UROP Proceedings 2020-21

School of Engineering Department of Computer Science and Engineering 122 Building a Blockchain and Smart Contract Application Supervisor: CHEUNG Shing Chi / CSE Student: YU Cheuk Hei / COMP Course: UROP1000, Summer As Ethereum introduces its new blockchain together with a Turing-complete programming language, users can write smart contracts and deploy decentralized applications freely. Smart contracts are a type of Ethereum account that run as automated programs on the blockchain. Due to blockchains’ immutability, no amendments can be made to fix security flaws in smart contracts after deployment. A simple vulnerability may sometimes result in large amount of stolen funds. This project identifies one of the many vulnerabilities – Displacement attacks in front-running by sampling past transactions. This report provides explanation on how the vulnerability was located and how analysis was conducted. It also contains recommendations on how smart contract engineers can avoid similar mistakes in the future. A De-Polarization System for Social Media Supervisor: HUI Pan / CSE Student: YU Yue / QSA TILNEY-BASSETT Oktarian George / COMP Course: UROP1100, Fall UROP1100, Fall As a result of the continued growth of social media, the political landscape of many countries has become deeply polarised. At the heart of this division in beliefs lies the media corporations that play the important role of relaying information, but that increasingly cater to specific audiences that share similar political stances as those communicated by the network. Hence, this polarisation of opinions has led to the building of echo chambers where users are less receptive to opposing opinions and stop engaging in active critical thinking of the information being presented to them. The focus of this project is to build a tool, Debubble, that can increase a user’s awareness of media bias and let users reach opinions that are of opposing viewpoints. This is achieved by collecting data on a user’s reading patterns to identify potential echo chambers, and then lead users to information otherwise unreachable.