-
Notifications
You must be signed in to change notification settings - Fork 0
/
analysis.txt
10 lines (7 loc) · 1.67 KB
/
analysis.txt
1
2
3
4
5
6
7
8
9
10
Jung (James) Kim
Luc Nguyen
Ricardo Barrera
Richard Rice
Ethereum Roulette brings forth the traditional game of Russian roulette for the millennial generation to enjoy with convenience. Instead of tragedy as an outcome, Ethereum Roulette is an exciting and dignified way to win crypto-currency fast!
In the implementation, our program is initialized by placing the ‘bullet’ one of the six empty barrels possible in the gun. Two players alternate, shooting themselves, hoping that their trigger does not fire the bullet. If the bullet is fired, the struck player loses the current round and must give 5000 sub-currency to the other player. Else, the player hands the gun to the opponent for them to fire. Thus, the cycle repeats until one player either forfeits out of the game, or play until their sub-currency funds run out.
There were potential security concerns that had to be handled upon the completion of Ethereum Roulette. One major concern upon implementing our code was a possoible buffer overflow attack, as we initially aimed to develop our program with the ethereum cpp client (cpp-ethereum). With numerous user input that exists on the program, it allows potential attackers to provide input that would overflow malicious lines of executable code into the device’s adjacent memory. This was handled by deciding to develop the ethereum project not on the cpp-ethereum platform, but its python counterpart, Pyethereum. Buffer overflow attacks, as the attacks mainly rely on access on memory and ambiguous data types. As python utilizes an interpreter as well as fixating data types automatically, and having no direct access to memory, it is inherently safe from buffer overflow attacks.