Smart Contract Risk Assessment How Secure is the Contract You Are Calling

被引:0
|
作者
Li, Zexin [1 ]
Wang, Chao [1 ]
Zhang, Xucan [1 ]
Yu, Xiang [2 ]
Cui, Ting [3 ]
Yu, Yifan [4 ]
机构
[1] Guangzhou Univ, Guangdong Key Lab Blockchain Secur, Guangzhou 510006, Peoples R China
[2] Taizhou Univ, Sch Elect & Informat Engn, Taizhou 318000, Peoples R China
[3] Guangdong Univ Finance & Econ, Sch Econ, Guangzhou 510320, Peoples R China
[4] Jinan Univ, Sch Art, Guangzhou 510632, Peoples R China
来源
COMPUTATIONAL AND EXPERIMENTAL SIMULATIONS IN ENGINEERING, ICCES 2024-VOL 2 | 2025年 / 173卷
关键词
Blockchain; smart contract security; dynamic analysis; risk assessment; vulnerability detection;
D O I
10.1007/978-3-031-77489-8_40
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Smart contracts, due to their decentralized nature and immutability, have demonstrated significant potential in various sectors such as finance and supply chains. However, as their applications have expanded, their security vulnerabilities have increasingly come to light. In response to the frequent occurrences of smart contract attacks, researchers have undertaken a series of studies, including the development of automated vulnerability detection tools, dynamic monitoring techniques, and vulnerability remediation strategies. However, these detection tools often rely on static analysis and fail to capture dynamic vulnerabilities that occur during runtime. Additionally, dynamic monitoring is limited by the ability to acquire and process real-time data, and it lacks the capability to globally analyze security risks during phased attacks. Similarly, mechanisms for updating vulnerabilities might inadvertently introduce new risks by leaving backdoors in smart contracts. To address these issues, this paper proposes a new method for assessing the reputation and evaluating the risks of smart contracts, aimed at enhancing the security of the blockchain ecosystem through the analysis of smart contract invocation trajectories. The effectiveness and practicality of this method have been validated by evaluating real attack cases that have occurred on-chain. Finally, the paper summarizes the research findings and explores potential future research directions, aiming to provide new insights and solutions for the field of smart contract security.
引用
收藏
页码:526 / 534
页数:9
相关论文
共 50 条
  • [1] Secure Blockchain Interworking Using Extended Smart Contract
    Fujimoto, Shingo
    Takeuchi, Takuma
    Higashikado, Yoshiki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2022, E105D (02) : 227 - 234
  • [2] A secure transaction and smart contract architecture for internet of vehicles
    Lin, Hua-Yi
    SCIENCE PROGRESS, 2024, 107 (04)
  • [3] Smart Contract-Based Secure Decentralized Smart Healthcare System
    Raj, Anu
    Prakash, Shiva
    INTERNATIONAL JOURNAL OF SOFTWARE INNOVATION, 2023, 11 (01) : 27 - 27
  • [4] The Design and Implementation of a Secure Datastore Based on Ethereum Smart Contract
    Aldyaflah, Izdehar M.
    Zhao, Wenbing
    Upadhyay, Himanshu
    Lagos, Leonel
    APPLIED SCIENCES-BASEL, 2023, 13 (09):
  • [5] Secure Smart Contract System built on SMPC over Blockchain
    Zhu, Yan
    Song, Xiaoxu
    Yang, Shuai
    Qin, Yao
    Zhou, Qiong
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1539 - 1544
  • [6] SmartMeasurer: A Secure and Automated Bandwidth Measurement for Tor with Smart Contract
    Tang, Zejia
    Pan, Tianyao
    Han, Yang
    Shen, Tongzhou
    Xu, Lei
    Xu, Dawei
    MATHEMATICS, 2023, 11 (19)
  • [7] SSHCEth: Secure Smart Home Communications based on Ethereum Blockchain and Smart Contract
    Bourian, Imad
    Sebbar, Anass
    Chougdali, Khalid
    Amhoud, El Mehdi
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 2674 - 2679
  • [8] iSCREAM: a suite for Smart Contract REAdability assessMent
    Canfora, Gerardo
    Di Sorbo, Andrea
    Fredella, Michele
    Vacca, Anna
    Visaggio, Corrado A.
    2021 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2021), 2021, : 579 - 583
  • [9] TokenAuditor: Detecting Manipulation Risk in Token Smart Contract by Fuzzing
    Cao, Mingpei
    Zhang, Yueze
    Feng, Zhenxuan
    Hu, Jiahao
    Zhu, Yuesheng
    2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY, QRS, 2022, : 651 - 662
  • [10] Enabling Efficient Cross-Shard Smart Contract Calling via Overlapping
    Zhang, Zixu
    Yin, Hongbo
    Wang, Ying
    Yu, Guangsheng
    Wang, Xu
    Ni, Wei
    Liu, Ren Ping
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2024, PT II, 2025, 14904 : 164 - 178