A Systematic Review and Performance Evaluation of Open-Source Tools for Smart Contract Vulnerability Detection

被引:0
作者
He, Yaqiong [1 ]
Fan, Jinlin [1 ]
Wu, Huaiguang [1 ]
机构
[1] Zhengzhou Univ Light Ind, Sch Comp Sci & Technol, Zhengzhou 450001, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 80卷 / 01期
关键词
Blockchain security; ethereum; smart contracts detection; tools evaluation; BLOCKCHAIN; CHALLENGES; SECURITY;
D O I
10.32604/cmc.2024.052887
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rise of blockchain technology, the security issues of smart contracts have become increasingly critical. Despite the availability of numerous smart contract vulnerability detection tools, many face challenges such as slow updates, usability issues, and limited installation methods. These challenges hinder the adoption and practicality of these tools. This paper examines smart contract vulnerability detection tools from 2016 to 2023, sourced from the Web of Science (WOS) and Google Scholar. By systematically collecting, screening, and synthesizing relevant research, 38 open-source tools that provide installation methods were selected for further investigation. From a developer's perspective, this paper offers a comprehensive survey of these 38 open-source tools, discussing their operating principles, installation methods, environmental dependencies, update frequencies, and installation challenges. Based on this, we propose an Ethereum smart contract vulnerability detection framework. This framework enables developers to easily utilize various detection tools and accurately analyze contract security issues. To validate the framework's stability, over 1700 h of testing were conducted. Additionally, a comprehensive performance test was performed on the mainstream detection tools integrated within the framework, assessing their hardware requirements and vulnerability detection coverage. Experimental results indicate that the Slither tool demonstrates satisfactory performance in terms of system resource consumption and vulnerability detection coverage. This study represents the first performance evaluation of testing tools in this domain, providing significant reference value.
引用
收藏
页码:995 / 1032
页数:38
相关论文
共 82 条
[1]   ETHIR: A Framework for High-Level Analysis of Ethereum Bytecode [J].
Albert, Elvira ;
Gordillo, Pablo ;
Livshits, Benjamin ;
Rubio, Albert ;
Sergey, Ilya .
AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS (ATVA 2018), 2018, 11138 :513-520
[2]  
Alharby M, 2018, 2018 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, BIG DATA AND BLOCKCHAIN (ICCBB 2018), P96
[3]  
Allen F. E., 1970, ACM Sigplan Notices, V5, P1
[4]   Secure Multiparty Computations on Bitcoin [J].
Andrychowicz, Marcin ;
Dziembowski, Stefan ;
Malinowski, Daniel ;
Mazurek, Lukasz .
COMMUNICATIONS OF THE ACM, 2016, 59 (04) :76-84
[5]  
Ant, Antlr
[6]   Eth2Vec: Learning contract-wide code representations for vulnerability detection on Ethereum smart contracts [J].
Ashizawa, Nami ;
Yanai, Naoto ;
Cruz, Jason Paul ;
Okamura, Shingo .
BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2022, 3 (04)
[7]   SoK: Unraveling Bitcoin Smart Contracts [J].
Atzei, Nicola ;
Bartoletti, Massimo ;
Cimoli, Tiziana ;
Lande, Stefano ;
Zunino, Roberto .
PRINCIPLES OF SECURITY AND TRUST, POST 2018, 2018, 10804 :217-242
[8]   A Survey of Attacks on Ethereum Smart Contracts (SoK) [J].
Atzei, Nicola ;
Bartoletti, Massimo ;
Cimoli, Tiziana .
PRINCIPLES OF SECURITY AND TRUST (POST 2017), 2017, 10204 :164-186
[9]  
Behkish Nassirzadeh, 2023, Mathematical Research for Blockchain Economy, P143
[10]  
Bose P, 2022, P IEEE S SECUR PRIV, P161, DOI [10.1109/SP46214.2022.9833721, 10.1109/SP46214.2022.00072]