An Expert Knowledge Generation Model in Smart Contract Vulnerability Fuzzing

被引:0
|
作者
Li, Xing [1 ]
机构
[1] Henan Univ, Software Coll, Kaifeng 475000, Peoples R China
关键词
smart contracts; vulnerability detection; fuzzing; classification model; taint analysis;
D O I
10.1109/BigDataSecurity-HPSC-IDS58521.2023.00019
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the development of smart contracts, the complexity of smart contracts continues to increase. Vulnerabilities may he hidden in complex contracts, which brings great hidden dangers to the development of contracts. Many fuzzing methods are used to detect contract vulnerabilities. Fuzzing requires expert knowledge as a rule for vulnerability detection. Expert knowledge depends on the induction of professionals, which lags behind the development of vulnerabilities. Although there are some methods using neural network classification models to solve the problem of expert knowledge generation, they do not consider the challenges brought by global variables. Global variables may carry dangerous data, which indirectly leads to vulnerabilities. The existing expert knowledge model does not analyze the semantics of global variables. To address this issue, we propose a model based on transaction bytecode and global variable semantics. We build a dynamic taint analysis model to capture the semantics of global variables. By capturing the global semantics, we solve the problem that global variables poses for expert knowledge generation models. We experimentally compare models with and without global variable semantics. Experiments show that our method is able to detect more vulnerabilities.
引用
收藏
页码:51 / 56
页数:6
相关论文
共 50 条
  • [1] CrossFuzz: Cross-contract fuzzing for smart contract vulnerability detection
    Yang, Huiwen
    Gu, Xiguo
    Chen, Xiang
    Zheng, Liwei
    Cui, Zhanqi
    SCIENCE OF COMPUTER PROGRAMMING, 2024, 234
  • [2] Combining Graph Neural Networks With Expert Knowledge for Smart Contract Vulnerability Detection
    Liu, Zhenguang
    Qian, Peng
    Wang, Xiaoyang
    Zhuang, Yuan
    Qiu, Lin
    Wang, Xun
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (02) : 1296 - 1310
  • [3] Towards Smart Contract Fuzzing on GPUs
    Chen, Weimin
    Luo, Xiapu
    Cai, Haipeng
    Wang, Haoyu
    45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 2255 - 2272
  • [4] EF(sic)CF: High Performance Smart Contract Fuzzing for Exploit Generation
    Rodler, Michael
    Paassen, David
    Li, Wenting
    Bernhard, Lukas
    Holz, Thorsten
    Karame, Ghassan
    Davi, Lucas
    2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 449 - 471
  • [5] Correctness Detection of Smart Contract Based on Fuzzing
    Wang, Jiacheng
    Jiang, Jiajia
    Zhao, Jiahao
    Zhang, Yushu
    Wang, Liangmin
    Computer Engineering and Applications, 2024, 60 (05) : 307 - 320
  • [6] A Guided Mutation Strategy for Smart Contract Fuzzing
    Ji, Songyan
    Dong, Jian
    Wu, Jin
    Lu, Lishi
    2023 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION, ICSME, 2023, : 282 - 292
  • [7] SGDL: Smart contract vulnerability generation via deep learning
    Chu, Hanting
    Zhang, Pengcheng
    Dong, Hai
    Xiao, Yan
    Ji, Shunhui
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2024,
  • [8] A Smart Contract Vulnerability Detection Mechanism Based on Deep Learning and Expert Rules
    Liu, Zhenpeng
    Jiang, Mingxiao
    Zhang, Shengcong
    Zhang, Jialiang
    Liu, Yi
    IEEE ACCESS, 2023, 11 : 77990 - 77999
  • [9] Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting
    Liu, Zhenguang
    Qian, Peng
    Yang, Jiaxu
    Liu, Lingfeng
    Xu, Xiaojun
    He, Qinming
    Zhang, Xiaosong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 1237 - 1251
  • [10] Towards Auto Contract Generation and Ensemble-based Smart Contract Vulnerability Detection
    Puducherry, K. Lakshminarayana
    Puducherry, K. Sathiyamurthy
    INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING SYSTEMS, 2022, 13 (09) : 747 - 757