A survey on smart contract vulnerabilities: Data sources, detection and repair

被引:40
作者
Chu, Hanting [1 ]
Zhang, Pengcheng [1 ]
Dong, Hai [2 ]
Xiao, Yan [3 ]
Ji, Shunhui [1 ]
Li, Wenrui [4 ]
机构
[1] Hohai Univ, 8 Focheng West Rd, Nanjing, Peoples R China
[2] RMIT Univ, Sch Comp Technol, Melbourne, Australia
[3] NUS Univ, Sch Comp, Singapore, Singapore
[4] Nanjing XiaoZhuang Univ, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
Blockchains; Smart contracts; Vulnerability detection; Vulnerability repair; Information security; TOOLS;
D O I
10.1016/j.infsof.2023.107221
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart contracts contain many built-in security features, such as non-immutability once being deployed and non-involvement of third parties for contract execution. These features reduce security risks and enhance users' trust towards smart contracts. However, smart contract security issues still persist, resulting in huge financial losses. Contract publishers cannot fully cover contract vulnerabilities through contract version updating. These security issues affect further development of blockchain technologies. So far, there are many related studies focusing on smart contract security issues and tend to discuss from a particular perspective (e.g., development cycle, vulnerability attack methods, security detection tools, etc.). However, smart contract security is a complicated issue that needs to be explored from a multi-dimensional perspective. In this paper, we explore smart contract security from the perspectives of vulnerability data sources, vulnerability detection, and vulnerability defense. We first analyze the existing security issues and challenges of smart contracts, investigate the existing vulnerability classification frameworks and common security vulnerabilities, followed by reviewing the existing contract vulnerability injection, detection, and repair methods. We then analyze the performance of existing security methods. Next, we summarize the current status of smart contract security-related research. Finally, we summarize the state of the art and future trends of smart contract security-related research. This paper aims to provide systematic knowledge and references to this research field.
引用
收藏
页数:17
相关论文
共 90 条
[1]  
Alharby M, 2017, Arxiv, DOI arXiv:1710.06372
[2]  
[Anonymous], EX SOL SEC ISS
[3]  
[Anonymous], ?About us"
[4]  
[Anonymous], 2018, 17 INT S INFOTEH JAH, DOI DOI 10.1109/INFOTEH.2018.8345547
[5]  
[Anonymous], COMP RES ED
[6]  
Anqi Wang, 2020, 2020 7th International Conference on Dependable Systems and Their Applications (DSA), P173, DOI 10.1109/DSA51864.2020.00031
[7]  
Antonopoulos A., 2018, MASTERING ETHEREUM B
[8]  
Ashizawa N., 2021, P 3 ACM INT S BLOCKC, P47
[9]   A Survey of Attacks on Ethereum Smart Contracts (SoK) [J].
Atzei, Nicola ;
Bartoletti, Massimo ;
Cimoli, Tiziana .
PRINCIPLES OF SECURITY AND TRUST (POST 2017), 2017, 10204 :164-186
[10]  
Bartoletti Massimo, 2017, Financial Cryptography and Data Security. FC 2017 International Workshops WAHC, BITCOIN, VOTING, WTSC, and TA. Revised Selected Papers: LNCS 10323, P494, DOI 10.1007/978-3-319-70278-0_31