Analyzing Ethereum's Contract Topology

被引:44
作者
Kiffer, Lucianna [1 ]
Levin, Dave [2 ]
Mislove, Alan [1 ]
机构
[1] Northeastern Univ, Boston, MA 02115 USA
[2] Univ Maryland, Baltimore, MD 21201 USA
来源
IMC'18: PROCEEDINGS OF THE INTERNET MEASUREMENT CONFERENCE | 2018年
关键词
D O I
10.1145/3278532.3278575
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ethereum is the second most valuable cryptocurrency today, with a current market cap of over $68B. What sets Ethereum apart from other cryptocurrencies is that it uses the blockchain to not only store a record of transactions, but also smart contracts and a history of calls made to those contracts. Thus, Ethereum represents a new form of distributed system: one where users can implement contracts that can provide functionality such as voting protocols, crowdfunding projects, betting agreements, and many more. However, despite the massive investment, little is known about how contracts in Ethereum are actually created and used. In this paper, we examine how contracts in Ethereum are created, and how users and contracts interact with one another. We modify the geth client to log all such interactions, and find that contracts today are three times more likely to be created by other contracts than they are by users, and that over 60% of contracts have never been interacted with. Additionally, we obtain the bytecode of all contracts and look for similarity; we find that less than 10% of user-created contracts are unique, and less than 1% of contract-created contracts are so. Clustering the contracts based on code similarity reveals even further similarity. These results indicate that there is substantial code re-use in Ethereum, suggesting that bugs in such contracts could have wide-spread impact on the Ethereum user population.
引用
收藏
页码:494 / 499
页数:6
相关论文
共 22 条
  • [1] Al Jawaheri H. Basil, 2018, QATAR FDN ANN RES C, V2018
  • [2] Androulaki Elli, 2013, Revised Selected Papers, P34, DOI DOI 10.1007/978-3-642-39884-1
  • [3] [Anonymous], Discovering Bitcoin's Public Topology and Influential Nodes
  • [4] [Anonymous], 2018, P 22 INT C FIN CRYPT
  • [5] [Anonymous], 2016, Communications of the ACM, DOI [10.1145/2504730.2504747, DOI 10.1145/2504730.2504747, DOI 10.1145/2896384, 10.1145/2896384]
  • [6] [Anonymous], 2016, NEW KIDS BLOCK ANAL
  • [7] [Anonymous], BITC WORKSH
  • [8] [Anonymous], 2018, ARXIV180103998
  • [9] Bartoletti Massimo, 2017, Financial Cryptography and Data Security. FC 2017 International Workshops WAHC, BITCOIN, VOTING, WTSC, and TA. Revised Selected Papers: LNCS 10323, P494, DOI 10.1007/978-3-319-70278-0_31
  • [10] Phylogenetic and morphological discord indicates introgressive hybridisation in two genera of Australian millipedes (Diplopoda, Polydesmida, Paradoxosomatidae)
    Decker, Peter
    [J]. ZOOKEYS, 2018, (809) : 1 - 14