Smart Contract Vulnerability Detection Based on Symbolic Execution Technology

被引:1
|
作者
Liu, Yiping [1 ]
Xu, Jie [1 ]
Cui, Baojiang [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Dept Cyberspace Secur, Beijing, Peoples R China
来源
CYBER SECURITY, CNCERT 2021 | 2022年 / 1506卷
基金
中国国家自然科学基金;
关键词
Ethereum; Smart contract; Control flow; Symbolic execution; Vulnerability detection;
D O I
10.1007/978-981-16-9229-1_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of the blockchain, smart contract technology has been widely applied. The number of smart contracts has grown at a high rate and nearly at an average of thousands per day. However, the correctness and security of the smart contract itself are facing huge problems. The well-known DAO vulnerability, and Parity multi-signature wallet' vulnerabilities have leaded to a hundreds of millions dollars loss, and they are both caused by the security problems of smart contracts. Once the smart contract vulnerability is exploited, it is very likely to bring the loss of cryptocurrencies, the disorder of the financial order and other catastrophic consequences. Therefore the security of smart contracts is imminent. This project has designed and implemented a vulnerability detection system of Ethereum smart contract. The system uses the assembly instruction sequences of the smart contract to generate the control flow graph, then performs symbolic execution and vulnerability constraint solving over the control flow. The system can detect some common types of vulnerabilities, such as the integer overflow and underflow vulnerability, reentry vulnerability and unchecked call return value vulnerability. It has a high accuracy of detection result, and gives support for export vulnerability report.
引用
收藏
页码:193 / 207
页数:15
相关论文
共 50 条
  • [1] WANA: Symbolic Execution of Wasm Bytecode for Extensible Smart Contract Vulnerability Detection
    Jiang, Bo
    Chen, Yifei
    Wang, Dong
    Ashraf, Imran
    Chan, W. K.
    2021 IEEE 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2021), 2021, : 926 - 937
  • [2] Park: Accelerating Smart Contract Vulnerability Detection via Parallel-Fork Symbolic Execution
    Zheng, Peilin
    Zheng, Zibin
    Luo, Xiapu
    PROCEEDINGS OF THE 31ST ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2022, 2022, : 740 - 751
  • [3] FlawCheck: Detecting Smart Contract Vulnerabilities Based on Symbolic Execution
    Gou, Naixiang
    Zhao, Xiangfu
    Wang, Shiji
    Zhang, Hanfeng
    Yang, Jiahui
    SECURITY AND PRIVACY, 2025, 8 (02):
  • [4] Smart Contract Symbol Execution Vulnerability Detection Method Based on CFG Path Pruning
    Wang, Yichuan
    Zhao, Jingjing
    Zhang, Yaling
    Hei, Xinhong
    Zhu, Lei
    PROCEEDINGS OF THE 5TH ACM INTERNATIONAL SYMPOSIUM ON BLOCKCHAIN AND SECURE CRITICAL INFRASTRUCTURE, ACM BSCI 2023, 2023, : 132 - 139
  • [5] Patch-Related Vulnerability Detection Based on Symbolic Execution
    Qiang, Weizhong
    Liao, Yuehua
    Sun, Guozhong
    Yang, Laurence T.
    Zou, Deqing
    Jin, Hai
    IEEE ACCESS, 2017, 5 : 20777 - 20784
  • [6] An Efficient Smart Contracts Event Ordering Vulnerability Detection System Based on Symbolic Execution and Fuzz Testing
    Li, Yitao
    Cui, Baojiang
    Wang, Dongbin
    Yu, Yue
    Zhang, Can
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS 2024, 2024, 214 : 280 - 287
  • [7] Improving Guide-based Vulnerability Detection with Hybrid Symbolic Execution
    Ouyang, Yongji
    Zeng, Shuai
    Yang, Chao
    Wang, Qingxian
    2014 2ND INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2014, : 1038 - 1043
  • [8] Smart Contract Vulnerability Detection Based on Multimodal Feature Fusion
    Yu, Jie
    Yu, Xiao
    Li, Jiale
    Sun, Haoxin
    Sun, Mengdi
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT III, ICIC 2024, 2024, 14864 : 344 - 355
  • [9] Smart contract vulnerability detection based on a bytecode critical path
    Yin, Guisheng
    Gao, Le
    Zhuang, Yuan
    Li, Jun
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2022, 43 (02): : 255 - 261
  • [10] Smart Contract Timestamp Vulnerability Detection Based on Code Homogeneity
    Wang, Weizhi
    Xia, Lei
    Zhang, Zhuo
    Meng, Xiankai
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2024, E107D (10) : 1362 - 1366