[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Huang et al., 2021 - Google Patents

Hunting vulnerable smart contracts via graph embedding based bytecode matching

Huang et al., 2021

View PDF
Document ID
1194021393478563313
Author
Huang J
Han S
You W
Shi W
Liang B
Wu J
Wu Y
Publication year
Publication venue
IEEE Transactions on Information Forensics and Security

External Links

Snippet

Smart contract vulnerabilities have attracted lots of concerns due to the resultant financial losses. Matching-based detection methods extrapolating known vulnerabilities to unknown have proven to be effective in other platforms. However, directly adopting the technique to …
Continue reading at rucsesec.github.io (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • G06F11/3612Software analysis for verifying properties of programs by runtime analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformations of program code
    • G06F8/41Compilation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition

Similar Documents

Publication Publication Date Title
Huang et al. Hunting vulnerable smart contracts via graph embedding based bytecode matching
Wang et al. Detecting nondeterministic payment bugs in ethereum smart contracts
Chen et al. Tokenscope: Automatically detecting inconsistent behaviors of cryptocurrency tokens in ethereum
He et al. {EOSAFE}: security analysis of {EOSIO} smart contracts
Qian et al. Smart contract vulnerability detection technique: A survey
Liu et al. S-gram: towards semantic-aware security auditing for ethereum smart contracts
Zhang et al. Ethploit: From fuzzing to efficient exploit generation against smart contracts
Zhang et al. BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation
Le et al. Guruws: A hybrid platform for detecting malicious web shells and web application vulnerabilities
Li et al. Cobra: interaction-aware bytecode-level vulnerability detector for smart contracts
Li et al. Guardians of the ledger: Protecting decentralized exchanges from state derailment defects
Li et al. SmartFast: an accurate and robust formal analysis tool for Ethereum smart contracts
Padmanabhuni et al. Auditing buffer overflow vulnerabilities using hybrid static–dynamic analysis
Qiu et al. Vulnerability detection via multiple-graph-based code representation
Zhang et al. Bian: Smart contract source code obfuscation
Zhang et al. Nyx: Detecting exploitable front-running vulnerabilities in smart contracts
Li et al. EOSIOAnalyzer: an effective static analysis vulnerability detection framework for EOSIO smart contracts
Huang et al. Precise dynamic symbolic execution for nonuniform data access in smart contracts
Fu et al. Focus: Function clone identification on cross‐platform
Pakshad et al. A security vulnerability predictor based on source code metrics
Wang et al. A systematic literature review on smart contract vulnerability detection by symbolic execution
Wang et al. ContractCheck: checking ethereum smart contracts in fine-grained level
Meng et al. Assisting in auditing of buffer overflow vulnerabilities via machine learning
Ren et al. LookAhead: Preventing DeFi Attacks via Unveiling Adversarial Contracts
Zhang et al. Scanogenerator: Automatic anomaly injection for ethereum smart contracts