Smart Contract and DeFi Security Tools: Do They Meet the Needs of
Practitioners?
- URL: http://arxiv.org/abs/2304.02981v2
- Date: Mon, 22 Jan 2024 06:47:29 GMT
- Title: Smart Contract and DeFi Security Tools: Do They Meet the Needs of
Practitioners?
- Authors: Stefanos Chaliasos, Marcos Antonios Charalambous, Liyi Zhou, Rafaila
Galanopoulou, Arthur Gervais, Dimitris Mitropoulos, Ben Livshits
- Abstract summary: Attacks targeting smart contracts are increasing, causing an estimated $6.45 billion in financial losses.
We aim to shed light on the effectiveness of automated security tools in identifying vulnerabilities that can lead to high-profile attacks.
Our findings reveal a stark reality: the tools could have prevented a mere 8% of the attacks in our dataset, amounting to $149 million out of the $2.3 billion in losses.
- Score: 10.771021805354911
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The growth of the decentralized finance (DeFi) ecosystem built on blockchain
technology and smart contracts has led to an increased demand for secure and
reliable smart contract development. However, attacks targeting smart contracts
are increasing, causing an estimated \$6.45 billion in financial losses.
Researchers have proposed various automated security tools to detect
vulnerabilities, but their real-world impact remains uncertain.
In this paper, we aim to shed light on the effectiveness of automated
security tools in identifying vulnerabilities that can lead to high-profile
attacks, and their overall usage within the industry. Our comprehensive study
encompasses an evaluation of five SoTA automated security tools, an analysis of
127 high-impact real-world attacks resulting in \$2.3 billion in losses, and a
survey of 49 developers and auditors working in leading DeFi protocols. Our
findings reveal a stark reality: the tools could have prevented a mere 8% of
the attacks in our dataset, amounting to \$149 million out of the \$2.3 billion
in losses. Notably, all preventable attacks were related to reentrancy
vulnerabilities. Furthermore, practitioners distinguish logic-related bugs and
protocol layer vulnerabilities as significant threats that are not adequately
addressed by existing security tools. Our results emphasize the need to develop
specialized tools catering to the distinct demands and expectations of
developers and auditors. Further, our study highlights the necessity for
continuous advancements in security tools to effectively tackle the
ever-evolving challenges confronting the DeFi ecosystem.
Related papers
- Vulnerability Detection in Ethereum Smart Contracts via Machine Learning: A Qualitative Analysis [0.0]
We analyze the state of the art in machine-learning vulnerability detection for smart contracts.
We discuss best practices to enhance the accuracy, scope, and efficiency of vulnerability detection in smart contracts.
arXiv Detail & Related papers (2024-07-26T10:09:44Z) - Retrieval Augmented Generation Integrated Large Language Models in Smart Contract Vulnerability Detection [0.0]
Decentralized Finance (DeFi) has been accompanied by substantial financial losses due to smart contract vulnerabilities.
With attacks becoming more frequent, the necessity and demand for auditing services has escalated.
This study builds upon existing frameworks by integrating Retrieval-Augmented Generation (RAG) with large language models (LLMs)
arXiv Detail & Related papers (2024-07-20T10:46:42Z) - FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids [53.2306792009435]
FaultGuard is the first framework for fault type and zone classification resilient to adversarial attacks.
We propose a low-complexity fault prediction model and an online adversarial training technique to enhance robustness.
Our model outclasses the state-of-the-art for resilient fault prediction benchmarking, with an accuracy of up to 0.958.
arXiv Detail & Related papers (2024-03-26T08:51:23Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Vulnerability Scanners for Ethereum Smart Contracts: A Large-Scale Study [44.25093111430751]
In 2023 alone, such vulnerabilities led to substantial financial losses exceeding a billion of US dollars.
Various tools have been developed to detect and mitigate vulnerabilities in smart contracts.
This study investigates the gap between the effectiveness of existing security scanners and the vulnerabilities that still persist in practice.
arXiv Detail & Related papers (2023-12-27T11:26:26Z) - Survey on Quality Assurance of Smart Contracts [14.34073444030935]
With the increasing adoption of smart contracts, ensuring their security has become a critical concern.
We present a systematic overview of the quality assurance of smart contracts, covering vulnerabilities, attacks, defenses, and tool support.
In order to effectively protect smart contracts, we have created a labeled dataset to evaluate various vulnerability detection tools and compare their effectiveness.
arXiv Detail & Related papers (2023-11-01T03:36:24Z) - Empirical Review of Smart Contract and DeFi Security: Vulnerability
Detection and Automated Repair [36.46679501556185]
Decentralized Finance (DeFi) is emerging as a peer-to-peer financial ecosystem.
smart contracts hold a massive amount of value, making them an attractive target for attacks.
This paper reviews the progress made in the field of smart contract and DeFi security from the perspective of both vulnerability detection and automated repair.
arXiv Detail & Related papers (2023-09-05T17:00:42Z) - Designing an attack-defense game: how to increase robustness of
financial transaction models via a competition [69.08339915577206]
Given the escalating risks of malicious attacks in the finance sector, understanding adversarial strategies and robust defense mechanisms for machine learning models is critical.
We aim to investigate the current state and dynamics of adversarial attacks and defenses for neural network models that use sequential financial data as the input.
We have designed a competition that allows realistic and detailed investigation of problems in modern financial transaction data.
The participants compete directly against each other, so possible attacks and defenses are examined in close-to-real-life conditions.
arXiv Detail & Related papers (2023-08-22T12:53:09Z) - G$^2$uardFL: Safeguarding Federated Learning Against Backdoor Attacks
through Attributed Client Graph Clustering [116.4277292854053]
Federated Learning (FL) offers collaborative model training without data sharing.
FL is vulnerable to backdoor attacks, where poisoned model weights lead to compromised system integrity.
We present G$2$uardFL, a protective framework that reinterprets the identification of malicious clients as an attributed graph clustering problem.
arXiv Detail & Related papers (2023-06-08T07:15:04Z) - ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep
Neural Network and Transfer Learning [80.85273827468063]
Existing machine learning-based vulnerability detection methods are limited and only inspect whether the smart contract is vulnerable.
We propose ESCORT, the first Deep Neural Network (DNN)-based vulnerability detection framework for smart contracts.
We show that ESCORT achieves an average F1-score of 95% on six vulnerability types and the detection time is 0.02 seconds per contract.
arXiv Detail & Related papers (2021-03-23T15:04:44Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.