Combatting Front-Running in Smart Contracts: Attack Mining, Benchmark Construction and Vulnerability Detector Evaluation
نویسندگان
چکیده
Front-running attacks have been a major concern on the blockchain. Attackers launch front-running by inserting additional transactions before upcoming victim to manipulate transaction executions and make profits. Recent studies shown that are prevalent Ethereum blockchain caused millions of US dollars loss. Vulnerable smart contracts, programs invoked transactions, held responsible for attacks. Although techniques detect vulnerabilities proposed, their performance real-world vulnerable contracts is unclear. There no large-scale benchmark based real evaluate capabilities. This motivates us build consisting 513 with code labeled in 235 distinct contracts. We propose automated effectively collect localize corresponding at scale. Our experiments show our approaches effective, achieving higher recall finding precision pinpointing compared existing techniques. The evaluation seven state-of-the-art vulnerability detection reveals inadequacy detecting vulnerabilities, low most 6.04%. further analysis identifies four common limitations techniques: lack support inter-contract analysis, inefficient constraint solving cryptographic operations, improper patterns, token support.
منابع مشابه
Smart Contracts Make Bitcoin Mining Pools Vulnerable
Despite their incentive structure flaws, mining pools account for more than 95% of Bitcoin’s computation power. This paper introduces an attack against mining pools in which a malicious party pays pool members to withhold their solutions from their pool operator. We show that an adversary with a tiny amount of computing power and capital can execute this attack. Smart contracts enforce the mali...
متن کاملProfiling Smart Contracts Interactions Tensor Decomposition and Graph Mining
Smart contracts, computer protocols designed for autonomous execution on predefined conditions, arise from the evolution of the Bitcoin’s crypto-currency. They provide higher transaction security and allow economy of scale through the automated process. Smart contracts provides inherent benefits for financial institutions such as investment banking, retail banking, and insurance. This technolog...
متن کاملAVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid
A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis be...
متن کاملEvaluation of Groundwater Vulnerability Using Data Mining Technique in Hashtgerd Plain
Groundwater vulnerability assessment would be one of the effective informative methods to provide a basis for determining source of pollution. Vulnerability maps are employed as an important solution in order to handle entrance of pollution into the aquifers. A common way to develop groundwater vulnerability map is DRASTIC. Meanwhile, application of the method is not easy for any aquifer due to...
متن کاملEvaluation of Logic-Based Smart Contracts for Blockchain Systems
While procedural languages are commonly used to program smart contracts in blockchain systems, logic-based languages may be interesting alternatives. In this paper, we inspect what are the possible legal and technical (dis)advantages of logic-based smart contracts in light of common activities featuring ordinary contracts, then we provide insights on how to use such logic-based smart contracts ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Software Engineering
سال: 2023
ISSN: ['0098-5589', '1939-3520', '2326-3881']
DOI: https://doi.org/10.1109/tse.2023.3270117