d
g
r
o
ws with
n
etwo
r
k
s
ize,
n
ec
ess
itatin
g
th
e
d
ev
elo
p
m
e
n
t o
f
o
p
tim
ized
r
is
k
ass
es
s
m
en
t
tech
n
iq
u
es
f
o
r
l
ar
g
e
-
s
ca
le
b
lo
c
k
ch
ain
n
etwo
r
k
s
.
Fu
r
th
er
m
o
r
e,
wh
ile
th
e
m
o
d
el
e
f
f
ec
tiv
ely
m
itig
ates k
n
o
wn
v
u
ln
er
ab
ilit
ie
s
,
it m
u
s
t c
o
n
tin
u
ally
ev
o
lv
e
t
o
ad
d
r
ess
n
o
v
el
attac
k
v
ec
to
r
s
th
at
m
ay
ar
is
e
with
ad
v
an
ce
m
e
n
ts
in
b
lo
ck
c
h
ain
t
ec
h
n
o
lo
g
y
.
T
h
is
ca
s
e
s
tu
d
y
d
em
o
n
s
tr
ates
th
e
ef
f
ec
tiv
en
ess
o
f
B
C
R
A
M
in
s
y
s
tem
atica
lly
id
en
tify
in
g
a
n
d
m
itig
atin
g
r
is
k
s
in
b
lo
ck
ch
ai
n
ec
o
s
y
s
tem
s
.
B
y
ap
p
ly
in
g
th
is
m
o
d
el,
E
th
e
r
eu
m
-
b
ased
ap
p
licatio
n
s
ca
n
en
h
an
ce
th
eir
s
ec
u
r
ity
p
o
s
tu
r
e,
r
ed
u
c
in
g
v
u
ln
er
ab
ilit
ies
an
d
im
p
r
o
v
in
g
o
v
e
r
all
r
eliab
ilit
y
.
Fu
t
u
r
e
wo
r
k
in
cl
u
d
es
ex
ten
d
in
g
B
C
R
AM
to
o
th
er
b
lo
ck
ch
ain
p
latf
o
r
m
s
lik
e
Hy
p
er
led
g
er
an
d
B
in
an
ce
Sm
ar
t
C
h
ain
to
v
alid
ate
its
ad
ap
tab
ilit
y
an
d
ef
f
ec
ti
v
en
ess
ac
r
o
s
s
d
if
f
er
en
t
b
lo
ck
ch
ain
en
v
ir
o
n
m
e
n
ts
.
Desp
ite
its
s
u
cc
ess
,
s
ca
lab
ilit
y
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
A
fr
a
mewo
r
k
fo
r
s
ec
u
r
i
ty
r
is
k
a
s
s
ess
men
t o
f b
lo
ck
ch
a
in
-
b
a
s
e
d
a
p
p
lic
a
tio
n
s
(
Mo
h
a
mma
d
Q
a
ta
w
n
eh
)
959
r
em
ain
s
an
ar
ea
f
o
r
f
u
r
th
er
o
p
tim
izatio
n
,
p
a
r
ticu
lar
ly
f
o
r
h
ig
h
-
v
o
lu
m
e
b
lo
ck
ch
ain
en
v
ir
o
n
m
e
n
ts
.
Fu
tu
r
e
r
esear
ch
s
h
o
u
ld
f
o
cu
s
o
n
r
e
f
in
in
g
r
is
k
ass
ess
m
en
t
alg
o
r
ith
m
s
to
en
h
an
ce
e
f
f
icien
cy
an
d
in
co
r
p
o
r
atin
g
AI
-
d
r
iv
en
th
r
ea
t
in
tellig
en
ce
f
o
r
r
ea
l
-
tim
e
r
is
k
d
etec
tio
n
.
Ad
d
itio
n
ally
,
test
in
g
B
C
R
AM
o
n
o
th
er
b
lo
ck
c
h
ain
p
latf
o
r
m
s
,
s
u
ch
as
Hy
p
er
le
d
g
er
a
n
d
B
in
an
ce
Sm
ar
t
C
h
ain
,
will
f
u
r
th
er
v
alid
ate
i
ts
ad
ap
tab
ilit
y
an
d
ef
f
ec
tiv
en
ess
ac
r
o
s
s
d
iv
er
s
e
b
lo
ck
ch
ain
a
r
ch
itectu
r
es.
Ov
e
r
all,
B
C
R
AM
s
er
v
es
a
s
a
r
o
b
u
s
t
f
r
am
ewo
r
k
f
o
r
en
h
an
cin
g
b
lo
c
k
ch
ain
s
ec
u
r
ity
,
p
r
o
v
id
in
g
a
v
alu
a
b
le
t
o
o
l
f
o
r
d
ev
elo
p
e
r
s
,
en
ter
p
r
is
es,
an
d
r
esear
ch
er
s
aim
in
g
to
s
tr
en
g
th
en
t
h
e
s
ec
u
r
ity
p
o
s
tu
r
e
o
f
b
lo
ck
c
h
ain
-
b
ased
s
y
s
tem
s
.
4.
CO
M
P
ARA
T
I
V
E
ANA
L
YS
I
S O
F
B
L
O
CK
CH
A
I
N
RI
S
K
ASSE
S
SM
E
N
T
M
O
D
E
L
S
T
h
is
s
ec
tio
n
p
r
esen
ts
a
co
m
p
ar
ativ
e
an
aly
s
is
b
etwe
en
th
e
p
r
o
p
o
s
ed
B
C
R
AM
an
d
s
ev
er
al
ex
is
tin
g
b
lo
ck
ch
ain
r
is
k
ass
ess
m
en
t
m
o
d
els
is
s
h
o
wn
in
T
ab
le
7
,
in
clu
d
in
g
th
e
B
SF
,
OW
ASP
B
l
o
ck
ch
ain
T
o
p
T
en
R
is
k
s
,
SR
S
,
R
A
FS
,
an
d
E
R
M
f
o
r
B
lo
ck
ch
ain
.
T
h
is
co
m
p
ar
is
o
n
will
h
ig
h
lig
h
t
th
e
s
tr
en
g
th
s
an
d
wea
k
n
ess
es
o
f
ea
ch
m
o
d
el,
as we
ll a
s
th
eir
s
u
itab
ilit
y
f
o
r
d
if
f
er
en
t a
s
p
ec
t
s
o
f
b
lo
ck
c
h
ain
s
ec
u
r
ity
.
T
ab
le
7
.
C
o
m
p
a
r
ativ
e
an
aly
s
is
o
f
b
lo
c
k
ch
ain
r
is
k
ass
ess
m
en
t
m
o
d
els
F
e
a
t
u
r
e
/
M
o
d
e
l
B
C
R
A
M
B
S
F
O
W
A
S
P
S
R
S
R
A
F
S
ER
M
F
o
c
u
s Ar
e
a
C
o
m
p
r
e
h
e
n
si
v
e
mu
l
t
i
-
l
a
y
e
r
r
i
s
k
a
ssessm
e
n
t
G
e
n
e
r
a
l
s
e
c
u
r
i
t
y
c
o
n
t
r
o
l
s
f
o
r
b
l
o
c
k
c
h
a
i
n
a
p
p
l
i
c
a
t
i
o
n
s
I
d
e
n
t
i
f
i
c
a
t
i
o
n
o
f
t
o
p
se
c
u
r
i
t
y
r
i
sk
s
C
o
m
p
r
e
h
e
n
si
v
e
r
i
sk
m
a
n
a
g
e
m
e
n
t
f
o
r
b
l
o
c
k
c
h
a
i
n
F
o
c
u
se
d
o
n
smar
t
c
o
n
t
r
a
c
t
v
u
l
n
e
r
a
b
i
l
i
t
i
e
s
C
o
m
p
r
e
h
e
n
si
v
e
a
p
p
r
o
a
c
h
t
o
e
n
t
e
r
p
r
i
s
e
-
l
e
v
e
l
r
i
s
k
s
La
y
e
r
C
o
v
e
r
a
g
e
N
e
t
w
o
r
k
,
C
o
n
se
n
s
u
s,
S
mart
C
o
n
t
r
a
c
t
,
A
p
p
l
i
c
a
t
i
o
n
N
e
t
w
o
r
k
a
n
d
a
p
p
l
i
c
a
t
i
o
n
l
a
y
e
r
s
P
r
i
maril
y
f
o
c
u
ses
o
n
a
p
p
l
i
c
a
t
i
o
n
l
a
y
e
r
r
i
s
k
s
N
e
t
w
o
r
k
,
C
o
n
se
n
s
u
s,
A
p
p
l
i
c
a
t
i
o
n
l
a
y
e
r
s
S
mart
c
o
n
t
r
a
c
t
s
o
n
l
y
En
t
e
r
p
r
i
se
-
w
i
d
e
r
i
s
k
s,
i
n
c
l
u
d
i
n
g
g
o
v
e
r
n
a
n
c
e
R
i
s
k
I
d
e
n
t
i
f
i
c
a
t
i
o
n
D
e
t
a
i
l
e
d
i
d
e
n
t
i
f
i
c
a
t
i
o
n
a
c
r
o
ss
a
l
l
l
a
y
e
r
s
G
e
n
e
r
a
l
i
d
e
n
t
i
f
i
c
a
t
i
o
n
,
l
e
ss s
p
e
c
i
f
i
c
To
p
t
e
n
r
i
s
k
s
i
d
e
n
t
i
f
i
e
d
D
e
t
a
i
l
e
d
i
d
e
n
t
i
f
i
c
a
t
i
o
n
p
r
o
c
e
ss
S
p
e
c
i
f
i
c
v
u
l
n
e
r
a
b
i
l
i
t
i
e
s i
n
smar
t
c
o
n
t
r
a
c
t
s
B
r
o
a
d
r
i
sk
i
d
e
n
t
i
f
i
c
a
t
i
o
n
a
c
r
o
ss
t
h
e
o
r
g
a
n
i
z
a
t
i
o
n
M
i
t
i
g
a
t
i
o
n
S
t
r
a
t
e
g
i
e
s
C
u
s
t
o
mi
z
e
d
st
r
a
t
e
g
i
e
s
b
a
se
d
o
n
r
i
s
k
sc
o
r
i
n
g
G
e
n
e
r
a
l
r
e
c
o
m
me
n
d
a
t
i
o
n
s f
o
r
se
c
u
r
i
t
y
G
e
n
e
r
a
l
g
u
i
d
e
l
i
n
e
s f
o
r
mi
t
i
g
a
t
i
o
n
P
r
o
v
i
d
e
s
mi
t
i
g
a
t
i
o
n
st
r
a
t
e
g
i
e
s
S
p
e
c
i
f
i
c
mi
t
i
g
a
t
i
o
n
s f
o
r
smar
t
c
o
n
t
r
a
c
t
s
En
t
e
r
p
r
i
se
r
i
sk
mi
t
i
g
a
t
i
o
n
st
r
a
t
e
g
i
e
s
R
i
s
k
S
c
o
r
i
n
g
Q
u
a
n
t
i
t
a
t
i
v
e
sco
r
i
n
g
b
a
s
e
d
o
n
l
i
k
e
l
i
h
o
o
d
a
n
d
i
mp
a
c
t
N
o
t
st
a
n
d
a
r
d
i
z
e
d
N
o
sc
o
r
i
n
g
,
q
u
a
l
i
t
a
t
i
v
e
l
i
st
Q
u
a
l
i
t
a
t
i
v
e
a
ssessm
e
n
t
N
o
t
s
t
a
n
d
a
r
d
i
z
e
d
Q
u
a
l
i
t
a
t
i
v
e
a
ssessm
e
n
t
o
f
e
n
t
e
r
p
r
i
se
r
i
sk
s
F
l
e
x
i
b
i
l
i
t
y
a
n
d
A
d
a
p
t
a
b
i
l
i
t
y
H
i
g
h
l
y
cu
s
t
o
m
i
z
a
b
l
e
t
o
d
i
f
f
e
r
e
n
t
b
l
o
c
k
c
h
a
i
n
c
o
n
t
e
x
t
s
Le
ss
a
d
a
p
t
a
b
l
e
,
f
o
c
u
se
d
o
n
p
r
e
d
e
f
i
n
e
d
g
u
i
d
e
l
i
n
e
s
S
t
a
t
i
c
l
i
st
o
f
r
i
sk
s
F
l
e
x
i
b
l
e
t
o
a
d
a
p
t
t
o
v
a
r
i
o
u
s
b
l
o
c
k
c
h
a
i
n
t
y
p
e
s
S
p
e
c
i
f
i
c
t
o
s
mart
c
o
n
t
r
a
c
t
s
,
l
e
ss
a
d
a
p
t
a
b
l
e
A
d
a
p
t
a
b
l
e
t
o
d
i
f
f
e
r
e
n
t
e
n
t
e
r
p
r
i
se
c
o
n
t
e
x
t
s
R
e
a
l
-
W
o
r
l
d
A
p
p
l
i
c
a
t
i
o
n
D
e
si
g
n
e
d
f
o
r
p
r
a
c
t
i
c
a
l
u
se
a
c
r
o
ss
d
i
f
f
e
r
e
n
t
b
l
o
c
k
c
h
a
i
n
a
p
p
l
i
c
a
t
i
o
n
s.
G
e
n
e
r
a
l
r
e
c
o
m
me
n
d
a
t
i
o
n
s;
p
r
a
c
t
i
c
a
l
a
p
p
l
i
c
a
b
i
l
i
t
y
v
a
r
i
e
s
P
r
i
maril
y
e
d
u
c
a
t
i
o
n
a
l
a
n
d
a
w
a
r
e
n
e
ss
P
r
a
c
t
i
c
a
l
a
p
p
l
i
c
a
b
i
l
i
t
y
f
o
r
v
a
r
i
o
u
s
b
l
o
c
k
c
h
a
i
n
s
F
o
c
u
se
d
o
n
smar
t
c
o
n
t
r
a
c
t
s
,
a
p
p
l
i
c
a
b
l
e
i
n
r
e
l
e
v
a
n
t
p
r
o
j
e
c
t
s
B
r
o
a
d
a
p
p
l
i
c
a
b
i
l
i
t
y
a
c
r
o
ss
e
n
t
e
r
p
r
i
ses
4
.
1
.
Adv
a
nt
a
g
es o
f
B
CRAM
B
C
R
AM
p
r
o
v
id
es
s
ev
er
al
ad
v
an
tag
es
o
v
er
tr
a
d
itio
n
al
r
is
k
ass
es
s
m
en
t
m
o
d
els,
p
ar
ticu
l
ar
ly
wh
en
ad
d
r
ess
in
g
th
e
s
p
ec
if
ic
n
u
an
ce
s
o
f
b
lo
ck
c
h
ain
tech
n
o
lo
g
y
:
a)
C
o
m
p
r
eh
en
s
iv
e
c
o
v
er
a
g
e
:
B
y
f
o
cu
s
in
g
o
n
all
lay
er
s
o
f
b
lo
ck
ch
ain
ar
c
h
itectu
r
e,
B
C
R
AM
en
s
u
r
es
th
at
n
o
asp
ec
t
o
f
th
e
s
y
s
tem
is
o
v
er
lo
o
k
ed
.
T
h
is
co
m
p
r
e
h
en
s
iv
e
ap
p
r
o
ac
h
is
ess
en
tial
f
o
r
id
e
n
tify
in
g
r
is
k
s
th
a
t
m
ay
s
p
an
m
u
ltip
le
lay
er
s
o
r
m
an
if
est in
u
n
iq
u
e
way
s
with
in
th
e
d
ec
en
tr
alize
d
e
n
v
ir
o
n
m
en
t
.
b)
Qu
an
titativ
e
r
is
k
ass
es
s
m
en
t
:
T
h
e
r
is
k
s
co
r
in
g
s
y
s
tem
en
ab
les
o
r
g
an
izatio
n
s
to
p
r
io
r
itize
th
eir
s
ec
u
r
ity
ef
f
o
r
ts
b
ased
o
n
em
p
ir
ical
d
at
a
r
ath
er
th
an
an
ec
d
o
tal
ev
id
e
n
ce
.
T
h
is
d
ata
-
d
r
iv
en
ap
p
r
o
ac
h
lead
s
to
m
o
r
e
ef
f
ec
tiv
e
r
eso
u
r
ce
allo
ca
tio
n
a
n
d
d
ec
is
io
n
-
m
ak
in
g
.
c)
C
o
m
p
r
eh
en
s
iv
e
m
itig
atio
n
s
tr
ateg
ies
: B
C
R
AM
'
s
f
lex
ib
ilit
y
allo
ws o
r
g
an
izatio
n
s
to
cu
s
to
m
ize
m
itig
atio
n
p
lan
s
ac
co
r
d
in
g
t
o
th
eir
s
p
ec
if
ic
u
s
e
ca
s
es,
r
eg
u
lato
r
y
r
eq
u
ir
em
en
ts
,
an
d
o
r
g
an
izatio
n
al
r
is
k
to
ler
a
n
ce
.
T
h
is
ad
ap
tab
ilit
y
is
cr
u
cial
in
t
h
e
r
ap
id
ly
ev
o
lv
i
n
g
lan
d
s
ca
p
e
o
f
b
lo
c
k
ch
ain
tech
n
o
lo
g
y
.
d)
Stak
eh
o
ld
er
en
g
a
g
em
en
t
:
B
y
in
v
o
lv
in
g
v
ar
io
u
s
s
tak
eh
o
ld
er
s
in
th
e
r
is
k
id
en
tific
atio
n
an
d
ass
es
s
m
en
t
p
r
o
ce
s
s
,
B
C
R
AM
f
o
s
ter
s
co
ll
ab
o
r
atio
n
a
n
d
e
n
h
an
ce
s
awa
r
e
n
ess
o
f
b
lo
ck
ch
ai
n
s
ec
u
r
ity
is
s
u
es
ac
r
o
s
s
th
e
o
r
g
an
izatio
n
.
T
h
is
in
clu
s
iv
ity
lead
s
to
m
o
r
e
r
o
b
u
s
t
s
ec
u
r
i
ty
p
r
ac
tices
an
d
a
s
tr
o
n
g
er
o
r
g
an
izatio
n
a
l
co
m
m
itm
en
t to
r
is
k
m
an
ag
em
en
t.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4
7
5
2
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
,
Vo
l.
39
,
No
.
2
,
Au
g
u
s
t
20
25
:
952
-
9
6
2
960
e)
Dy
n
am
ic
ad
ap
tatio
n
:
T
h
e
cy
c
lical
n
atu
r
e
o
f
B
C
R
AM
en
s
u
r
es
th
at
o
r
g
an
izatio
n
s
r
em
ain
ag
ile
in
th
eir
r
is
k
m
an
ag
em
en
t
ef
f
o
r
ts
,
en
a
b
lin
g
th
em
to
r
esp
o
n
d
q
u
ic
k
ly
to
em
er
g
in
g
th
r
ea
ts
an
d
ch
an
g
es
in
th
e
b
lo
ck
ch
ain
en
v
ir
o
n
m
en
t.
B
C
R
AM
i
s
d
esig
n
ed
f
o
r
a
wid
e
r
an
g
e
o
f
u
s
er
s
ac
r
o
s
s
d
if
f
er
en
t
s
ec
to
r
s
th
at
lev
er
ag
e
b
lo
ck
ch
ain
tech
n
o
lo
g
y
.
Key
s
tak
eh
o
ld
er
s
in
clu
d
e:
a)
B
l
o
c
k
c
h
a
i
n
d
e
v
el
o
p
e
r
s
:
D
e
v
e
lo
p
e
r
s
c
a
n
u
t
i
li
z
e
B
C
R
A
M
t
o
id
e
n
t
i
f
y
a
n
d
a
d
d
r
e
s
s
v
u
l
n
e
r
a
b
i
l
it
i
e
s
d
u
r
i
n
g
t
h
e
d
e
v
e
l
o
p
m
e
n
t
p
h
a
s
e
o
f
b
l
o
c
k
c
h
a
i
n
a
p
p
l
i
c
a
ti
o
n
s
,
e
n
s
u
r
i
n
g
t
h
a
t
s
e
c
u
r
i
t
y
is
i
n
t
e
g
r
a
t
e
d
i
n
t
o
t
h
e
d
e
s
i
g
n
p
r
o
c
e
s
s
.
b)
Secu
r
ity
an
aly
s
ts
:
C
y
b
er
s
ec
u
r
ity
p
r
o
f
ess
io
n
als
ca
n
im
p
lem
e
n
t
B
C
R
AM
as
p
ar
t
o
f
th
eir
r
is
k
m
an
ag
em
en
t
s
tr
ateg
y
to
ass
ess
an
d
p
r
io
r
itiz
e
th
r
ea
ts
,
en
ab
lin
g
th
em
to
f
o
c
u
s
o
n
h
ig
h
-
r
is
k
ar
ea
s
.
c)
C
o
m
p
lian
ce
o
f
f
icer
s
:
Or
g
an
i
za
tio
n
s
o
p
er
atin
g
in
r
eg
u
lat
ed
in
d
u
s
tr
ies
ca
n
u
s
e
B
C
R
AM
to
en
s
u
r
e
co
m
p
lian
ce
w
ith
in
d
u
s
tr
y
s
ta
n
d
ar
d
s
an
d
r
e
g
u
latio
n
s
b
y
s
y
s
tem
atica
lly
ad
d
r
ess
in
g
an
d
d
o
cu
m
en
tin
g
s
ec
u
r
ity
r
is
k
s
.
d)
E
x
ec
u
tiv
es
an
d
d
ec
is
io
n
m
ak
e
r
s
:
Or
g
an
izatio
n
al
lead
er
s
ca
n
lev
er
ag
e
th
e
in
s
ig
h
ts
g
ain
e
d
f
r
o
m
B
C
R
AM
to
m
ak
e
i
n
f
o
r
m
ed
d
ec
is
io
n
s
ab
o
u
t
r
eso
u
r
ce
allo
ca
tio
n
an
d
s
tr
ateg
ic
p
lan
n
in
g
r
elate
d
to
b
lo
ck
c
h
ai
n
in
itiativ
es.
e)
Au
d
ito
r
s
an
d
r
is
k
m
an
ag
er
s
:
I
n
ter
n
al
an
d
ex
ter
n
al
au
d
ito
r
s
ca
n
ap
p
ly
B
C
R
AM
t
o
ass
ess
th
e
ef
f
ec
tiv
en
ess
o
f
b
lo
c
k
ch
ain
s
e
cu
r
ity
co
n
t
r
o
ls
an
d
p
r
o
v
id
e
r
ec
o
m
m
en
d
atio
n
s
f
o
r
im
p
r
o
v
em
e
n
t.
f)
E
d
u
ca
tio
n
al
I
n
s
titu
tio
n
s
a
n
d
R
esear
ch
er
s
:
Aca
d
em
ic
in
s
titu
tio
n
s
s
tu
d
y
in
g
b
lo
ck
c
h
ain
te
ch
n
o
lo
g
y
ca
n
em
p
lo
y
B
C
R
AM
as
a
ca
s
e
s
tu
d
y
to
an
aly
ze
th
e
ef
f
ec
tiv
en
ess
o
f
s
ec
u
r
ity
m
ea
s
u
r
es
in
r
ea
l
-
wo
r
ld
ap
p
licatio
n
s
.
5.
CO
NCLU
SI
O
N
T
h
is
p
ap
er
ap
p
lied
th
e
B
C
R
AM
to
E
th
er
eu
m
,
d
em
o
n
s
tr
atin
g
its
ef
f
ec
tiv
en
ess
in
i
d
en
tify
in
g
,
ass
es
s
in
g
,
an
d
m
itig
atin
g
s
ec
u
r
ity
r
is
k
s
.
B
y
im
p
lem
e
n
tin
g
au
to
m
ated
s
m
ar
t
c
o
n
tr
ac
t
a
u
d
itin
g
,
d
ec
en
tr
alize
d
id
en
tity
s
o
lu
tio
n
s
,
an
d
L
ay
er
2
s
ca
lab
ilit
y
en
h
an
ce
m
e
n
ts
,
we
ac
h
iev
ed
s
ig
n
if
ican
t
im
p
r
o
v
em
en
ts
in
E
th
er
eu
m
’
s
s
ec
u
r
ity
p
o
s
tu
r
e.
Sp
ec
if
ically
,
s
m
ar
t
co
n
tr
ac
t
ex
p
lo
its
d
ec
r
ea
s
ed
b
y
6
5
%,
p
h
is
h
in
g
in
ci
d
en
ts
d
r
o
p
p
ed
b
y
7
0
%,
an
d
DDo
S
r
esil
ien
ce
im
p
r
o
v
e
d
,
r
ed
u
cin
g
d
o
wn
tim
e
b
y
8
5
%.
T
h
ese
r
e
s
u
lts
h
ig
h
lig
h
t
th
e
im
p
o
r
tan
ce
o
f
a
s
tr
u
ctu
r
e
d
r
i
s
k
ass
es
s
m
en
t
f
r
am
ewo
r
k
tail
o
r
ed
to
b
lo
ck
ch
ai
n
ec
o
s
y
s
tem
s
,
en
s
u
r
in
g
g
r
ea
ter
tr
u
s
t,
s
ec
u
r
ity
,
an
d
r
eliab
ilit
y
f
o
r
d
ec
en
tr
alize
d
ap
p
licatio
n
s
.
Desp
ite
th
ese
ac
h
iev
em
en
ts
,
ch
allen
g
es r
em
ain
in
s
ec
u
r
in
g
lar
g
e
-
s
ca
le
b
lo
c
k
ch
ai
n
d
ep
lo
y
m
en
ts
ag
ain
s
t
em
er
g
i
n
g
attac
k
v
ec
to
r
s
an
d
ev
o
lv
i
n
g
th
r
ea
t
lan
d
s
ca
p
es.
Fu
tu
r
e
wo
r
k
will
f
o
cu
s
o
n
:
a)
E
n
h
a
n
cin
g
AI
-
Dr
iv
en
Secu
r
ity
An
aly
tics
–
I
n
teg
r
atin
g
m
ac
h
in
e
lea
r
n
in
g
m
o
d
els
f
o
r
r
ea
l
-
tim
e
a
n
o
m
al
y
d
etec
tio
n
in
b
l
o
ck
ch
ain
t
r
a
n
s
ac
tio
n
s
an
d
s
m
ar
t
co
n
tr
ac
t
b
eh
av
io
r
.
b
)
C
r
o
s
s
-
C
h
ain
R
is
k
Ass
e
s
s
m
en
t
–
E
x
t
en
d
in
g
B
C
R
A
M
to
m
u
lti
-
ch
ai
n
en
v
ir
o
n
m
e
n
ts
to
ad
d
r
ess
s
ec
u
r
ity
ch
allen
g
es
in
in
ter
o
p
er
a
b
le
b
lo
ck
ch
ai
n
n
etwo
r
k
s
.
c)
Qu
an
tu
m
-
R
esis
tan
t
C
r
y
p
to
g
r
ap
h
y
–
E
v
alu
atin
g
th
e
im
p
ac
t
o
f
q
u
an
tu
m
co
m
p
u
tin
g
o
n
b
lo
ck
ch
ai
n
s
e
cu
r
ity
an
d
d
ev
elo
p
in
g
p
o
s
t
-
q
u
an
tu
m
en
cr
y
p
tio
n
m
ec
h
a
n
is
m
s
.
d
)
Au
to
m
ated
C
o
m
p
lian
ce
an
d
R
eg
u
lato
r
y
Ad
ap
tatio
n
–
Dev
elo
p
in
g
a
c
o
m
p
lian
ce
-
awa
r
e
r
is
k
ass
ess
m
en
t
m
o
d
u
le
to
h
elp
b
lo
ck
ch
ain
p
r
o
jects m
ee
t r
e
g
u
lato
r
y
r
eq
u
ir
em
en
ts
s
ea
m
less
l
y
.
B
y
in
co
r
p
o
r
atin
g
th
ese
ad
v
a
n
ce
m
en
ts
,
B
C
R
AM
ca
n
ev
o
lv
e
in
to
a
m
o
r
e
ad
a
p
tiv
e,
AI
-
en
h
an
ce
d
s
ec
u
r
ity
f
r
am
ewo
r
k
,
f
u
r
th
e
r
s
tr
en
g
th
en
i
n
g
th
e
r
esil
ien
ce
o
f
b
lo
ck
ch
ain
ec
o
s
y
s
tem
s
.
Fu
tu
r
e
s
tu
d
ies
will
also
f
o
cu
s
o
n
test
in
g
B
C
R
AM
in
r
ea
l
-
wo
r
ld
f
in
a
n
cial
an
d
h
e
alth
ca
r
e
b
lo
ck
ch
ain
ap
p
licati
o
n
s
to
v
alid
ate
its
s
ca
lab
ilit
y
an
d
ef
f
ec
tiv
en
es
s
a
cr
o
s
s
d
iv
er
s
e
in
d
u
s
tr
ies.
ACK
NO
WL
E
DG
M
E
N
T
S
T
h
is
r
esear
ch
wo
r
k
was
d
o
n
e
d
u
r
in
g
th
e
s
ab
b
atica
l
leav
e
f
r
o
m
th
e
Un
iv
er
s
ity
o
f
J
o
r
d
an
f
o
r
th
e
ac
ad
em
ic
y
ea
r
2
0
2
4
-
2
0
2
5
,
w
h
er
e
th
is
r
esear
ch
wo
r
k
was
a
cc
o
m
p
lis
h
ed
at
th
e
Dep
ar
tm
e
n
t
o
f
Netwo
r
k
s
an
d
C
y
b
er
s
ec
u
r
ity
,
Al
-
Ah
liy
y
a
A
m
m
an
Un
iv
er
s
ity
,
Am
m
an
,
J
o
r
d
an
.
F
UNDING
I
NF
O
R
M
A
T
I
O
N
Au
th
o
r
s
s
tate
n
o
f
u
n
d
in
g
in
v
o
lv
ed
.
AUTHO
R
CO
NT
RI
B
UT
I
O
NS ST
A
T
E
M
E
N
T
T
h
e
s
o
le
au
th
o
r
,
M
o
ha
mm
a
d
Q
a
t
a
wneh
,
was
r
esp
o
n
s
ib
le
f
o
r
all
asp
ec
ts
o
f
th
is
r
esear
ch
,
in
clu
d
in
g
co
n
ce
p
tu
aliza
tio
n
,
m
eth
o
d
o
lo
g
y
,
f
o
r
m
al
an
aly
s
is
,
in
v
esti
g
a
tio
n
,
an
d
wr
itin
g
(
o
r
ig
in
al
d
r
af
t
p
r
e
p
ar
atio
n
an
d
wr
itin
g
r
ev
iews a
n
d
e
d
itin
g
)
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esian
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4
7
5
2
A
fr
a
mewo
r
k
fo
r
s
ec
u
r
i
ty
r
is
k
a
s
s
ess
men
t o
f b
lo
ck
ch
a
in
-
b
a
s
e
d
a
p
p
lic
a
tio
n
s
(
Mo
h
a
mma
d
Q
a
ta
w
n
eh
)
961
Na
m
e
o
f
Aut
ho
r
C
M
So
Va
Fo
I
R
D
O
E
Vi
Su
P
Fu
Mo
h
am
m
ad
Qata
wn
e
h
✓
✓
✓
✓
✓
✓
✓
C
:
C
o
n
c
e
p
t
u
a
l
i
z
a
t
i
o
n
M
:
M
e
t
h
o
d
o
l
o
g
y
So
:
So
f
t
w
a
r
e
Va
:
Va
l
i
d
a
t
i
o
n
Fo
:
Fo
r
mal
a
n
a
l
y
s
i
s
I
:
I
n
v
e
s
t
i
g
a
t
i
o
n
R
:
R
e
so
u
r
c
e
s
D
:
D
a
t
a
C
u
r
a
t
i
o
n
O
:
W
r
i
t
i
n
g
-
O
r
i
g
i
n
a
l
D
r
a
f
t
E
:
W
r
i
t
i
n
g
-
R
e
v
i
e
w
&
E
d
i
t
i
n
g
Vi
:
Vi
su
a
l
i
z
a
t
i
o
n
Su
:
Su
p
e
r
v
i
s
i
o
n
P
:
P
r
o
j
e
c
t
a
d
mi
n
i
st
r
a
t
i
o
n
Fu
:
Fu
n
d
i
n
g
a
c
q
u
i
si
t
i
o
n
CO
NF
L
I
C
T
O
F
I
N
T
E
R
E
S
T
ST
A
T
E
M
E
NT
Au
th
o
r
s
s
tate
n
o
co
n
f
lict o
f
in
t
er
est.
E
T
H
I
CAL AP
P
RO
V
AL
T
h
is
ar
ticle
d
o
es
n
o
t
co
n
tain
an
y
s
tu
d
ies
with
h
u
m
an
p
ar
ticip
an
ts
o
r
a
n
im
als
p
er
f
o
r
m
ed
b
y
th
e
au
th
o
r
.
DATA AV
AI
L
AB
I
L
I
T
Y
T
h
e
d
atasets
u
s
ed
an
d
/o
r
a
n
a
ly
ze
d
d
u
r
in
g
th
e
c
u
r
r
e
n
t
s
tu
d
y
ar
e
av
ailab
le
f
r
o
m
th
e
co
r
r
esp
o
n
d
in
g
au
th
o
r
o
n
r
ea
s
o
n
ab
le
r
e
q
u
est.
RE
F
E
R
E
NC
E
S
[
1
]
D
.
B
.
M
o
h
a
n
K
u
m
a
r
,
“
U
si
n
g
b
l
o
c
k
c
h
a
i
n
t
e
c
h
n
o
l
o
g
y
f
o
r
s
u
st
a
i
n
a
b
l
e
f
i
n
a
n
c
e
r
e
p
o
r
t
i
n
g
,
”
Ed
u
c
a
t
i
o
n
a
l
A
d
m
i
n
i
s
t
r
a
t
i
o
n
T
h
e
o
r
y
a
n
d
Pra
c
t
i
c
e
,
p
p
.
1
1
8
2
–
1
1
8
7
,
M
a
y
2
0
2
4
,
d
o
i
:
1
0
.
5
3
5
5
5
/
k
u
e
y
.
v
3
0
i
6
.
5
4
6
2
.
[
2
]
A
.
Q
u
z
m
a
r
,
S
.
A
l
ma
a
i
t
a
h
,
a
n
d
M
.
Q
a
t
a
w
n
e
h
,
“
A
b
l
o
c
k
c
h
a
i
n
-
b
a
s
e
d
s
y
st
e
m
f
o
r
p
r
e
v
e
n
t
i
n
g
d
r
u
g
c
o
u
n
t
e
r
f
e
i
t
,
”
J
o
u
rn
a
l
o
f
T
h
e
o
re
t
i
c
a
l
a
n
d
Ap
p
l
i
e
d
I
n
f
o
rm
a
t
i
o
n
T
e
c
h
n
o
l
o
g
y
,
v
o
l
.
1
0
0
,
n
o
.
6
,
p
p
.
1
6
1
5
–
1
6
2
7
,
2
0
2
2
.
[
3
]
F
.
C
a
si
n
o
,
T
.
K
.
D
a
sa
k
l
i
s,
a
n
d
C
.
P
a
t
sa
k
i
s,
“
A
sy
s
t
e
m
a
t
i
c
l
i
t
e
r
a
t
u
r
e
r
e
v
i
e
w
o
f
b
l
o
c
k
c
h
a
i
n
-
b
a
se
d
a
p
p
l
i
c
a
t
i
o
n
s
:
C
u
r
r
e
n
t
s
t
a
t
u
s
,
c
l
a
ss
i
f
i
c
a
t
i
o
n
a
n
d
o
p
e
n
i
ss
u
e
s,
”
T
e
l
e
m
a
t
i
c
s
a
n
d
I
n
f
o
rm
a
t
i
c
s
,
v
o
l
.
3
6
,
p
p
.
5
5
–
8
1
,
M
a
r
.
2
0
1
9
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
t
e
l
e
.
2
0
1
8
.
1
1
.
0
0
6
.
[
4
]
M
.
A
l
t
a
r
a
w
n
e
h
,
M
.
Q
a
t
a
w
n
e
h
,
a
n
d
W
.
A
l
m
o
b
a
i
d
e
e
n
,
“
O
v
e
r
v
i
e
w
o
f
a
p
p
l
i
e
d
d
a
t
a
a
n
a
l
y
t
i
c
m
e
c
h
a
n
i
sms
a
n
d
a
p
p
r
o
a
c
h
e
s
u
si
n
g
pe
r
mi
ssi
o
n
e
d
b
l
o
c
k
c
h
a
i
n
s
,
”
I
n
t
e
r
n
a
t
i
o
n
a
l
J
o
u
rn
a
l
o
n
Ad
v
a
n
c
e
d
S
c
i
e
n
c
e
,
E
n
g
i
n
e
e
r
i
n
g
a
n
d
I
n
f
o
rm
a
t
i
o
n
T
e
c
h
n
o
l
o
g
y
,
v
o
l
.
1
2
,
n
o
.
1
,
p
p
.
4
2
–
5
2
,
Ja
n
.
2
0
2
2
,
d
o
i
:
1
0
.
1
8
5
1
7
/
i
j
a
sei
t
.
1
2
.
1
.
1
2
8
2
7
.
[
5
]
S
.
L
g
a
r
c
h
,
M
.
H
n
i
d
a
,
a
n
d
A
.
R
e
t
b
i
,
“
Emp
o
w
e
r
i
n
g
E
-
l
e
a
r
n
i
n
g
t
h
r
o
u
g
h
b
l
o
c
k
c
h
a
i
n
:
a
n
i
n
c
l
u
si
v
e
a
n
d
a
f
f
o
r
d
a
b
l
e
t
u
t
o
r
i
n
g
s
o
l
u
t
i
o
n
,
”
I
n
t
e
r
n
a
t
i
o
n
a
l
J
o
u
rn
a
l
o
f
El
e
c
t
ri
c
a
l
a
n
d
C
o
m
p
u
t
e
r
En
g
i
n
e
e
ri
n
g
,
v
o
l
.
1
4
,
n
o
.
5
,
p
p
.
5
5
5
4
–
5
5
6
5
,
O
c
t
.
2
0
2
4
,
d
o
i
:
1
0
.
1
1
5
9
1
/
i
j
e
c
e
.
v
1
4
i
5
.
p
p
5
5
5
4
-
5
5
6
5
.
[
6
]
M
.
A
.
A
l
h
i
j
a
,
O
.
A
l
-
B
a
i
k
,
A
.
H
u
ss
e
i
n
,
a
n
d
H
.
A
b
d
e
l
j
a
b
e
r
,
“
O
p
t
i
m
i
z
i
n
g
b
l
o
c
k
c
h
a
i
n
f
o
r
h
e
a
l
t
h
c
a
r
e
I
o
T:
a
p
r
a
c
t
i
c
a
l
g
u
i
d
e
t
o
n
a
v
i
g
a
t
i
n
g
s
c
a
l
a
b
i
l
i
t
y
,
p
r
i
v
a
c
y
,
a
n
d
e
f
f
i
c
i
e
n
c
y
t
r
a
d
e
-
o
f
f
s,”
I
n
d
o
n
e
si
a
n
J
o
u
rn
a
l
o
f
E
l
e
c
t
r
i
c
a
l
E
n
g
i
n
e
e
r
i
n
g
a
n
d
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
,
v
o
l
.
3
5
,
n
o
.
3
,
p
p
.
1
7
7
3
–
1
7
8
5
,
S
e
p
.
2
0
2
4
,
d
o
i
:
1
0
.
1
1
5
9
1
/
i
j
e
e
c
s
.
v
3
5
.
i
3
.
p
p
1
7
7
3
-
1
7
8
5
.
[
7
]
S
.
N
a
k
a
m
o
t
o
,
“
B
i
t
c
o
i
n
:
A
p
e
e
r
-
to
-
p
e
e
r
e
l
e
c
t
r
o
n
i
c
c
a
sh
sy
s
t
e
m
,
”
2
0
0
8
.
[
8
]
M
.
C
o
n
t
i
,
K
.
E.
S
a
n
d
e
e
p
,
C
.
La
l
,
a
n
d
S
.
R
u
j
,
“
A
su
r
v
e
y
o
n
se
c
u
r
i
t
y
a
n
d
p
r
i
v
a
c
y
i
ss
u
e
s
o
f
b
i
t
c
o
i
n
,
”
I
E
EE
C
o
m
m
u
n
i
c
a
t
i
o
n
s S
u
r
v
e
y
s
a
n
d
T
u
t
o
r
i
a
l
s
,
v
o
l
.
2
0
,
n
o
.
4
,
p
p
.
3
4
1
6
–
3
4
5
2
,
2
0
1
8
,
d
o
i
:
1
0
.
1
1
0
9
/
C
O
M
S
T.
2
0
1
8
.
2
8
4
2
4
6
0
.
[
9
]
A
.
P
a
r
k
a
n
d
H
.
L
i
,
“
T
h
e
e
f
f
e
c
t
o
f
b
l
o
c
k
c
h
a
i
n
t
e
c
h
n
o
l
o
g
y
o
n
s
u
p
p
l
y
c
h
a
i
n
s
u
st
a
i
n
a
b
i
l
i
t
y
p
e
r
f
o
r
ma
n
c
e
s
,
”
S
u
s
t
a
i
n
a
b
i
l
i
t
y
(
S
w
i
t
zer
l
a
n
d
)
,
v
o
l
.
1
3
,
n
o
.
4
,
p
p
.
1
–
1
8
,
F
e
b
.
2
0
2
1
,
d
o
i
:
1
0
.
3
3
9
0
/
s
u
1
3
0
4
1
7
2
6
.
[
1
0
]
M
.
K
.
L
i
m,
Y
.
L
i
,
C
.
W
a
n
g
,
a
n
d
M
.
L.
Tse
n
g
,
“
A
l
i
t
e
r
a
t
u
r
e
r
e
v
i
e
w
o
f
b
l
o
c
k
c
h
a
i
n
t
e
c
h
n
o
l
o
g
y
a
p
p
l
i
c
a
t
i
o
n
s
i
n
su
p
p
l
y
c
h
a
i
n
s
:
A
c
o
m
p
r
e
h
e
n
si
v
e
a
n
a
l
y
si
s
o
f
t
h
e
m
e
s,
met
h
o
d
o
l
o
g
i
e
s
a
n
d
i
n
d
u
s
t
r
i
e
s,”
C
o
m
p
u
t
e
rs
a
n
d
I
n
d
u
s
t
ri
a
l
En
g
i
n
e
e
ri
n
g
,
v
o
l
.
1
5
4
,
p
.
1
0
7
1
3
3
,
A
p
r
.
2
0
2
1
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
c
i
e
.
2
0
2
1
.
1
0
7
1
3
3
.
[
1
1
]
L.
A
n
t
e
a
n
d
I
.
F
i
e
d
l
e
r
,
“
Th
e
n
e
w
d
i
g
i
t
a
l
e
c
o
n
o
m
y
:
H
o
w
d
e
c
e
n
t
r
a
l
i
z
e
d
f
i
n
a
n
c
e
(
D
e
F
i
)
a
n
d
n
o
n
-
f
u
n
g
i
b
l
e
t
o
k
e
n
s
(
N
F
Ts)
a
r
e
t
r
a
n
sf
o
r
mi
n
g
v
a
l
u
e
c
r
e
a
t
i
o
n
,
o
w
n
e
r
sh
i
p
mo
d
e
l
s,
a
n
d
e
c
o
n
o
m
i
c
s
y
st
e
ms,
”
D
i
g
i
t
a
l
Bu
s
i
n
e
ss
,
v
o
l
.
5
,
n
o
.
1
,
p
.
1
0
0
0
9
4
,
Ju
n
.
2
0
2
4
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
d
i
g
b
u
s.
2
0
2
4
.
1
0
0
0
9
4
.
[
1
2
]
D
.
A
.
S
n
e
g
i
r
e
v
a
,
“
R
e
v
i
e
w
o
f
mo
d
e
r
n
v
u
l
n
e
r
a
b
i
l
i
t
i
e
s
i
n
b
l
o
c
k
c
h
a
i
n
s
y
st
e
ms,”
i
n
Pr
o
c
e
e
d
i
n
g
s
o
f
t
h
e
2
0
2
1
I
E
EE
I
n
t
e
r
n
a
t
i
o
n
a
l
C
o
n
f
e
re
n
c
e
“
Q
u
a
l
i
t
y
M
a
n
a
g
e
m
e
n
t
,
T
ra
n
s
p
o
rt
a
n
d
I
n
f
o
rm
a
t
i
o
n
S
e
c
u
r
i
t
y
,
I
n
f
o
rm
a
t
i
o
n
T
e
c
h
n
o
l
o
g
i
e
s”
,
T
a
n
d
Q
M
a
n
d
I
S
2
0
2
1
,
S
e
p
.
2
0
2
1
,
p
p
.
1
1
7
–
1
2
1
,
d
o
i
:
1
0
.
1
1
0
9
/
I
TQ
M
I
S
5
3
2
9
2
.
2
0
2
1
.
9
6
4
2
8
6
2
.
[
1
3
]
N
.
A
t
z
e
i
,
M
.
B
a
r
t
o
l
e
t
t
i
,
a
n
d
T.
C
i
m
o
l
i
,
“
A
su
r
v
e
y
o
f
a
t
t
a
c
k
s
o
n
e
t
h
e
r
e
u
m
s
mart
c
o
n
t
r
a
c
t
s
(
S
o
K
)
,
”
i
n
L
e
c
t
u
r
e
N
o
t
e
s
i
n
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
(
i
n
c
l
u
d
i
n
g
s
u
b
ser
i
e
s
L
e
c
t
u
re
N
o
t
e
s
i
n
Ar
t
i
f
i
c
i
a
l
I
n
t
e
l
l
i
g
e
n
c
e
a
n
d
L
e
c
t
u
re
N
o
t
e
s
i
n
B
i
o
i
n
f
o
rm
a
t
i
c
s)
,
v
o
l
.
1
0
2
0
4
LN
C
S
,
S
p
r
i
n
g
e
r
B
e
r
l
i
n
H
e
i
d
e
l
b
e
r
g
,
2
0
1
7
,
p
p
.
1
6
4
–
1
8
6
.
[
1
4
]
J.
B
o
n
n
e
a
u
,
A
.
M
i
l
l
e
r
,
J.
C
l
a
r
k
,
A
.
N
a
r
a
y
a
n
a
n
,
J
.
A
.
K
r
o
l
l
,
a
n
d
E.
W
.
F
e
l
t
e
n
,
“
S
o
K
:
R
e
sea
r
c
h
p
e
r
s
p
e
c
t
i
v
e
s
a
n
d
c
h
a
l
l
e
n
g
e
s
f
o
r
b
i
t
c
o
i
n
a
n
d
c
r
y
p
t
o
c
u
r
r
e
n
c
i
e
s
,
”
i
n
Pro
c
e
e
d
i
n
g
s
-
I
EEE
S
y
m
p
o
s
i
u
m
o
n
S
e
c
u
ri
t
y
a
n
d
Pri
v
a
c
y
,
M
a
y
2
0
1
5
,
v
o
l
.
2
0
1
5
-
Ju
l
y
,
p
p
.
1
0
4
–
1
2
1
,
d
o
i
:
1
0
.
1
1
0
9
/
S
P
.
2
0
1
5
.
1
4
.
[
1
5
]
J.
G
a
r
a
y
,
A
.
K
i
a
y
i
a
s,
a
n
d
N
.
Le
o
n
a
r
d
o
s,
“
T
h
e
B
i
t
c
o
i
n
b
a
c
k
b
o
n
e
p
r
o
t
o
c
o
l
:
a
n
a
l
y
s
i
s
a
n
d
a
p
p
l
i
c
a
t
i
o
n
s,
”
i
n
L
e
c
t
u
re
N
o
t
e
s
i
n
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
(
i
n
c
l
u
d
i
n
g
su
b
s
e
ri
e
s
L
e
c
t
u
re
N
o
t
e
s
i
n
Ar
t
i
f
i
c
i
a
l
I
n
t
e
l
l
i
g
e
n
c
e
a
n
d
L
e
c
t
u
r
e
N
o
t
e
s
i
n
B
i
o
i
n
f
o
rm
a
t
i
c
s)
,
v
o
l
.
9
0
5
7
,
S
p
r
i
n
g
e
r
B
e
r
l
i
n
H
e
i
d
e
l
b
e
r
g
,
2
0
1
5
,
p
p
.
2
8
1
–
3
1
0
.
[
1
6
]
Z.
W
a
n
g
,
Q
.
C
h
e
n
,
a
n
d
L
.
Li
u
,
“
P
e
r
mi
ssi
o
n
e
d
b
l
o
c
k
c
h
a
i
n
-
b
a
se
d
se
c
u
r
e
a
n
d
p
r
i
v
a
c
y
-
p
r
e
serv
i
n
g
d
a
t
a
s
h
a
r
i
n
g
p
r
o
t
o
c
o
l
,
”
I
EEE
I
n
t
e
r
n
e
t
o
f
T
h
i
n
g
s
J
o
u
r
n
a
l
,
v
o
l
.
1
0
,
n
o
.
1
2
,
p
p
.
1
0
6
9
8
–
1
0
7
0
7
,
Ju
n
.
2
0
2
3
,
d
o
i
:
1
0
.
1
1
0
9
/
JI
O
T.
2
0
2
3
.
3
2
4
2
9
5
9
.
[
1
7
]
A
.
K
.
S
i
n
g
h
a
n
d
V
.
R
.
P
.
K
u
mar,
“
A
n
a
l
y
z
i
n
g
t
h
e
b
a
r
r
i
e
r
s
f
o
r
b
l
o
c
k
c
h
a
i
n
-
e
n
a
b
l
e
d
B
I
M
a
d
o
p
t
i
o
n
i
n
f
a
c
i
l
i
t
y
man
a
g
e
me
n
t
u
s
i
n
g
b
e
s
t
-
w
o
r
st
m
e
t
h
o
d
a
p
p
r
o
a
c
h
,
”
B
u
i
l
t
En
v
i
r
o
n
m
e
n
t
Pro
j
e
c
t
a
n
d
Ass
e
t
M
a
n
a
g
e
m
e
n
t
,
v
o
l
.
1
4
,
n
o
.
2
,
p
p
.
1
6
4
–
1
8
3
,
D
e
c
.
2
0
2
4
,
d
o
i
:
1
0
.
1
1
0
8
/
B
EPA
M
-
04
-
2
0
2
3
-
0
0
8
0
.
Evaluation Warning : The document was created with Spire.PDF for Python.