Introduction To CertiK Chain

Sep 3, 2020 4 min read
Introduction To CertiK Chain

Everything You Should Know About Security Infrastructure for Blockchain

Hey readers👩‍💻,

As the CertiK Chain is preparing itself for the launch of Mainnet, which should be here anytime now, we’ve created this introduction to the CertiK Chain. Learn everything there is to know before getting started with the network!

🕵️‍♂️ What is CertiK Chain?

The CertiK Chain is a public blockchain platform created by the CertiK Foundation and based on the foundations’ formal verification security system. The network is built to enhance the security of smart contracts. By allowing smart contract execution and interactions on a security-focused chain, the CertiK Foundation hopes to utilize decentralized computing.

So, what is the CertiK Foundation? The CertiK Foundation is a nonprofit, research organization whose mission is to give people the power to trust by creating the best Formal Verification platform for smart contracts and blockchain ecosystems. The Foundation was founded by Ronghui Gu and Zhong Shao, both computer science professors at prestigious universities.

Security, scalability, and decentralization are the known dilemmas of scalability for the blockchain ecosystem. CertiK Chain has given priority to the security-aspect of the difficulty. On the base layer of the network, the CertiK Virtual Machine (CVM) resides.

To understand the CVM, first, you need to know what a Virtual Machine (VM) is and how it works. IBM describes a VM as “a virtual representation, or emulation, of a physical computer”. So, a VM is essentially an operating system (OS) or application environment installed on software, which imitates dedicated hardware.

Virtual machines aren’t exposed to security as part of the runtime value or blockchain semantics on other networks. Formal Verification is conducted outside of the Virtual Machine and is invisible to the chain operation and VM execution. However, the CertiK Foundation believes that smart contract and blockchain security brings more dynamic, actionable value to chain operation and VM execution. For example, a secure smart contract may choose to interact differently with secure and non-secure smart contracts; in real life, this differentiation based on security level is common and useful.

That is why the CVM is created; it sends smart contracts and blockchain security information to the VM code, allowing unseen ways to access, check, depend, and dynamically establish blockchain and smart contract security. Additionally, CVM establishes ​a hierarchy of VM code security​, allowing vendors and technologies to co-exist and collaborate with clarity.

🌊 DeepSEA

DeepSEA is a new language for creating smart contracts, introduced by the CertiK Chain. This language allows programs to handle extremely complex code while operating smoothly and securely for the coders themselves. Furthermore, it is designed for Formal Verification in a proof assistant.

Formal Verification is used to prove code will work as intended, computing all possible scenarios. CertiK concluded that although they are pioneers in the Formal Verification technology, verifying software was the only way to show immunity against vulnerabilities objectively, so writing fully-correct software is still expensive and challenging.

The DeepSEA language provides a way to formally verify difficult correctness properties about smart contracts using the Coq Proof Assistant in a scalable and automated way. It also aims to remove as much busy-work as possible and help developers structure their system into separate modules so that the rest of the system is air-tight.

💻 CertiK Service Platform

The Decentralized Finance (DeFi) ecosystem is experiencing rapid growth, with new solutions launching almost every week. Data Accuracy and Security are the two primary motivations for pursuing the concept of DeFi, and many successful projects are attempting to achieve those two aspects. However, with rapid growth and popularity also come new concerns and more attacks.

For now, DeFi Security solutions seem to stay focussed on source code reviews and audits. While these procedures work well enough to find many bugs before DeFi smart contracts go live, there are always things that slip through the cracks. Causing malicious transactions, and people end up with assets stolen from them.

That is why the CertiK Chain has come up with the CertiK Service Platform (CSP) to guard the on-chain transactions by creating a bridge between DeFi smart contract with security services in a decentralized fashion. With CSP, DeFi projects can be equipped with the ability to prevent attacks through real-time security checks.

🔥 The NoOps Staking Infrastructure

The NoOps Staking Infrastructure is another project of CertiK and an Infrastructure-as-a-Service (IaaS) platform that is working towards tackling pain points in the Proof-of-Stake (PoS) blockchain ecosystem. NoOps is the first product of CertiK Chain and serves a one-stop solution focussed on the needs of different groups of end-users who actively participate in the staking business.

NoOps is created with four main aspects:

  1. Adaptability to maintain uptime — it is possible to launch and set-up your customized infrastructure with just a few clicks. Additionally, the stacks are deployed and hosted through leading cloud providers and local data centers to serve our clients worldwide with high performance.
  2. Security — to prevent attacks, each component of the NoOps platform has a physical and logical enclave and isolation.
  3. 24/7 Monitoring — every node cluster comes with a standalone monitor instance to collect metrics and log events with up to 1-second granularity. Furthermore, real-time analysis and reports are delivered on consensus.
  4. Marketplace to supplement nodes — the platform includes a virtual market supporting most leading blockchain protocols such as Cosmos and Ethereum.

🗄 CertiK Chain Use Cases

When the CertiK Chain was created, it initially started as a security-first blockchain built for the community to use to check for the correctness and security of active smart contracts. Within the chain, CTK assets are used as payment, staking, executing checks, etc.

Currently, there are two different use cases for the CertiK Chain, known as:

  • CertiK Decentralized Security Oracles — which provides projects with security safeguards, regardless of the network they’re published on.
  • CertiKShield — providing users with a reimbursement mechanism of lost assets due to hacks or code malfunctions.

Resources


DISCLAIMER: This is not financial advice. Staking, delegation, and cryptocurrencies involve a high degree of risk, and there is always the possibility of loss, including the loss of all staked digital assets. Additionally, delegators are at risk of slashing in case of security or liveness faults on some protocols. We advise you to do your due diligence before choosing a validator.

Join the conversation

Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.