Smart Contract Timestamp Vulnerability Detection Based on Code Homogeneity

被引:2
作者
Wang, Weizhi [1 ,2 ]
Xia, Lei [3 ]
Zhang, Zhuo [1 ]
Meng, Xiankai [4 ]
机构
[1] Xian Univ Technol, Sch Comp Sci & Engn, Xian 710000, Peoples R China
[2] Univ Queensland, Brisbane 4072, Australia
[3] 83 Army Joint & Truma Dis Treatment Ctr PLA, Xinxiang 453000, Peoples R China
[4] Shanghai Polytech Univ, Coll Comp & Informat Engn, Shanghai 200127, Peoples R China
基金
中国博士后科学基金;
关键词
potential timestamp smart contract; vulnerability detection; code homogeneity;
D O I
10.1587/transinf.2024EDL8004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart contracts, as a form of digital protocol, are computer programs designed for the automatic execution, control, and recording of contractual terms. They permit transactions to be conducted without the need for an intermediary. However, the economic property of smart contracts makes their vulnerabilities susceptible to hacking attacks, leading to significant losses. In this paper, we introduce a smart contract timestamp vulnerability detection technique HomoDec based on code homogeneity. The core idea of this technique involves comparing the homogeneity between the code of the test smart contract and the existing smart contract vulnerability codes in the database to determine whether the tested code has a timestamp vulnerability. Specifically, HomoDec first explores how to vectorize smart contracts reasonably and efficiently, representing smart contract code as a high-dimensional vector containing features of code vulnerabilities. Subsequently, it investigates methods to determine the homogeneity between the test codes and the ones in vulnerability code base, enabling the detection of potential timestamp vulnerabilities in smart contract code.
引用
收藏
页码:1362 / 1366
页数:5
相关论文
共 20 条
[1]  
Bach LM, 2018, 2018 41ST INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), P1545, DOI 10.23919/MIPRO.2018.8400278
[2]  
Bhatia S., 2021, Blockchain for Business: How It Works and Creates Value, P77
[3]  
Brito Jerry., 2013, Bitcoin: A primer for policymakers
[4]  
Feng ZY, 2020, Arxiv, DOI [arXiv:2002.08155, 10.48550/arXiv.2002.08155]
[5]   SmartBugs: A Framework to Analyze Solidity Smart Contracts [J].
Ferreira, Joao F. ;
Cruz, Pedro ;
Durieux, Thomas ;
Abreu, Rui .
2020 35TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2020), 2020, :1349-1352
[6]   Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract [J].
Kushwaha, Satpal Singh ;
Joshi, Sandeep ;
Singh, Dilbag ;
Kaur, Manjit ;
Lee, Heung-No .
IEEE ACCESS, 2022, 10 :6605-6621
[7]   Combining Graph Neural Networks With Expert Knowledge for Smart Contract Vulnerability Detection [J].
Liu, Zhenguang ;
Qian, Peng ;
Wang, Xiaoyang ;
Zhuang, Yuan ;
Qiu, Lin ;
Wang, Xun .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (02) :1296-1310
[8]   Making Smart Contracts Smarter [J].
Luu, Loi ;
Chu, Duc-Hiep ;
Olickel, Hrishi ;
Saxena, Prateek ;
Hobor, Aquinas .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :254-269
[9]   Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts [J].
Mossberg, Mark ;
Manzano, Felipe ;
Hennenfent, Eric ;
Groce, Alex ;
Grieco, Gustavo ;
Feist, Josselin ;
Brunson, Trent ;
Dinaburg, Artem .
34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2019), 2019, :1186-1189
[10]  
Mueller B., 2017, Mythril-reversing and bug hunting framework for the ethereum blockchain