SIGUARD: Detecting Signature-Related Vulnerabilities in Smart Contracts

被引:0
|
作者
Zhang, Jiashuo [1 ,2 ]
Li, Yue [1 ,2 ]
Gao, Jianbo [1 ,2 ]
Guan, Zhi [3 ]
Chen, Zhong [1 ,2 ]
机构
[1] Peking Univ, Key Lab High Confidence Software Technol, MoE, Beijing, Peoples R China
[2] Peking Univ, Sch Comp Sci, Beijing, Peoples R China
[3] Peking Univ, Natl Engn Res Ctr Software Engn, Beijing, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
smart contract; digital signature; software analysis; vulnerability detection;
D O I
10.1109/ICSE-Companion58688.2023.00019
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Ethereum smart contract enables developers to enforce access control policies of critical functions using built-in signature verification interfaces, i.e., ecrecover. However, due to the lack of best practices for these interfaces, improper verifications commonly exist in deployed smart contracts, leaving potential unauthorized access and financial losses. Even worse, the attack surface is ignored by both developers and existing smart contract security analyzers. In this paper, we take a close look at signature-related vulnerabilities and de-mystify them with clear classification and characterization. We present SIGUARD, the first automatic tool to detect these vulnerabilities in real-world smart contracts. Specifically, SIGUARD explores signature-related paths in the smart contract and extracts data dependencies based on symbolic execution and taint analysis. Then, it conducts vulnerability detection based on a systematic search for violations of standard patterns including EIP-712 and EIP-2621. The preliminary evaluation validated the efficacy of SIGUARD by reporting previously unknown vulnerabilities in deployed smart contracts on Ethereum. A video of SIGUARD is available at https://youtu.be/xXAEhqXWOu0.
引用
收藏
页码:31 / 35
页数:5
相关论文
共 50 条
  • [1] eTainter: Detecting Gas-Related Vulnerabilities in Smart Contracts
    Ghaleb, Asem
    Rubin, Julia
    Pattabiraman, Karthik
    PROCEEDINGS OF THE 31ST ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2022, 2022, : 728 - 739
  • [2] WASMOD: Detecting vulnerabilities in Wasm smart contracts
    Zhou J.
    Chen T.
    IET Blockchain, 2023, 3 (04): : 172 - 181
  • [3] ReDefender: Detecting Reentrancy Vulnerabilities in Smart Contracts Automatically
    Li, Bixin
    Pan, Zhenyu
    Hu, Tianyuan
    IEEE TRANSACTIONS ON RELIABILITY, 2022, 71 (02) : 984 - 999
  • [4] ReDefender: A Tool for Detecting Reentrancy Vulnerabilities in Smart Contracts Effectively
    Pan, Zhenyu
    Hu, Tianyuan
    Qian, Chen
    Li, Bixin
    2021 IEEE 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2021), 2021, : 915 - 925
  • [5] Detecting unknown vulnerabilities in smart contracts using opcode sequences
    Li, Peiqiang
    Wang, Guojun
    Xing, Xiaofei
    Li, Xiangbin
    Zhu, Jinyao
    CONNECTION SCIENCE, 2024, 36 (01)
  • [6] Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts
    Zhang, Wuqi
    Zhang, Zhuo
    Shi, Qingkai
    Liu, Lu
    Wei, Lili
    Liu, Yepang
    Zhang, Xiangyu
    Cheung, Shing-Chi
    45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 2198 - 2216
  • [7] Detecting unknown vulnerabilities in smart contracts with the CNN-BiLSTM model
    Gu, Wanyi
    Wang, Guojun
    Li, Peiqiang
    Zhai, Guangxin
    Li, Xubin
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (01)
  • [8] Security Vulnerabilities in Ethereum Smart Contracts
    Dika, Ardit
    Nowostawski, Mariusz
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 955 - 962
  • [9] Security Vulnerabilities in Ethereum Smart Contracts
    Mense, Alexander
    Flatscher, Markus
    IIWAS2018: THE 20TH INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES, 2014, : 375 - 380
  • [10] Ethereum Smart Contracts: Vulnerabilities and their Classifications
    Khan, Zulfiqar Ali
    Namin, Akbar Siami
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020,