Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








2,607 Hits in 4.3 sec

BLOCKEYE: Hunting For DeFi Attacks on Blockchain [article]

Bin Wang, Han Liu, Chao Liu, Zhiqiang Yang, Qian Ren, Huixuan Zheng, Hong Lei
2021 arXiv   pre-print
., lending, borrowing, collateralizing, exchanging etc.) via smart contracts at a relatively low cost of trust.  ...  In this paper, we proposed BLOCKEYE, a real-time attack detection system for DeFi projects on the Ethereum blockchain.  ...  Moreover, the payment at line 12 is dependent on the oracle due to a data flow from line 9 to 12. That said, EMN has an oracle-dependent state update in its smart contracts.  ... 
arXiv:2103.02873v1 fatcat:74q6yo5q7fb4bpyatjhq6mdfny

AntFuzzer: A Grey-Box Fuzzing Framework for EOSIO Smart Contracts [article]

Jianfei Zhou and Tianxing Jiang and Shuwei Song and Ting Chen
2022 arXiv   pre-print
We have implemented 6 detection plugins on AntFuzzer to detect major vulnerabilities of EOSIO smart contracts.  ...  In the past few years, several attacks against the vulnerabilities of EOSIO smart contracts have caused severe financial losses to this prevalent blockchain platform.  ...  Each detection plugin defines attack scenarios for triggering a specific type of vulnerability and test oracles for detecting it.  ... 
arXiv:2211.02652v1 fatcat:btl4ob65fjg2zirci4vbl5gbpa

ContractFuzzer: fuzzing smart contracts for vulnerability detection

Bo Jiang, Ye Liu, W. K. Chan
2018 Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering - ASE 2018  
ContractFuzzer generates fuzzing inputs based on the ABI specifications of smart contracts, defines test oracles to detect security vulnerabilities, instruments the EVM to log smart contracts runtime behaviors  ...  In particular, our fuzzing tool successfully detects the vulnerability of the DAO contract that leads to USD 60 million loss and the vulnerabilities of Parity Wallet that have led to the loss of 30 million  ...  DEFINING TESTING ORACLES FOR VULNERABILITIES OF SMART CONTRACTS In this section, we will define test oracles for detecting each type of vulnerabilities in smart contracts. 1) Test Oracle for Gasless  ... 
doi:10.1145/3238147.3238177 dblp:conf/kbse/0001LC18 fatcat:ii7efxdnozdrdl2uhyfpvpff6e

EOSFuzzer: Fuzzing EOSIO Smart Contracts for Vulnerability Detection [article]

Yuhe Huang, Bo Jiang, W.K. Chan
2020 arXiv   pre-print
In particular, EOSFuzzer proposed effective attacking scenarios and test oracles for EOSIO smart contract fuzzing.  ...  It is scalable in terms of transaction speeds and has a growing ecosystem supporting smart contracts and decentralized applications.  ...  The test oracle to detect the fake EOS transfer vulnerability under the designed attacking scenarios is: CanReceiveEOS & TransferCalled The CanReceiveEOS test oracle is to check whether the smart contract  ... 
arXiv:2007.14903v3 fatcat:6naghoujsbf4xjqrpl75krm62e

Oracle-Supported Dynamic Exploit Generation for Smart Contracts [article]

Haijun Wang and Yi Li and Shang-Wei Lin and Cyrille Artho and Lei Ma and Yang Liu
2019 arXiv   pre-print
Being a dynamic technique, it guarantees that each discovered vulnerability is a violation of the test oracle and is able to generate the attack script to exploit this vulnerability.  ...  In this paper, we introduce ContraMaster: an oracle-supported dynamic exploit generation framework for smart contracts.  ...  Semantic Test Oracle The fundamental difficulty in detecting smart contract vulnerabilities is the lack of a general-purpose test oracle.  ... 
arXiv:1909.06605v2 fatcat:d2agsfeikbdhnatw45p2lasqsm

Safeguarding DeFi Smart Contracts against Oracle Deviations [article]

Xun Deng, Sidi Mohamed Beillahi, Cyrus Minwalla, Han Du, Andreas Veneris, Fan Long
2024 arXiv   pre-print
Furthermore, guard statements may be generated for smart contracts that may use the oracle values, thus effectively preventing oracle manipulation attacks.  ...  This paper presents OVer, a framework designed to automatically analyze the behavior of decentralized finance (DeFi) protocols when subjected to a "skewed" oracle input.  ...  While previous research has primarily concentrated on the design of robust oracles and the detection of price manipulation attacks, our work proposes promising analysis tools for smart contracts to help  ... 
arXiv:2401.06044v1 fatcat:gh73s7gddjg7dlbjkdx4lyvl7m

Front-Running Attack Benchmark Construction and Vulnerability Detection Technique Evaluation [article]

Wuqi Zhang, Lili Wei, Shing-Chi Cheung, Yepang Liu, Shuqing Li, Lu Liu, Michael R. Lyu
2022 arXiv   pre-print
This motivates us to build a benchmark consisting of 513 real-world attacks with vulnerable code labeled in 235 distinct smart contracts.  ...  The evaluation of seven state-of-the-art vulnerability detection techniques on the benchmark reveals their inadequacy in detecting front-running vulnerabilities, with a low recall of at most 6.04%.  ...  Among them, we focus on those techniques capable of detecting front-running vulnerabilities in smart contracts.  ... 
arXiv:2212.12110v2 fatcat:sh2wqnusfbcvnlhjc54ydghnpe

Attacking GlobalPlatform SCP02-compliant Smart Cards Using a Padding Oracle Attack

Gildas Avoine, Loïc Ferreira
2018 Transactions on Cryptographic Hardware and Embedded Systems  
We describe in this paper how to perform a padding oracle attack against the GlobalPlatform SCP02 protocol.  ...  We provide results of our experiments done with 10 smart cards from six different card manufacturers, and show that, in our experimental setting, the attack is fully practical.  ...  Figure 3 : 3 D R (continuous blue line) and D W (dashed red line) corresponding to Card B with different values m. Figure 4 : 4 Padding oracle attack targeting an UICC.  ... 
doi:10.13154/tches.v2018.i2.149-170 dblp:journals/tches/AvoineF18 fatcat:alymnwxugrevrakcpk6tq2nldq

Metamorphic Testing for Smart Contract Vulnerabilities Detection [article]

Jiahao Li
2023 arXiv   pre-print
Based on the anomalies we observed in vulnerable smart contracts, we define five metamorphic relations to detect abnormal gas consumption and account interaction inconsistency of the target smart contract  ...  In this article, we apply the metamorphic testing technique to detect smart contract vulnerabilities.  ...  Then, the fallback function (lines 12-15 in Fig 3) of Attacker will be invoked automatically, and line 14 in Fig 3 will execute lines 7-8 of Fig 2 again and thus make recursive calls.  ... 
arXiv:2303.03179v1 fatcat:yzq4wxwzt5bbxfr66rebcer7xq

Empirical Review of Smart Contract and DeFi Security: Vulnerability Detection and Automated Repair [article]

Peng Qian, Rui Cao, Zhenguang Liu, Wenqing Li, Ming Li, Lun Zhang, Yufeng Xu, Jianhai Chen, Qinming He
2023 arXiv   pre-print
Then, we present an empirical study of 42 state-of-the-art techniques that can detect smart contract and DeFi vulnerabilities.  ...  Unfortunately, smart contracts hold a massive amount of value, making them an attractive target for attacks.  ...  Another line of work focuses on identifying and patching vulnerabilities in smart contracts and DeFi protocols.  ... 
arXiv:2309.02391v2 fatcat:ojfnihqcpzdppji6yozy7dg6tq

A Survey of DeFi Security: Challenges and Opportunities [article]

Wenkai Li, Jiuyang Bu, Xiaoqi Li, Hongli Peng, Yuanzheng Niu, Yuqing Zhang
2022 arXiv   pre-print
Then we classify and analyze real-world DeFi attacks based on the principles that correlate to the vulnerabilities.  ...  In addition, we collect optimization strategies from the data, network, consensus, smart contract, and application layers. And then, we describe the weaknesses and technical approaches they address.  ...  This research is partially supported by Early Career Research Starting Fund of Hainan University under Grant RZ2200001265.  ... 
arXiv:2206.11821v3 fatcat:ipd657432bdqpoo2sruftw3ta4

Your Smart Contracts Are Not Secure

Kevin Tjiam, Rui Wang, Huanhuan Chen, Kaitai Liang
2021 Proceedings of the 3rd Workshop on Cyber-Security Arms Race  
This research work focuses on two smart contract vulnerabilities: transaction-ordering dependency and oracle manipulation.  ...  Combined, these two vulnerabilities have been exploited to extract hundreds of millions of dollars from smart contracts in the past year (2020)(2021).  ...  Beyond Flash Loans As the Ethereum network grows and smart contracts become ever more reliant on oracles for different kinds of information, new oracle manipulation attacks will undoubtedly emerge in the  ... 
doi:10.1145/3474374.3486916 fatcat:c5npmi5rj5h3pfxk5gmnekce44

FlashSyn: Flash Loan Attack Synthesis via Counter Example Driven Approximation [article]

Zhiyang Chen, Sidi Mohamed Beillahi, Fan Long
2024 arXiv   pre-print
FlashSyn automatically synthesizes an adversarial attack for 16 of the 18 benchmarks.  ...  We then construct an optimization query using the approximated functions of the DeFi protocol to find an adversarial attack constituted of a sequence of functions invocations with optimal parameters that  ...  This attack is a typical case of oracle manipulation.  ... 
arXiv:2206.10708v3 fatcat:jy4icmbmd5b3fm75fwrkuvwdjq

Detection of Vulnerabilities in Smart Contracts Specifications in Ethereum Platforms

Mauro C. Argañaraz, Mario M. Berón, Maria J. Varanda Pereira, Pedro Rangel Henriques, Ricardo Queirós, Alberto Simões
2020 Symposium on Languages, Applications and Technologies  
In this paper, we propose a tool for the detection of vulnerabilities in high-level languages based on automatized static analysis.  ...  Ethereum is the principal ecosystem based on blockchain that provides a suitable environment for coding and executing smart contracts, which have been receiving great attention due to the commercial apps  ...  smart contracts.  ... 
doi:10.4230/oasics.slate.2020.2 dblp:conf/slate/ArganarazBPH20 fatcat:j654ooajcnh5tlbrqg3jgcitde

Smart Contract Vulnerability Detection Based on Symbolic Execution Technology [chapter]

Yiping Liu, Jie Xu, Baojiang Cui
2022 Communications in Computer and Information Science  
Therefore the security of smart contracts is imminent. This project has designed and implemented a vulnerability detection system of Ethereum smart contract.  ...  It has a high accuracy of detection result, and gives support for export vulnerability report.  ...  This work is supported by CNKLSTISS and the National Natural Science Foundation of China (Grant No. 61802025).  ... 
doi:10.1007/978-981-16-9229-1_12 fatcat:bvzyj4kvpnc3jclf5npgnv5wqm
« Previous Showing results 1 — 15 out of 2,607 results