Automated Generation of Security-Centric Descriptions for Smart Contract Bytecode

被引:0
|
作者
Pan, Yu [1 ]
Xu, Zhichao [1 ]
Li, Levi Taiji [1 ]
Yang, Yunhe [1 ]
Zhang, Mu [1 ]
机构
[1] Univ Utah, Salt Lake City, UT 84112 USA
关键词
decentralized apps; smart contracts; textual description; program analysis; natural language generation;
D O I
10.1145/3597926.3598132
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Smart contract and DApp users are taking great risks, as they do not obtain necessary knowledge that can help them avoid using vulnerable and malicious contract code. In this paper, we develop a novel system Tx2TXT that can automatically create security-centric textual descriptions directly from smart contract bytecode. To capture the security aspect of financial applications, we formally define a funds transfer graph to model critical funds flows in smart contracts. To ensure the expressiveness and conciseness of the descriptions derived from these graphs, we employ a GCN-based model to identify security-related condition statements and selectively add them to our graph models. To convert low-level bytecode instructions to human-readable textual scripts, we leverage robust API signatures to recover bytecode semantics. We have evaluated Tx2TXT on 890 well-labeled vulnerable, malicious and safe contracts where developer-crafted descriptions are available. Our results have shown that Tx2TXT outperforms state-of-the-art solutions and can effectively help end users avoid risky contracts.
引用
收藏
页码:1244 / 1256
页数:13
相关论文
共 50 条
  • [41] Smart Contract Security: A Software Lifecycle Perspective
    Huang, Yongfeng
    Bian, Yiyang
    Li, Renpu
    Zhao, J. Leon
    Shi, Peizhong
    IEEE ACCESS, 2019, 7 : 150184 - 150202
  • [42] LedgerHedger: Gas Reservation for Smart Contract Security
    Tsabary, Itay
    Manuskin, Alex
    Bar-Zur, Roi
    Eyal, Ittay
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2024, PT I, 2025, 14744 : 248 - 270
  • [43] Contractual Security and Privacy Security of Smart Contract: A System Mapping Study
    Hu T.-Y.
    Li Z.-C.
    Li B.-X.
    Bao Q.-H.
    Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (12): : 2485 - 2514
  • [44] Protocol-Based Smart Contract Generation
    Falcao, Afonso
    Mordido, Andreia
    Vasconcelos, Vasco T.
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY. FC 2022 INTERNATIONAL WORKSHOPS, 2023, 13412 : 555 - 582
  • [45] A survey on automation approaches of smart contract generation
    Mars, Rawya
    Cheikhrouhou, Saoussen
    Kallel, Slim
    Hadj Kacem, Ahmed
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (14): : 16065 - 16097
  • [46] A survey on automation approaches of smart contract generation
    Rawya Mars
    Saoussen Cheikhrouhou
    Slim Kallel
    Ahmed Hadj Kacem
    The Journal of Supercomputing, 2023, 79 : 16065 - 16097
  • [47] Ethainter: A Smart Contract Security Analyzer for Composite Vulnerabilities
    Brent, Lexi
    Grech, Neville
    Lagouvardos, Sifis
    Scholz, Bernhard
    Smaragdakis, Yannis
    PROCEEDINGS OF THE 41ST ACM SIGPLAN CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI '20), 2020, : 454 - 469
  • [48] Security Analysis of the Combination of Smart Contract and Artificial Intelligence
    Chen, Yan
    Wei, Zunbo
    Ma, Jue
    Kuang, Haiyan
    Zhang, Yijian
    Zhang, Qing
    Sun, Shuning
    Chen, Jianghao
    Chen, Xiaofeng
    COMPUTATIONAL AND EXPERIMENTAL SIMULATIONS IN ENGINEERING, ICCES 2024-VOL 2, 2025, 173 : 892 - 906
  • [49] A smart contract system for security of payment of construction contracts
    Ahmadisheykhsarmast, Salar
    Sonmez, Rifat
    AUTOMATION IN CONSTRUCTION, 2020, 120
  • [50] Bytecode Similarity Detection of Smart Contract across Optimization Options and Compiler Versions Based on Triplet Network
    Zhu, Di
    Yue, Feng
    Pang, Jianmin
    Zhou, Xin
    Han, Wenjie
    Liu, Fudong
    ELECTRONICS, 2022, 11 (04)