Automated Generation of Security-Centric Descriptions for Smart Contract Bytecode

被引:0
|
作者
Pan, Yu [1 ]
Xu, Zhichao [1 ]
Li, Levi Taiji [1 ]
Yang, Yunhe [1 ]
Zhang, Mu [1 ]
机构
[1] Univ Utah, Salt Lake City, UT 84112 USA
关键词
decentralized apps; smart contracts; textual description; program analysis; natural language generation;
D O I
10.1145/3597926.3598132
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Smart contract and DApp users are taking great risks, as they do not obtain necessary knowledge that can help them avoid using vulnerable and malicious contract code. In this paper, we develop a novel system Tx2TXT that can automatically create security-centric textual descriptions directly from smart contract bytecode. To capture the security aspect of financial applications, we formally define a funds transfer graph to model critical funds flows in smart contracts. To ensure the expressiveness and conciseness of the descriptions derived from these graphs, we employ a GCN-based model to identify security-related condition statements and selectively add them to our graph models. To convert low-level bytecode instructions to human-readable textual scripts, we leverage robust API signatures to recover bytecode semantics. We have evaluated Tx2TXT on 890 well-labeled vulnerable, malicious and safe contracts where developer-crafted descriptions are available. Our results have shown that Tx2TXT outperforms state-of-the-art solutions and can effectively help end users avoid risky contracts.
引用
收藏
页码:1244 / 1256
页数:13
相关论文
共 50 条
  • [31] Smart Contract Security: a Practitioners' Perspective
    Wan, Zhiyuan
    Xia, Xin
    Lo, David
    Chen, Jiachi
    Luo, Xiapu
    Yang, Xiaohu
    2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2021), 2021, : 1410 - 1422
  • [32] Security Code Recommendations for Smart Contract
    Zhou, Xiaocong
    Chen, Yingye
    Guo, Hanyang
    Chen, Xiangping
    Huang, Yuan
    2023 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING, SANER, 2023, : 190 - 200
  • [33] Realization of Logical NOT Based on Standard DRAM Cells for security-centric Compute-in-Memory applications
    Qiao, Zheng
    Li, Jie
    Liu, Chunyang
    Guo, Lei
    Ren, Pengpeng
    Ye, Sheng
    Zhou, Bo
    Zhang, Jianfu
    Ji, Zhigang
    Liu, Junhua
    Wang, Runsheng
    Huang, Ru
    6TH IEEE ELECTRON DEVICES TECHNOLOGY AND MANUFACTURING CONFERENCE (EDTM 2022), 2022, : 333 - 335
  • [34] Smart grid security based on blockchain and smart contract
    Zhang, Ming
    Liu, Yutong
    Cheng, Qian
    Li, Hui
    Liao, Dan
    Li, Huiyong
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (04) : 2167 - 2184
  • [35] Smart Grid Security A Smart Meter-Centric Perspective
    Vigo, Roberto
    Yuksel, Ender
    Ramli, Carroline Dewi Puspa Kencana
    2012 20TH TELECOMMUNICATIONS FORUM (TELFOR), 2012, : 127 - 130
  • [36] A Security-Centric Deep Learning Enabled Camera Solution for Real-Time Human Fall Detection
    Tohidypour, Hamid Reza
    Pourazad, Mahsa T.
    Nasiopoulos, Panos
    2022 18TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2022,
  • [37] A novel security-centric framework for D2D connectivity based on spatial and social proximity
    Ometov, Aleksandr
    Orsino, Antonino
    Militano, Leonardo
    Araniti, Giuseppe
    Moltchanov, Dmitri
    Andreev, Sergey
    COMPUTER NETWORKS, 2016, 107 : 327 - 338
  • [38] Semantic-aware Graph Neural Network for Smart Contract Bytecode Vulnerability Detection
    Zhao B.
    Shangguan C.
    Peng X.
    An Y.
    Tong J.
    Yuan A.
    Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2022, 54 (02): : 49 - 55
  • [39] Towards Automated Verification of Smart Contract Fairness
    Liu, Ye
    Li, Yi
    Lin, Shang-Wei
    Zhao, Rong
    PROCEEDINGS OF THE 28TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '20), 2020, : 666 - 677
  • [40] Smart Contract Vulnerability Analysis and Security Audit
    He, Daojing
    Deng, Zhi
    Zhang, Yuxing
    Chan, Sammy
    Cheng, Yao
    Guizani, Nadra
    IEEE NETWORK, 2020, 34 (05): : 276 - 282