A Mixed-Methods Study of Security Practices of Smart Contract Developers

被引:0
作者
Sharma, Tanusree [1 ]
Zhou, Zhixuan [1 ]
Miller, Andrew [1 ]
Wang, Yang [1 ]
机构
[1] Univ Illinois, Champaign, IL 61820 USA
来源
PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM | 2023年
关键词
WEB SURVEYS; BLOCKCHAIN;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart contracts are self-executing programs that run on blockchains (e.g., Ethereum). While security is a key concern for smart contracts, it is unclear how smart contract developers approach security. To help fill this research gap, we conducted a mixed-methods study of smart contract developers including interviews and a code review task with 29 developers and an online survey with 171 valid respondents. Our findings show various smart contract security perceptions and practices, including the usage of different tools and resources. Overall, the majority of our participants did not consider security as a priority in their smart contract development. In addition, the security vulnerability identification rates in our code review tasks were alarmingly low (often lower than 50%) across different vulnerabilities and regardless of our participants' years of experience in smart contract development. We discuss how future education and tools could better support developers in ensuring smart contract security.
引用
收藏
页码:2545 / 2562
页数:18
相关论文
共 90 条
[41]   Developers Are Not the Enemy! The Need for Usable Security APIs [J].
Green, Matthew ;
Smith, Matthew .
IEEE SECURITY & PRIVACY, 2016, 14 (05) :40-46
[42]  
hackingdistributed, IN DEPTH LOOK PAR MU
[43]  
Hartel P., 2019, IEEE ACCESS
[44]   An investigation of the effect of lotteries on Web survey response rates [J].
Heerwegh, Dirk .
FIELD METHODS, 2006, 18 (02) :205-220
[45]   You Get Who You Pay for: The Impact of Incentives on Participation Bias [J].
Hsieh, Gary ;
Kocielnik, Rafal .
ACM CONFERENCE ON COMPUTER-SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING (CSCW 2016), 2016, :823-835
[46]   Smart Contract Security: A Software Lifecycle Perspective [J].
Huang, Yongfeng ;
Bian, Yiyang ;
Li, Renpu ;
Zhao, J. Leon ;
Shi, Peizhong .
IEEE ACCESS, 2019, 7 :150184-150202
[47]   ContractFuzzer: Fuzzing Smart Contracts for Vulnerability Detection [J].
Jiang, Bo ;
Liu, Ye ;
Chan, W. C. .
PROCEEDINGS OF THE 2018 33RD IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMTED SOFTWARE ENGINEERING (ASE' 18), 2018, :259-269
[48]  
Johnson B, 2013, PROCEEDINGS OF THE 35TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2013), P672, DOI 10.1109/ICSE.2013.6606613
[49]   ZEUS: Analyzing Safety of Smart Contracts [J].
Kalra, Sukrit ;
Goel, Seep ;
Dhawan, Mohan ;
Sharma, Subodh .
25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,
[50]  
KANNENGIESSER N, 2021, IEEE T SOFTWARE ENG