Source Code Obfuscation for Smart Contracts

被引:10
|
作者
Zhang, Meng [1 ]
Zhang, Pengcheng [1 ]
Luo, Xiapu [2 ]
Xiao, Feng [1 ]
机构
[1] Hohai Univ, Coll Comp & Informat, Nanjing, Peoples R China
[2] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Peoples R China
关键词
Ethereum; smart contract; obfuscation;
D O I
10.1109/APSEC51365.2020.00069
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
State-of-the-art work of evaluating smart contract static analysis tools faces a major problem: most test cases (i.e., labeled buggy contracts) are too simple and lack complexity, which makes the evaluation unable to show the real performance of the analysis tools when complex contracts are analyzed. To fill the gap, we propose a novel source code obfuscation approach for Ethereum smart contracts. We use the buggy contracts in the public dataset(1) to evaluate our approach. The evaluation result shows that our approach can effectively increase the complexity of a contract. Besides, we use obfuscated contracts to evaluate the static analysis tools. The evaluation result shows that the performance of most smart contract static analysis tools decreases in different degree when the original contracts are obfuscated.
引用
收藏
页码:513 / 514
页数:2
相关论文
共 50 条
  • [1] BiAn: Smart Contract Source Code Obfuscation
    Zhang, Pengcheng
    Yu, Qifan
    Xiao, Yan
    Dong, Hai
    Luo, Xiapu
    Wang, Xiao
    Zhang, Meng
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2023, 49 (09) : 4456 - 4476
  • [2] Bytecode Obfuscation for Smart Contracts
    Yu, Qifan
    Zhang, Pengcheng
    Dong, Hai
    Xiao, Yan
    Ji, Shunhui
    [J]. 2022 29TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, APSEC, 2022, : 566 - 567
  • [3] Analysis of Source Code Duplication in Ethreum Smart Contracts
    Pierro, Giuseppe Antonio
    Tonelli, Roberto
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER 2021), 2021, : 701 - 707
  • [4] Ethereum smart contracts: Analysis and statistics of their source code and opcodes
    Bistarelli, Stefano
    Mazzante, Gianmarco
    Micheletti, Matteo
    Mostarda, Leonardo
    Sestili, Davide
    Tiezzi, Francesco
    [J]. INTERNET OF THINGS, 2020, 11
  • [5] Assessment of Source Code Obfuscation Techniques
    Viticchie, Alessio
    Regano, Leonardo
    Torchiano, Marco
    Basile, Cataldo
    Ceccato, Mariano
    Tonella, Paolo
    Tiella, Roberto
    [J]. 2016 IEEE 16TH INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM), 2016, : 11 - 20
  • [6] Smart contract watermarking based on code obfuscation
    Huang, Teng
    Huang, Jiahui
    Pang, Yan
    Yan, Hongyang
    [J]. INFORMATION SCIENCES, 2023, 628 : 439 - 448
  • [7] Cryptographic obfuscation for smart contracts: Trustless bitcoin bridge and more
    Suegami, Sora
    [J]. BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2023, 4 (01):
  • [8] A Framework to Quantify the Quality of Source Code Obfuscation
    Jin, Hongjoo
    Lee, Jiwon
    Yang, Sumin
    Kim, Kijoong
    Lee, Dong Hoon
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (12):
  • [9] Array Data Transformation for Source Code Obfuscation
    Praveen, S.
    Lal, P. Sojan
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 21, 2007, 21 : 420 - +
  • [10] Implementation of Obfuscation Technique on PHP Source Code
    Maskur, Maskur
    Sari, Zamah
    Miftakh, Ahmad Sirojul
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI 2018), 2018, : 738 - 742