Detecting DeFi Securities Violations from Token Smart Contract Code
- URL: http://arxiv.org/abs/2112.02731v5
- Date: Fri, 26 May 2023 12:07:44 GMT
- Title: Detecting DeFi Securities Violations from Token Smart Contract Code
- Authors: Arianna Trozze, Bennett Kleinberg, and Toby Davies
- Abstract summary: Decentralized Finance (DeFi) is a system of financial products and services built and delivered through smart contracts on various blockchains.
This study aims to uncover whether we can identify DeFi projects potentially engaging in securities violations based on their tokens' smart contract code.
- Score: 0.4263043028086136
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: Decentralized Finance (DeFi) is a system of financial products and services
built and delivered through smart contracts on various blockchains. In the past
year, DeFi has gained popularity and market capitalization. However, it has
also been connected to crime, in particular, various types of securities
violations. The lack of Know Your Customer requirements in DeFi poses
challenges to governments trying to mitigate potential offending in this space.
This study aims to uncover whether this problem is suited to a machine learning
approach, namely, whether we can identify DeFi projects potentially engaging in
securities violations based on their tokens' smart contract code. We adapt
prior work on detecting specific types of securities violations across
Ethereum, building classifiers based on features extracted from DeFi projects'
tokens' smart contract code (specifically, opcode-based features). Our final
model is a random forest model that achieves an 80\% F-1 score against a
baseline of 50\%. Notably, we further explore the code-based features that are
most important to our model's performance in more detail, analyzing tokens'
Solidity code and conducting cosine similarity analyses. We find that one
element of the code our opcode-based features may be capturing is the
implementation of the SafeMath library, though this does not account for the
entirety of our features. Another contribution of our study is a new data set,
comprised of (a) a verified ground truth data set for tokens involved in
securities violations and (b) a set of legitimate tokens from a reputable DeFi
aggregator. This paper further discusses the potential use of a model like ours
by prosecutors in enforcement efforts and connects it to the wider legal
context.
Related papers
- Privacy Risks of Speculative Decoding in Large Language Models [2.869014888726965]
Speculative decoding in large language models (LLMs) accelerates token generation by speculatively predicting multiple tokens cheaply and verifying them in parallel.
We observe that input-dependent patterns of correct and incorrect predictions can be leaked out to an adversary monitoring token generation times and packet sizes.
We show that a malicious adversary can fingerprint queries and learn private user inputs with more than $90%$ accuracy across three different speculative decoding techniques.
arXiv Detail & Related papers (2024-11-01T23:14:30Z) - Effective Targeted Testing of Smart Contracts [0.0]
Since smart contracts are immutable, their bugs cannot be fixed, which may lead to significant monetary losses.
Our framework, Griffin, tackles this deficiency by employing a targeted symbolic execution technique for generating test data.
This paper discusses how smart contracts differ from legacy software in targeted symbolic execution and how these differences can affect the tool structure.
arXiv Detail & Related papers (2024-07-05T04:38:11Z) - SoK: Decentralized Finance (DeFi) -- Fundamentals, Taxonomy and Risks [0.40462801392105]
Decentralized Finance (DeFi) refers to financial services that are not necessarily related to crypto-currencies.
This work systematically presents the major categories of DeFi protocols that cover over 90% of total value locked (TVL) in DeFi.
Every DeFi protocol is classified into one of three groups: liquidity pools, pegged and synthetic tokens, and aggregator protocols, followed by risk analysis.
arXiv Detail & Related papers (2024-04-17T11:42:53Z) - LookAhead: Preventing DeFi Attacks via Unveiling Adversarial Contracts [15.071155232677643]
Decentralized Finance (DeFi) incidents have resulted in financial damages exceeding 3 billion US dollars.
Current detection tools face significant challenges in identifying attack activities effectively.
We propose a new direction for detecting DeFi attacks that focuses on identifying adversarial contracts.
arXiv Detail & Related papers (2024-01-14T11:39:33Z) - Transaction Fraud Detection via an Adaptive Graph Neural Network [64.9428588496749]
We propose an Adaptive Sampling and Aggregation-based Graph Neural Network (ASA-GNN) that learns discriminative representations to improve the performance of transaction fraud detection.
A neighbor sampling strategy is performed to filter noisy nodes and supplement information for fraudulent nodes.
Experiments on three real financial datasets demonstrate that the proposed method ASA-GNN outperforms state-of-the-art ones.
arXiv Detail & Related papers (2023-07-11T07:48:39Z) - Leveraging Machine Learning for Multichain DeFi Fraud Detection [5.213509776274283]
We present a framework for extracting features from different chains, including the largest one, and it is evaluated over an extensive dataset.
Different Machine Learning methods were employed, such as XGBoost and a Neural Network for identifying fraud accounts detection interacting with DeFi.
We demonstrate that the introduction of novel DeFi-related features, significantly improves the evaluation results.
arXiv Detail & Related papers (2023-05-17T15:48:21Z) - FedSOV: Federated Model Secure Ownership Verification with Unforgeable
Signature [60.99054146321459]
Federated learning allows multiple parties to collaborate in learning a global model without revealing private data.
We propose a cryptographic signature-based federated learning model ownership verification scheme named FedSOV.
arXiv Detail & Related papers (2023-05-10T12:10:02Z) - Blockchain Large Language Models [65.7726590159576]
This paper presents a dynamic, real-time approach to detecting anomalous blockchain transactions.
The proposed tool, BlockGPT, generates tracing representations of blockchain activity and trains from scratch a large language model to act as a real-time Intrusion Detection System.
arXiv Detail & Related papers (2023-04-25T11:56:18Z) - PEOPL: Characterizing Privately Encoded Open Datasets with Public Labels [59.66777287810985]
We introduce information-theoretic scores for privacy and utility, which quantify the average performance of an unfaithful user.
We then theoretically characterize primitives in building families of encoding schemes that motivate the use of random deep neural networks.
arXiv Detail & Related papers (2023-03-31T18:03:53Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep
Neural Network and Transfer Learning [80.85273827468063]
Existing machine learning-based vulnerability detection methods are limited and only inspect whether the smart contract is vulnerable.
We propose ESCORT, the first Deep Neural Network (DNN)-based vulnerability detection framework for smart contracts.
We show that ESCORT achieves an average F1-score of 95% on six vulnerability types and the detection time is 0.02 seconds per contract.
arXiv Detail & Related papers (2021-03-23T15:04:44Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.