Smart Contract Risk Assessment How Secure is the Contract You Are Calling

被引:0
|
作者
Li, Zexin [1 ]
Wang, Chao [1 ]
Zhang, Xucan [1 ]
Yu, Xiang [2 ]
Cui, Ting [3 ]
Yu, Yifan [4 ]
机构
[1] Guangzhou Univ, Guangdong Key Lab Blockchain Secur, Guangzhou 510006, Peoples R China
[2] Taizhou Univ, Sch Elect & Informat Engn, Taizhou 318000, Peoples R China
[3] Guangdong Univ Finance & Econ, Sch Econ, Guangzhou 510320, Peoples R China
[4] Jinan Univ, Sch Art, Guangzhou 510632, Peoples R China
关键词
Blockchain; smart contract security; dynamic analysis; risk assessment; vulnerability detection;
D O I
10.1007/978-3-031-77489-8_40
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Smart contracts, due to their decentralized nature and immutability, have demonstrated significant potential in various sectors such as finance and supply chains. However, as their applications have expanded, their security vulnerabilities have increasingly come to light. In response to the frequent occurrences of smart contract attacks, researchers have undertaken a series of studies, including the development of automated vulnerability detection tools, dynamic monitoring techniques, and vulnerability remediation strategies. However, these detection tools often rely on static analysis and fail to capture dynamic vulnerabilities that occur during runtime. Additionally, dynamic monitoring is limited by the ability to acquire and process real-time data, and it lacks the capability to globally analyze security risks during phased attacks. Similarly, mechanisms for updating vulnerabilities might inadvertently introduce new risks by leaving backdoors in smart contracts. To address these issues, this paper proposes a new method for assessing the reputation and evaluating the risks of smart contracts, aimed at enhancing the security of the blockchain ecosystem through the analysis of smart contract invocation trajectories. The effectiveness and practicality of this method have been validated by evaluating real attack cases that have occurred on-chain. Finally, the paper summarizes the research findings and explores potential future research directions, aiming to provide new insights and solutions for the field of smart contract security.
引用
收藏
页码:526 / 534
页数:9
相关论文
共 50 条
  • [1] How to support secure electronic contract signing
    Zhang, N
    Shi, Q
    COMMUNICATIONS AND MULTIMEDIA SECURITY, VOL 3, 1997, : 253 - 264
  • [2] Making Smart Contract Development More Secure and Easier
    Ren, Meng
    Ma, Fuchen
    Yin, Zijing
    Fu, Ying
    Li, Huizhong
    Chang, Wanli
    Jiang, Yu
    PROCEEDINGS OF THE 29TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '21), 2021, : 1360 - 1370
  • [3] Secure Blockchain Interworking Using Extended Smart Contract
    Fujimoto, Shingo
    Takeuchi, Takuma
    Higashikado, Yoshiki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2022, E105D (02) : 227 - 234
  • [4] A secure transaction and smart contract architecture for internet of vehicles
    Lin, Hua-Yi
    SCIENCE PROGRESS, 2024, 107 (04)
  • [5] Secure protocols for smart contract based insurance services
    Wilusz, Daniel
    Wojtowicz, Adam
    EXPERT SYSTEMS, 2022, 39 (09)
  • [6] Smart Contract-Based Secure Decentralized Smart Healthcare System
    Raj, Anu
    Prakash, Shiva
    INTERNATIONAL JOURNAL OF SOFTWARE INNOVATION, 2023, 11 (01) : 27 - 27
  • [7] YOU HAVE THE CONTRACT - NOW HOW DO YOU MOVE IT
    MCDONALD, D
    CONSULTING ENGINEER, 1984, 62 (04): : 67 - 70
  • [8] The Design and Implementation of a Secure Datastore Based on Ethereum Smart Contract
    Aldyaflah, Izdehar M.
    Zhao, Wenbing
    Upadhyay, Himanshu
    Lagos, Leonel
    APPLIED SCIENCES-BASEL, 2023, 13 (09):
  • [9] Secure Smart Contract System built on SMPC over Blockchain
    Zhu, Yan
    Song, Xiaoxu
    Yang, Shuai
    Qin, Yao
    Zhou, Qiong
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1539 - 1544
  • [10] Efficient and Secure Outsourcing of Modular Exponentiation Based on Smart Contract
    Xu, Danting
    Ren, Yanli
    Li, Xiangyu
    Feng, Guorui
    International Journal of Network Security, 2020, 22 (06) : 934 - 944