The paper presents an empirical study that analyzes 281 attack incident reports to identify the characteristics of attacker contracts involved in reentrancy attacks. The study reveals three main types of reentrancy attacks: those exploiting the fallback function, those exploiting poor designs when using ERC tokens, and those exploiting user-defined interfaces.
Based on the insights from the empirical study, the authors propose BlockWatchdog, a tool that uses cross-contract static dataflow analysis to detect attacker contracts and the vulnerable contracts they target. BlockWatchdog first decompiles the contract bytecode to extract flow and external call information, then constructs the cross-contract control flow graph (xCFG) and cross-contract call graph (xCG) to perform taint analysis and identify attacker contracts.
The evaluation of BlockWatchdog on a ground-truth dataset of 18 attacker contracts shows a recall of 83.3%. When applied to a large-scale dataset of 421,889 Ethereum contracts, BlockWatchdog identified 113 true positive attacker contracts that targeted 159 victim contracts, leading to the theft of Ether and tokens valued at approximately 908.6 million USD. Only 18 of the 159 victim contracts could be detected by current reentrancy vulnerability detection tools.
Ke Bahasa Lain
dari konten sumber
arxiv.org
Wawasan Utama Disaring Dari
by Shuo Yang,Ji... pada arxiv.org 03-29-2024
https://arxiv.org/pdf/2403.19112.pdfPertanyaan yang Lebih Dalam