Nothing Special   »   [go: up one dir, main page]

Huang et al., 2021 - Google Patents

Hunting vulnerable smart contracts via graph embedding based bytecode matching

Huang et al., 2021

View PDF
Document ID
1194021393478563313
Author
Huang J
Han S
You W
Shi W
Liang B
Wu J
Wu Y
Publication year
Publication venue
IEEE Transactions on Information Forensics and Security

External Links

Snippet

Smart contract vulnerabilities have attracted lots of concerns due to the resultant financial losses. Matching-based detection methods extrapolating known vulnerabilities to unknown have proven to be effective in other platforms. However, directly adopting the technique to …
Continue reading at rucsesec.github.io (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • G06F11/3612Software analysis for verifying properties of programs by runtime analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformations of program code
    • G06F8/41Compilation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition

Similar Documents

Publication Publication Date Title
Huang et al. Hunting vulnerable smart contracts via graph embedding based bytecode matching
Chen et al. Tokenscope: Automatically detecting inconsistent behaviors of cryptocurrency tokens in ethereum
Wang et al. Detecting nondeterministic payment bugs in ethereum smart contracts
He et al. {EOSAFE}: security analysis of {EOSIO} smart contracts
Liu et al. S-gram: towards semantic-aware security auditing for ethereum smart contracts
Qian et al. Smart contract vulnerability detection technique: A survey
Xue et al. xfuzz: Machine learning guided cross-contract fuzzing
Cai et al. Combine sliced joint graph with graph neural networks for smart contract vulnerability detection
Zhang et al. BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation
Chen et al. When chatgpt meets smart contract vulnerability detection: How far are we?
Padmanabhuni et al. Auditing buffer overflow vulnerabilities using hybrid static–dynamic analysis
Le et al. GuruWS: A hybrid platform for detecting malicious web shells and web application vulnerabilities
Huang et al. Precise dynamic symbolic execution for nonuniform data access in smart contracts
Meng et al. Assisting in auditing of buffer overflow vulnerabilities via machine learning
Liu et al. Vulnerable Smart Contract Function Locating Based on Multi-Relational Nested Graph Convolutional Network
Li et al. Eosioanalyzer: An effective static analysis vulnerability detection framework for eosio smart contracts
Li et al. SmartFast: an accurate and robust formal analysis tool for Ethereum smart contracts
Pakshad et al. A security vulnerability predictor based on source code metrics
Li et al. VulHunter: Hunting Vulnerable Smart Contracts at EVM bytecode-level via Multiple Instance Learning
Fu et al. Focus: Function clone identification on cross‐platform
Zhang et al. Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts
Vidal et al. Vulnerability detection techniques for smart contracts: A systematic literature review
Zhang et al. BiAn: smart contract source code obfuscation
Qiu et al. Vulnerability detection via multiple-graph-based code representation
Li et al. COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart Contracts