WANA: Symbolic Execution of Wasm Bytecode for Extensible Smart Contract Vulnerability Detection

被引:12
|
作者
Jiang, Bo [1 ]
Chen, Yifei [1 ]
Wang, Dong [1 ]
Ashraf, Imran [2 ]
Chan, W. K. [2 ]
机构
[1] Beihang Univ, Sch Comp Sci & Engn, Beijing, Peoples R China
[2] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
基金
国家重点研发计划;
关键词
WASM bytecode; Symbolic Execution; Smart Contract; Vulnerability Detection;
D O I
10.1109/QRS54544.2021.00102
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Many popular blockchain platforms support smart contracts for building decentralized applications. However, the vulnerabilities within smart contracts have demonstrated to lead to serious financial loss to their end users. In particular, the smart contracts on EOSIO smart contract platform have resulted in the loss of around 380K EOS tokens, which was around 1.9 million worth of USD at the time of attack. The EOSIO smart contract platform is based on the Wasm VM, which is also the underlying system supporting other smart contract platforms as well as Web application. In this work, we present WANA, an extensible smart contract vulnerability detection tool based on the symbolic execution for Wasm bytecode. WANA proposes a set of algorithms to detect the vulnerabilities in EOSIO smart contracts based on Wasm bytecode analysis. Our experimental analysis shows that WANA can effectively and efficiently detect vulnerabilities in EOSIO smart contracts. Furthermore, our case study also demonstrates that WANA can be extended to effectively detect vulnerabilities in Ethereum smart contracts.
引用
收藏
页码:926 / 937
页数:12
相关论文
共 50 条
  • [1] Smart Contract Vulnerability Detection Based on Symbolic Execution Technology
    Liu, Yiping
    Xu, Jie
    Cui, Baojiang
    CYBER SECURITY, CNCERT 2021, 2022, 1506 : 193 - 207
  • [2] Smart contract vulnerability detection based on a bytecode critical path
    Yin, Guisheng
    Gao, Le
    Zhuang, Yuan
    Li, Jun
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2022, 43 (02): : 255 - 261
  • [3] Park: Accelerating Smart Contract Vulnerability Detection via Parallel-Fork Symbolic Execution
    Zheng, Peilin
    Zheng, Zibin
    Luo, Xiapu
    PROCEEDINGS OF THE 31ST ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2022, 2022, : 740 - 751
  • [4] Smart Contract Vulnerability Detection Using Deep Learning Algorithms on EVM bytecode
    Prifti, Lejdi
    Cico, Betim
    Karras, Dimitrios
    2024 13TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING, MECO 2024, 2024, : 223 - 229
  • [5] Semantic-aware Graph Neural Network for Smart Contract Bytecode Vulnerability Detection
    Zhao B.
    Shangguan C.
    Peng X.
    An Y.
    Tong J.
    Yuan A.
    Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2022, 54 (02): : 49 - 55
  • [6] Smart Contract Symbol Execution Vulnerability Detection Method Based on CFG Path Pruning
    Wang, Yichuan
    Zhao, Jingjing
    Zhang, Yaling
    Hei, Xinhong
    Zhu, Lei
    PROCEEDINGS OF THE 5TH ACM INTERNATIONAL SYMPOSIUM ON BLOCKCHAIN AND SECURE CRITICAL INFRASTRUCTURE, ACM BSCI 2023, 2023, : 132 - 139
  • [7] FlawCheck: Detecting Smart Contract Vulnerabilities Based on Symbolic Execution
    Gou, Naixiang
    Zhao, Xiangfu
    Wang, Shiji
    Zhang, Hanfeng
    Yang, Jiahui
    SECURITY AND PRIVACY, 2025, 8 (02):
  • [8] DefectChecker: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode
    Chen, Jiachi
    Xia, Xin
    Lo, David
    Grundy, John
    Luo, Xiapu
    Chen, Ting
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2021, 48 (07) : 2189 - 2207
  • [9] Smart Contract Vulnerability Detection Technique: A Survey
    Qian P.
    Liu Z.-G.
    He Q.-M.
    Huang B.-T.
    Tian D.-Z.
    Wang X.
    Ruan Jian Xue Bao/Journal of Software, 2022, 33 (08): : 3059 - 3085
  • [10] An Efficient Smart Contracts Event Ordering Vulnerability Detection System Based on Symbolic Execution and Fuzz Testing
    Li, Yitao
    Cui, Baojiang
    Wang, Dongbin
    Yu, Yue
    Zhang, Can
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS 2024, 2024, 214 : 280 - 287