Decentralized Finance (DeFi) applications built on blockchain technology are vulnerable to composability bugs, where vulnerabilities in one smart contract can impact the entire DeFi ecosystem. This paper proposes CPMM-Exploiter, a tool that automatically detects and generates exploits for vulnerabilities in Constant Product Market Maker (CPMM) decentralized exchanges.
The VELLET protocol introduces a wallet verifier that can match the audit trail of embedded wallets on smart contracts, incorporating a process to verify authenticity and integrity, addressing the security risks associated with embedded wallets.
Time-aware metapaths can capture real temporal account interaction patterns, and the proposed Time-aware Metapath Feature Augmentation (TMFAug) module can effectively improve the performance of existing Ponzi detection methods on Ethereum.
The core message of this paper is to introduce a novel non-parametric change detection algorithm to identify eclipse attacks on a blockchain network. The proposed algorithm relies only on the empirical mean and variance of the evolving blockchain communication network, making it highly adaptable.
This paper presents a comprehensive survey of the most common vulnerabilities in Ethereum smart contracts, including those posed by the fractionalization of non-fungible tokens (NFTs), and the corresponding mitigation schemes. It also provides an overview and comparison of the popular methodologies and tools used to detect these vulnerabilities.
Reentrancy vulnerabilities in smart contracts have led to significant financial losses, but current detection tools suffer from high false positive rates and limited capability in finding truly exploitable vulnerabilities. This paper proposes BlockWatchdog, a tool that focuses on detecting reentrancy vulnerabilities by identifying attacker contracts that automatically exploit vulnerable contracts.
Large language models can be guided by mined RBAC practices to effectively repair AC vulnerabilities in smart contracts.
Blockchain-based covert channels require contactless negotiation, indistinguishable transaction features, and untraceable communication identities for secure communication.
Novel collaborative learning framework for detecting attacks in blockchain transactions and smart contracts.
Proposing a post-quantum secure multivariate-based SSS, Mul-SAN, for efficient audit log management with accountability and privacy.