<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>How to Approach Security Testing of Web 3.0 Solutions: A Review of Existing Knowledge</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Nika Jeršič</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Muhamed Turkanović</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tina Beranič</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Maribor, The Faculty of Electrical Engineering and Computer Science</institution>
          ,
          <addr-line>Koroška cesta 46, 2000 Maribor</addr-line>
          ,
          <country country="SI">Slovenia</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Despite its promising advancements, Web 3.0 solutions still encounter significant challenges, particularly in the realm of software testing and security testing. This paper introduces a literature review of existing research in the fields of Web 3.0 technologies and security testing. We found there is little research on the connection between these fields. Most security research in Web 3.0 is focused on smart contracts and network attacks, like Denial-of-Service (DoS). Our analysis identifies significant trends, attacks and mitigations in overlapping topics within the current body of research. Understanding these challenges is crucial for ensuring the reliability and security of Web 3.0 solutions as they become more integrated into mainstream technology.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Security testing</kwd>
        <kwd>Web 3</kwd>
        <kwd>0</kwd>
        <kwd>Blockchain</kwd>
        <kwd>Quality assurance</kwd>
        <kwd>Smart contracts</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Security testing in the quality assurance (QA) domain is one of the first steps in ensuring a robust
and safe system. The systematic security approaches ensure that products meet or exceed customer
expectations and that the implementation satisfies the requirements. It rigorously tests various processes
to achieve the desired goals, including design, development, and evaluation of the system [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. In the
rapidly evolving landscape of technology, Web 3.0 stands out as the next major evolution, often referred
to as the decentralized web. Unlike its predecessors, Web 1.0 (static web) and Web 2.0 (dynamic and
social web), Web 3.0 aims to provide a more autonomous and secure digital environment by leveraging
advanced technologies such as blockchain, semantic web, and artificial intelligence [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ]. This evolution
promises enhanced user privacy, data ownership, and interoperability, making significant shifts towards
a user-centric internet.
      </p>
      <p>One of the key promises of Web 3.0 is improved security. Blockchain technology ensures that there is
no single point of failure, reducing the risk of centralized attacks. However, not everything is so simple.
Decentralized applications (dApps), smart contracts, and other Web 3.0 solutions have their unique
security challenges. Smart contracts, for example, can be vulnerable to bugs in the code, which can
be exploited by malicious actors. Similarly, decentralized applications can be targeted by attacks that
exploit flaws in protocols or implementations.</p>
      <p>Ensuring the robustness and security of Web 3.0 applications is crucial, given their complex and
decentralized nature, which introduces new challenges in the area of security and reliability, requiring
more advanced QA methodologies. Traditional security testing practices may not be suficient to meet
these challenges, and it is imperative to innovate and adapt these strategies to the unique requirements
of decentralized systems. Therefore, incorporating rigorous security testing methodologies is essential
to bridge the research gaps and achieve the desired goals of a secure and reliable decentralized web.</p>
      <p>Despite promises of security and anonymity, security testing in the context of Web 3.0 is an
underresearched area. This represents an important research gap, as many security challenges remain
unrecognized and unaddressed.</p>
      <p>The goal of our research is to provide a comprehensive analysis of the current state of security testing
in Web 3.0. Our research will answer the following research questions:
RQ1: What are the common security vulnerabilities in Web 3.0 technologies, and what types of security
vulnerabilities are most frequently mentioned in existing research?
RQ2: What methods and techniques are currently used for security testing in Web 3.0 technologies?
RQ3: What are the specific QA strategies applied to Web 3.0 security testing?
RQ4: What are the challenges and gaps in current research on Web 3.0 security testing and QA?</p>
      <p>With this paper, we want to contribute to the discussion about a potential research gap in the field
of QA, focusing on security testing, within Web 3.0 technologies. For our research, we conducted a
literature review to find existing research on this topic. We intend to identify and address these gaps to
lay the groundwork for future research and development in creating more secure and reliable Web 3.0
applications for all users. With greater emphasis on security testing and closer cooperation between all
involved, we can achieve significant improvements in the security of Web 3.0 technologies. With this
article, we want to encourage the community to actively tackle these challenges and lay the foundations
for a safer digital future.</p>
      <p>The rest of the paper is structured as follows. In the second chapter we present the general background
on Web 3.0, QA and security testing. In chapter three, we present the current state of existing articles in
four digital libraries. The fourth chapter describes results from reviewing diferent articles on researched
topic. In chapter five, we focus on answering our research question within a discussion and present key
insights. And finally, in chapter six, we conclude our paper and discuss further research.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Web 3.0 and security testing</title>
      <p>
        2.1. Web 3.0
As claimed in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], a common synonym for Web 3.0 and the enthusiasm for Web 3.0 technologies is the
decentralization. As an infrastructure, the Web 3.0 is not only decentralization, there are many more
components, that make Web 3.0 the new future infrastructure of the Internet [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        One such component is blockchain technology, which eliminates the need for trusted third parties
through a consensus mechanism [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. It is made of cryptographically secured and linked records, known
as blocks, that are resilient to single points of failure, utilizing a peer-to-peer protocol. This mechanism
ensures a shared sequence of transactions and blocks, while preserving the integrity and consistency
across globally distributed nodes [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. By design, main blockchain components are decentralization,
integrity and auditability. Decentralization refers to the process of dispersing power, control and
decision-making from one central place to numerous independent and equal entities. In the context
of web technologies, this means a shift from the current situation, where most content and user data
on the web is controlled by a few large technology companies, to a system where control is evenly
distributed among all internet users. Successful decentralization of the web requires new technologies
and protocols that allow secure use of the web without the need to trust individual centralized entities
[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        Additionally, smart contracts are another vital component of the Web 3.0 ecosystem. These are
programs that automate and enforce agreements between parties without the need for intermediaries
[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Their importance and potential vulnerability make them the subject of in-depth security scrutiny,
while other components of the Web 3.0 ecosystem, such as user interfaces, APIs and infrastructure, are
often neglected. A one-sided focus can also be risky, as potential weaknesses in these components can
afect the overall security posture of the system [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <sec id="sec-2-1">
        <title>2.2. Security testing within QA</title>
        <p>Testing in the context of QA primarily evaluates, how software satisfies requirements, quality and
expectations of customers.</p>
        <p>
          It is divided into functional testing and non-functional testing. Functional testing is usually performed
before releases and makes sure all tests pass before a new build release. Non-functional testing,
performed during the development phase, evaluates aspects such as performance, usability, reliability,
and scalability [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
        </p>
        <p>
          Security testing ensures that software and systems efectively protect sensitive information and
data from security vulnerabilities. Security testing techniques, such as risk-based testing and
modelbased security testing, help in identifying vulnerabilities that could be exploited by malicious actors.
Along with the high level of security required for their global functioning, thorough security testing is
necessary to ensure robustness and reliability. This proactive approach allows for the mitigation of
potential security risks before they are exploited [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. The current state of existing research</title>
      <p>To understand the current state of ensuring quality and security of Web 3.0, we conducted a thorough
literature review. We searched across multiple digital libraries, including IEEE Xplore, ACM Digital
Library, ScienceDirect, and SpringerLink, to ensure a comprehensive collection of relevant literature.
Our goal was to explore various research papers connecting Web 3.0 with security testing within QA.
To achieve this, we utilized diferent search strings to find research. These search strings are presented
and discussed in table 1.</p>
      <p>Description
This basic search string was used to find
general information on only QA in the
context of Web 3.0 technologies.</p>
      <p>This search string is a variant of search
string 1, where we look to see if we can
find more results if our keywords are
written in diferent formats.</p>
      <p>Our research paper also looks at security
testing in the context of Web 3.0.
Therefore, we searched with a more specific
search string, adding keywords about
security.</p>
      <p>To include quality assurance, we used an
even more specific search string that
combines security aspects and quality
assurance in the context of Web 3.0
technologies. This search string was used to obtain
a more comprehensive overview of
information on quality assurance and security
analysis in Web 3.0 technologies.</p>
      <p>To ensure that the papers included in the research show the actual current state of the existing
research on this topic, we introduced inclusion and exclusion criteria to the literature review. Studies
were included if they:
• are written in English language,
• are academic journals or conference papers,
• are applied to our research string keywords,
• fall under Computer science, Engineering or Informatics, in the subject areas
Studies were not included in the research, if they:
• are not accessible through the university network,
• are books (except proceeding books),
• are not applied to our keywords in search strings.</p>
      <p>We decided to include only English literature, because English is the most widely used language
in scientific and academic literature, ensuring wide accessibility and visibility of research. We avoid
translation and interpretation problems that could afect the accuracy of the analysis. Academic journals
and conference papers are peer-reviewed to ensure high quality information. These sources are credible
and properly checked, which is crucial for scientific research. The use of keywords specific to our
research ensures that the sources chosen are directly related. This increases the relevance and accuracy
of our findings and allows for a deeper understanding of specific issues. We decided not to review
books for several reasons. Firstly, books often contain extensive and general information that is not
always directly relevant to our specific research topic. Finding relevant information in books would
require significantly more time and efort compared to reviewing articles, which are usually more
focused on specific research questions. Secondly, articles in scientific journals are often more up-to-date
and include the latest research and data, which is crucial for our analysis. In addition, the articles are
peer-reviewed and thus provide a higher level of scientific credibility. Our analysis focuses on the latest
trends and data, so we have decided to limit our search to scientific articles in digital libraries.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Results</title>
      <p>In this section, we present the results of the literature review, focusing on the intersection of Web
3.0 technologies and security testing. Table 2 below presents the results of defined query searches,
illustrating the number of articles and papers available in each database for the specified queries, before
and after applying inclusion and exclusion criteria. We performed a thorough analysis of the articles, on
the basis of which we identified several specific trends. These trends are presented in more detail in the
tables 3 and 4 that highlight the frequency and overlap of diferent themes in the reviewed literature.</p>
      <p>As can be seen in table 2, for search string 3, we found that the number of articles would be too
large for a detailed analysis, so we had to apply additional criteria to limit the number of results and
examined the only first 100 results of search results. In addition, for all search strings, we found that
most of the articles are related to other fields where the data or records were in a blockchain system,
which was not relevant for our study. We also noticed that many articles were repetitive, especially
within the same digital libraries, which further reduced the number of relevant articles for our analysis.
The total number of articles used in this analysis is 9. It is also important to note that the criteria for
inclusion were very specific and strict. These strict criteria resulted in a reduction in the number of
ifnal articles, which in turn means that these articles are more targeted and relevant to our research. In
this way, we have ensured that our analysis is based on the most relevant and high-quality sources,
which is essential for the credibility and usefulness of our findings.</p>
      <sec id="sec-4-1">
        <title>4.1. The analysis</title>
        <p>When analyzing the articles from the right side of table 2, in the column Number of results after
including criteria, we noticed specific trends when connecting Web 3.0 technologies, QA and security
testing. These trends are presented in table 3, where we look at where specific topics appear in several
papers and table 4, where we look at overlapping topics, and where they appear.</p>
        <p>Table 3 shows the frequency of individual topics related to security testing in Web 3.0 technologies.
In particular, the topic of smart contracts appears namely five times in diferent sources. Where the
topic of security vulnerabilities appears six times in diferent sources. Blockchain technology is also
prominent, appearing in four articles. These highlight the strong emphasis on vulnerabilities in smart
contracts and blockchain technology within Web 3.0 security testing.</p>
        <p>In addition, in table 4 overlapping areas are presented, where certain topics are discussed
simultaneously in several articles. For example, the overlap between smart contracts and security vulnerabilities
is noticeable in two sources [15], [16], indicating a critical area of concern for researchers. Another
significant overlap is observed between smart contracts, security vulnerabilities, and blockchain, which
is covered in three sources. This suggests that while smart contracts are a pivotal component of Web
3.0, their security remains a significant challenge, necessitating focused research eforts to identify and
mitigate vulnerabilities.</p>
        <p>To further elaborate, we analyzed the security vulnerabilities and attacks in Web 3.0 technologies.
Table 5 shows each vulnerability and attack and the sources in which they are discussed. The studies
propose suggestions to mitigate the risks, such as regular software updates, the use of static and dynamic
code analysis tools, the implementation of software development security cycles, stronger security
configurations and the use of Security Information and Event Management (SIEM) systems.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Analyzing individual papers</title>
        <p>From our analysis, we can see when security testing is carried out in Web 3.0 technologies, it is often
focused on smart contracts. Despite their benefits, smart contracts are vulnerable to several security
risks, such as Reentrancy, Denial-of-Service, Timestamp Dependence and Mishandled Exception [15].
A study conducted by Huang et al. [16] presents a deeper analysis where they categorize the most
common smart contract security vulnerabilities into three diferent causes, Solidity language, blockchain
platform and misunderstanding of common practices.</p>
        <p>
          The second most popular topic when connecting security within Web 3.0 technologies is blockchain.
Alfaw et al. [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] discuss several critical aspects of blockchain technology and its security challenges,
mostly focusing on the lack of central authority and the role of cryptography in ensuring security
and privacy. It highlights the necessary security attributes for blockchain systems and classifies
various security threats and vulnerabilities into categories such as client vulnerabilities, consensus
mechanism vulnerabilities, mining pool vulnerabilities, network vulnerabilities, and smart contract
vulnerabilities, with examples including digital signature vulnerabilities, mining malware, and smart
contract vulnerabilities. Additionally, the paper addresses the need for secure design and deployment of
smart contracts to prevent security breaches and reviews security solutions such as digital signatures,
zero-knowledge proofs, and attribute-based encryption, while also highlighting sector-specific solutions
for healthcare and transaction sectors.
        </p>
        <p>Shen et al. [21] proposed a QA framework, based on blockchain. This paper can illustrate that
blockchain in relation to QA is usually a tool or technology to perform QA, rather than as a research
area where QA would be performed on the blockchain or in general, Web 3.0 technologies. Similar
to this paper, Li et. al [12] focuses on QA and data security in smart grids with usage of blockchain,
before adding data on a decentralized storage. The paper also analyzes security threats and proposes
mechanisms to handle them, such as validating transactions and using smart contracts.</p>
        <p>
          Also focusing more on the human factor, the study by Xiang et al. [22] presented how developers
working on DeFi (Decentralized Finance) projects respond to attacks during the development process.
They found that the state of the developers’ response to attacks is barely reaching minimal standards.
Furthermore, they found that a lot of attacks could be prevented with the proper configuration.
Additionally, Liu et al. [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] report that developers frequently enhance transaction-reverting statements
alternative history attack
finney attack
block withholding attack
bribery attack
selfish mining attack
pool hopping attack
fork after withholding attack
delay attack
replay attack
sybil attack
DDoS attack
transaction malleability attack
timejacking attack
cryptojacking attack
implement escape hatches
checks-efects-interactions pattern,
Oyente tool
stronger consensus mechanisms
implement time delays
ensure prompt block broadcasting
strict anti-bribery rules
increase attack threshold, random
nodes
design reward systems to
discourage hopping
detect and penalize block
withholding
ensure rapid transaction
propagation
unique transaction signatures
robust identity verification
fee-based and age-based mempool
management
unique transaction identifiers
synchronize network time
detection and prevention
mechanisms
        </p>
        <p>Vulnerability/Attack Mitigation Strategy
digital signature vulnerability stronger randomization techniques
user addresses vulnerability identity verification and secure
pro</p>
        <p>tocols
delegate call vulnerability avoid using delegate call with
un</p>
        <p>trusted contracts
block-hash vulnerability avoid using block hashes as
ran</p>
        <p>domness
hash function vulnerability use resistant hash functions
timestamp dependency vulnerabil- avoid using block timestamps
ity
transaction ordering dependency fair transaction ordering
mecha(TOD) vulnerability nisms
arithmetic underflow/overflow vul- use safe math libraries
nerability
freezing ether vulnerability
reentrancy attack
by adding clauses, variables, or new transaction-reverting statements, which are primarily used for
range and logic checks. These statements are typically used for seven types of authority verifications or
validity checks and are often customized in template contracts.</p>
        <p>
          As a countermeasure to attacks, the study presented by Kushwaha et al. [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] presents security checks,
which are crucial to ensure the integrity and security of these technologies. Furthermore, Cha et al. [13]
introduced a holistic approach to managing security risks in blockchain applications. The proposed
framework for permissioned blockchain applications maps its controls to existing security guidelines
and standards, such as ISO/IEC 27001. This paper also emphasizes the growing need for security risks
management framework for permissioned blockchains. In his paper, Monev [14] aims to fill gaps in
existing literature by establishing foundational information security goals vital for the secure operation
and development of blockchain solutions. It proposes a baseline of nine information security goals for
blockchain solutions:
• Accountability, which establishes an unambiguous link between people’s responsibility and
electronic identity and ensures that participants are reasonably accountable for their actions.
• Auditability, which ensures that data, systems, software or other elements are reasonably auditable;
Nonrepudiation, which ensures that the entity that caused the event cannot deny that the event
occurred.
• Authenticity, which confirms that the entity is who it claims to be.
• Availability, which ensures that data is accessible at a predetermined time and speed.
• Confidentiality, which protects data so that it is available only to those for whom it is intended.
• Integrity, which ensures that data is modified as intended and designed.
• Privacy, which allows individuals to choose what private information to share and with whom,
which is done with reasonable control.
        </p>
        <p>• Reliability, which ensures that the system consistently delivers the intended behavior and results.</p>
        <p>These goals are intended to improve the security framework for blockchain solutions and to provide
a comprehensive approach to protecting data and maintaining the reliability of blockchain systems.</p>
        <p>In several articles, as the tables 3 and 5 show, we notice that there is a lot of discussion about
vulnerabilities in Web 3.0 technologies and how important it is to take care of security. In table 3 we
see that topics such as "security vulnerabilities" and "smart contracts" are frequently discussed. This
shows the great interest of researchers in identifying security risks. However, only a few articles focus
on strategies to prevent these vulnerabilities and attacks. For example, vulnerabilities such as "digital
signature vulnerability" and "delegate call vulnerability" are mentioned, but the proposed strategies to
prevent them are less often discussed.</p>
        <p>
          In addition, the table 4 shows articles, such as [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] and [12], cover multiple areas that include both
vulnerabilities and security strategies. This highlights the need for more in-depth research that not
only identifies vulnerabilities, but also suggests concrete measures to prevent them. Thus, it would be
useful for future research to also include concrete measures and methods to protect against known
security threats, thereby contributing to a more comprehensive understanding and management of
security risks in Web 3.0.
        </p>
        <p>Table 6 presents key findings of research gaps between QA and Web 3.0. The most important finding
was a lack of research addressing QA as a research area in its own right in the context of Web 3.0
technologies. Searching for the keywords ("Quality Assurance" AND "Web 3.0") in the table 2
showed that there is either a research gap in this area or no clear distinction between traditional QA
approaches and those specific to Web 3.0 technologies. At the moment, it is not clear whether the lack
of diferences between QA in traditional and Web 3.0 environments is due to the lack of hits in digital
libraries, or whether there is in fact a research gap that has not been addressed yet. This suggests the
need for further research to clarify whether existing QA methods need to be adapted for use in Web 3.0
or whether this is an undiscovered research area.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Discussion</title>
      <p>The analysis, referencing our RQ1, revealed several common security vulnerabilities of Web 3.0
technologies. Among the most frequently mentioned are vulnerabilities in smart contracts and blockchain
technology. Specific vulnerabilities, that are also presented in 5 include digital signature vulnerability,
delegate call vulnerability, block hash vulnerability, hash function vulnerability, replay vulnerability,
and timestamp dependency vulnerability. These vulnerabilities are critical because of the potential
to compromise the security and functionality of Web 3.0 applications. The frequent mention of these
vulnerabilities in various sources indicates their prevalence and the need for reliable security measures
to eliminate them. For example, replay vulnerability appears in four diferent sources, indicating an
important area of concern for researchers.</p>
      <p>Various methods and techniques, as addressed in RQ2, are used in the security testing of Web 3.0
technologies. Static and dynamic code analysis tools are widely used to detect vulnerabilities in smart
contracts and blockchain applications. In addition, methods such as the checks-efects-interactions
pattern and the use of the Oyente tool are used to mitigate specific attacks such as reentrancy. The studies
also highlight the importance of using secure development practices, such as stronger randomization
techniques, identity verification protocols, and secure math libraries, to increase security. Deploying
security information and event management (SIEM) systems is another key technique for monitoring
and managing security events in real time.</p>
      <p>As explored with RQ3, quality assurance strategies for Web 3.0 security testing are evolving and focus
on preventative and corrective actions. Specific quality assurance strategies include the implementation
of security frameworks adapted to Web 3.0 technologies, the use of robust security checks during the
development process, and the use of audit and non-responsibility principles to ensure accountability
and traceability. However, there is a gap in the literature regarding comprehensive quality assurance
frameworks specifically designed for Web 3.0, as most existing strategies are adapted from traditional
quality assurance approaches without substantial modifications to address the unique challenges of
Web 3.0 environments.</p>
      <p>The analysis, in response to RQ4, revealed several challenges and gaps in current research on Web
3.0 security testing and quality assurance, which is also presented in table 6. A significant challenge is
the lack of comprehensive quality assurance frameworks specifically designed for Web 3.0 technologies.
Although traditional quality assurance strategies are often used, they may not fully address the unique
security challenges presented by Web 3.0 applications. In addition, there is a gap in the development of
new tools and techniques for automated testing of smart contracts and blockchain applications. The
lack of detailed strategies to prevent known vulnerabilities, such as digital signature and delegate call
vulnerabilities, highlights the need for more focused research on mitigation measures. In addition, there
is a lack of tailored quality assurance strategies for diferent application areas such as healthcare and
DeFi, which have specific security and functional requirements.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>Web 3.0 technologies, specifically, blockchain in the context of security testing, are usually focused on
smart contracts and other Web 3.0 solutions. During this study, no articles included security testing
of Web 3.0 as a concept. Blockchain is usually seen as an infrastructure or platform with which QA is
performed, rather than as an object on which to focus specific QA procedures or research. Despite the
fact that terms such as Web 3.0 and QA are well represented in the literature, QA does not seem to be
a major area of research in Web 3.0 context. The role of blockchain in security testing is primarily as a
means to improve QA processes, providing tools and frameworks that improve security and reliability.
However, the human factor remains a critical component, with a need for better training and awareness
among developers to respond efectively to security threats.</p>
      <p>The integration of security testing within Web 3.0 presents both opportunities and challenges. The
analysis reveals that smart contracts and blockchain technologies are at the forefront of security issues.
While smart contracts ofer significant advantages, they are prone to specific vulnerabilities that require
targeted security measures. Blockchain technology, despite its inherent advantages, faces a number of
security threats that require robust cryptographic solutions and secure deployment practices.</p>
      <p>Finally, comprehensive security risk management frameworks and fundamental information security
objectives are essential for the safe development and operation of Web 3.0 technologies. By addressing
these multi-faceted security challenges through technical and human-centered approaches, the potential
of Web 3.0 technologies can be more safely and efectively exploited. Future research should continue
to explore these areas, focusing on developing innovative security solutions and improving existing
frameworks to ensure the resilience and integrity of Web 3.0 systems.</p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgments</title>
      <p>The authors acknowledge financial support from the Slovenian Research and Innovation Agency
(Research Core Funding No. P2-0057).
review paper, 2022 International Conference on Data Analytics for Business and Industry, ICDABI
2022 (2022) 780–786. doi:10.1109/ICDABI56818.2022.10041611.
[12] F. Li, X. Li, Y. Fu, P. Zhao, S. Liu, A secure and privacy preserving incentive mechainism for
vehicular crowdsensing with data quality assurance, IEEE Vehicular Technology Conference
2021-September (2021). doi:10.1109/VTC2021-FALL52928.2021.9625317.
[13] S. C. Cha, C. M. Shiung, G. Y. Lin, Y. H. Hung, A security risk management framework for
permissioned blockchain applications, Institute of Electrical and Electronics Engineers Inc., 2021,
pp. 301–310. doi:10.1109/SmartIoT52359.2021.00055.
[14] V. Monev, Defining and applying information security goals for blockchain technology, 2020
34th International Conference on Information Technologies, InfoTech 2020 - Proceedings (2020).
doi:10.1109/INFOTECH49733.2020.9211073.
[15] E. M. Sifra, Security vulnerabilities and countermeasures of smart contracts: A survey, Proceedings
2022 IEEE International Conference on Blockchain, Blockchain 2022 (2022) 512–515. doi:10.1109/
BLOCKCHAIN55522.2022.00080.
[16] Smart contract security: A software lifecycle perspective, IEEE Access 7 (2019) 150184–150202.</p>
      <p>doi:10.1109/ACCESS.2019.2946988.
[17] S. Shukla, I. Gupta, K. Naresh, Addressing security issues and future prospects of web 3.0, 2022
2nd Asian Conference on Innovation in Technology, ASIANCON 2022 (2022). doi:10.1109/
ASIANCON55314.2022.9908800.
[18] R. Bruwer, H. Jacobus, Web 3.0: Governance, risks and safeguards, 2016.
[19] R. Pise, S. Patil, A deep dive into blockchain-based smart contract-specific security vulnerabilities,
2022 IEEE International Conference on Blockchain and Distributed Systems Security, ICBDS 2022
(2022). doi:10.1109/ICBDS53701.2022.9935949.
[20] E. M. Poleshchuk, I. A. Shcherbinina, S. E. Putilova, Security analysis of smart contracts in
blockchain networks, Proceedings - 2022 Ural Symposium on Biomedical Engineering,
Radioelectronics and Information Technology, USBEREIT 2022 (2022) 252–254. doi:10.1109/
USBEREIT56278.2022.9923336.
[21] X. Shen, C. Xu, L. Zhu, R. Lu, Y. Guan, X. Zhang, Blockchain-based lightweight and
privacypreserving quality assurance framework in crowdsensing systems, IEEE Internet of Things Journal
11 (2024) 974–986. doi:10.1109/JIOT.2023.3288349.
[22] D. Xiang, Y. Lin, L. Nie, Y. Zheng, Z. Xu, Z. Ding, Y. Liu, An empirical study of attack-related
events in defi projects development, Empirical Software Engineering 29 (2024). doi: 10.1007/
s10664-024-10447-7.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Khanjani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Sulaiman</surname>
          </string-name>
          ,
          <source>The Process of Quality Assurance under Open Source Software Development</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Xiang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Xiao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Wen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. C.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <source>Make web3.0 connected, IEEE Transactions on Dependable and Secure Computing</source>
          <volume>19</volume>
          (
          <year>2022</year>
          )
          <fpage>2965</fpage>
          -
          <lpage>2981</lpage>
          . doi:
          <volume>10</volume>
          .1109/ TDSC.
          <year>2021</year>
          .
          <volume>3079315</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>U. W.</given-names>
            <surname>Chohan</surname>
          </string-name>
          ,
          <article-title>Web 3.0: The future architecture of the internet? (</article-title>
          <year>2022</year>
          ). URL: https://ssrn.com/ abstract=4037693.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>C.</given-names>
            <surname>Guan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Ding</surname>
          </string-name>
          , J. Guo,
          <year>Web3</year>
          .
          <article-title>0: A review and research agenda</article-title>
          , Proceedings - 2022
          <source>RIVF International Conference on Computing and Communication Technologies</source>
          ,
          <string-name>
            <surname>RIVF</surname>
          </string-name>
          <year>2022</year>
          (
          <year>2022</year>
          )
          <fpage>653</fpage>
          -
          <lpage>658</lpage>
          . doi:
          <volume>10</volume>
          .1109/RIVF55975.
          <year>2022</year>
          .
          <volume>10013794</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Kushwaha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Joshi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kaur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. N.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <article-title>Ethereum smart contract analysis tools: A systematic review</article-title>
          ,
          <source>IEEE Access 10</source>
          (
          <year>2022</year>
          )
          <fpage>57037</fpage>
          -
          <lpage>57062</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2022</year>
          .
          <volume>3169902</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Ouyang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yuan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Ni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Han</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Blockchain-enabled smart contracts: Architecture, applications, and future trends</article-title>
          ,
          <source>IEEE Transactions on Systems, Man, and Cybernetics: Systems</source>
          <volume>49</volume>
          (
          <year>2019</year>
          )
          <fpage>2266</fpage>
          -
          <lpage>2277</lpage>
          . doi:
          <volume>10</volume>
          .1109/TSMC.
          <year>2019</year>
          .
          <volume>2895123</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>G.</given-names>
            <surname>Korpal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Scott</surname>
          </string-name>
          , Decentralization and web3 technologies (
          <year>2022</year>
          ). URL: https://doi.org/10.36227/ techrxiv.19727734.v1. doi:
          <volume>10</volume>
          .36227/techrxiv.19727734.
          <year>v1</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A. H.</given-names>
            <surname>Pranav</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Latha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ashwin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Chinnaiyan</surname>
          </string-name>
          ,
          <article-title>Blockchainas a service (baas) framework for government funded projects e-tendering process administration and quality assurance using smart contracts, Institute of Electrical and Electronics Engineers Inc</article-title>
          .,
          <year>2021</year>
          . doi:
          <volume>10</volume>
          .1109/ICCCI50826.
          <year>2021</year>
          .
          <volume>9402348</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.</given-names>
            <surname>Metsä</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Katara</surname>
          </string-name>
          , T. Mikkonen,
          <article-title>Testing non-functional requirements with aspects: An industrial case study</article-title>
          ,
          <source>Proceedings - International Conference on Quality Software</source>
          (
          <year>2007</year>
          )
          <fpage>5</fpage>
          -
          <lpage>14</lpage>
          . doi:
          <volume>10</volume>
          .1109/ QSIC.
          <year>2007</year>
          .
          <volume>4385475</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Felderer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Büchler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Johns</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. D.</given-names>
            <surname>Brucker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Breu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pretschner</surname>
          </string-name>
          ,
          <article-title>Security testing: A survey</article-title>
          ,
          <source>Advances in Computers</source>
          <volume>101</volume>
          (
          <year>2016</year>
          )
          <fpage>1</fpage>
          -
          <lpage>51</lpage>
          . doi:
          <volume>10</volume>
          .1016/BS.ADCOM.
          <year>2015</year>
          .
          <volume>11</volume>
          .003.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Alfaw</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Elmedany</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Sharif</surname>
          </string-name>
          ,
          <article-title>Blockchain vulnerabilities and recent security challenges: A</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>