Automated Generation of Security-Centric Descriptions for Smart Contract Bytecode

被引:0
|
作者
Pan, Yu [1 ]
Xu, Zhichao [1 ]
Li, Levi Taiji [1 ]
Yang, Yunhe [1 ]
Zhang, Mu [1 ]
机构
[1] Univ Utah, Salt Lake City, UT 84112 USA
关键词
decentralized apps; smart contracts; textual description; program analysis; natural language generation;
D O I
10.1145/3597926.3598132
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Smart contract and DApp users are taking great risks, as they do not obtain necessary knowledge that can help them avoid using vulnerable and malicious contract code. In this paper, we develop a novel system Tx2TXT that can automatically create security-centric textual descriptions directly from smart contract bytecode. To capture the security aspect of financial applications, we formally define a funds transfer graph to model critical funds flows in smart contracts. To ensure the expressiveness and conciseness of the descriptions derived from these graphs, we employ a GCN-based model to identify security-related condition statements and selectively add them to our graph models. To convert low-level bytecode instructions to human-readable textual scripts, we leverage robust API signatures to recover bytecode semantics. We have evaluated Tx2TXT on 890 well-labeled vulnerable, malicious and safe contracts where developer-crafted descriptions are available. Our results have shown that Tx2TXT outperforms state-of-the-art solutions and can effectively help end users avoid risky contracts.
引用
收藏
页码:1244 / 1256
页数:13
相关论文
共 50 条
  • [21] Automated negotiation from declarative contract descriptions
    Reeves, DM
    Wellman, MP
    Grosof, BN
    COMPUTATIONAL INTELLIGENCE, 2002, 18 (04) : 482 - 500
  • [22] Countering Intrusiveness Using New Security-Centric Ranking Algorithm Built on Top of Elasticsearch
    Mohsen, Fadi
    Abdelhaq, Hamed
    Bisgin, Halil
    Jolly, Andrew
    Szczepanski, Michael
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1048 - 1057
  • [23] Sniffing Serial-Based Substation Devices: A Complement to Security-Centric Data Collection
    Boakye-Boateng, Kwasi
    Siahaan, Ida S. R.
    Al Muktadir, Abu Hena
    Xu, Dongyang
    Ghorbani, Ali A.
    2021 IEEE PES INNOVATIVE SMART GRID TECHNOLOGY EUROPE (ISGT EUROPE 2021), 2021, : 286 - 291
  • [24] CrashTalk: Automated Generation of Precise, Human Readable, Descriptions of Software Security Bugs
    James, Kedrian
    Valakuzhy, Kevin
    Snow, Kevin
    Monrose, Fabian
    PROCEEDINGS OF THE FOURTEENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2024, 2024, : 337 - 347
  • [25] Automated generation of smart contract code from legal contract specifications with SYMBOLEO2SC
    Rasti, Aidin
    Anda, Amal Ahmed
    Alfuhaid, Sofana
    Parvizimosaed, Alireza
    Amyot, Daniel
    Roveri, Marco
    Logrippo, Luigi
    Mylopoulos, John
    SOFTWARE AND SYSTEMS MODELING, 2024,
  • [26] EXGEN: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities
    Jin, Ling
    Cao, Yinzhi
    Chen, Yan
    Zhang, Di
    Campanoni, Simone
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (01) : 650 - 664
  • [27] OPTIMUS: A Security-Centric Dynamic Hardware Partitioning Scheme for Processors that Prevent Microarchitecture State Attacks
    Omar, Hamza
    D'Agostino, Brandon
    Khan, Omer
    IEEE TRANSACTIONS ON COMPUTERS, 2020, 69 (11) : 1558 - 1570
  • [28] Security-Centric Investigation of Social Networks and Preventative Behavioral Analysis of Online Activity by the Kuleshov effect
    Ahmadzadegan, M. Hossein
    Ghorbani, Hamidreza
    Stahlbrost, Anna
    2020 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2020), 2020, : 271 - 276
  • [29] Smart Contract Vulnerability Detection Using Deep Learning Algorithms on EVM bytecode
    Prifti, Lejdi
    Cico, Betim
    Karras, Dimitrios
    2024 13TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING, MECO 2024, 2024, : 223 - 229
  • [30] WANA: Symbolic Execution of Wasm Bytecode for Extensible Smart Contract Vulnerability Detection
    Jiang, Bo
    Chen, Yifei
    Wang, Dong
    Ashraf, Imran
    Chan, W. K.
    2021 IEEE 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2021), 2021, : 926 - 937