When Contracts Meets Crypto: Exploring Developers' Struggles with
Ethereum Cryptographic APIs
- URL: http://arxiv.org/abs/2312.09685v1
- Date: Fri, 15 Dec 2023 10:58:53 GMT
- Title: When Contracts Meets Crypto: Exploring Developers' Struggles with
Ethereum Cryptographic APIs
- Authors: Jiashuo Zhang, Jiachi Chen, Zhiyuan Wan, Ting Chen, Jianbo Gao and
Zhong Chen
- Abstract summary: This study is the first empirical study on cryptographic practices.
Through the analysis of 91,484,856 transactions, 500 crypto-related contracts, and 483 StackExchange posts, we identify five categories of obstacles developers encounter.
We find that more than half of practitioners face more challenges in cryptographic tasks compared to general business logic in smart contracts.
- Score: 12.725464750889774
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: To empower smart contracts with the promising capabilities of cryptography,
Ethereum officially introduced a set of cryptographic APIs that facilitate
basic cryptographic operations within smart contracts, such as elliptic curve
operations. However, since developers are not necessarily cryptography experts,
requiring them to directly interact with these basic APIs has caused real-world
security issues and potential usability challenges. To guide future research
and solutions to these challenges, we conduct the first empirical study on
Ethereum cryptographic practices. Through the analysis of 91,484,856 Ethereum
transactions, 500 crypto-related contracts, and 483 StackExchange posts, we
provide the first in-depth look at cryptographic tasks developers need to
accomplish and identify five categories of obstacles they encounter.
Furthermore, we conduct an online survey with 78 smart contract practitioners
to explore their perspectives on these obstacles and elicit the underlying
reasons. We find that more than half of practitioners face more challenges in
cryptographic tasks compared to general business logic in smart contracts.
Their feedback highlights the gap between low-level cryptographic APIs and
high-level tasks they need to accomplish, emphasizing the need for improved
cryptographic APIs, task-based templates, and effective assistance tools. Based
on these findings, we provide practical implications for further improvements
and outline future research directions.
Related papers
- Demystifying and Detecting Cryptographic Defects in Ethereum Smart Contracts [14.203991954526789]
We conducted the first study aimed at demystifying and detecting cryptographic defects in smart contracts.
We proposed CrySol, a fuzzing-based tool to automate the detection of cryptographic defects in smart contracts.
We collected a large-scale dataset containing 25,745 real-world crypto-related smart contracts and evaluated CrySol's effectiveness on it.
arXiv Detail & Related papers (2024-08-09T08:40:08Z) - Vulnerability Detection in Ethereum Smart Contracts via Machine Learning: A Qualitative Analysis [0.0]
We analyze the state of the art in machine-learning vulnerability detection for smart contracts.
We discuss best practices to enhance the accuracy, scope, and efficiency of vulnerability detection in smart contracts.
arXiv Detail & Related papers (2024-07-26T10:09:44Z) - Effective Targeted Testing of Smart Contracts [0.0]
Since smart contracts are immutable, their bugs cannot be fixed, which may lead to significant monetary losses.
Our framework, Griffin, tackles this deficiency by employing a targeted symbolic execution technique for generating test data.
This paper discusses how smart contracts differ from legacy software in targeted symbolic execution and how these differences can affect the tool structure.
arXiv Detail & Related papers (2024-07-05T04:38:11Z) - Dual-view Aware Smart Contract Vulnerability Detection for Ethereum [5.002702845720439]
We propose a Dual-view Aware Smart Contract Vulnerability Detection Framework named DVDet.
The framework initially converts the source code and bytecode of smart contracts into weighted graphs and control flow sequences.
Comprehensive experiments on the dataset show that our method outperforms others in detecting vulnerabilities.
arXiv Detail & Related papers (2024-06-29T06:47:51Z) - Vulnerability Scanners for Ethereum Smart Contracts: A Large-Scale Study [44.25093111430751]
In 2023 alone, such vulnerabilities led to substantial financial losses exceeding a billion of US dollars.
Various tools have been developed to detect and mitigate vulnerabilities in smart contracts.
This study investigates the gap between the effectiveness of existing security scanners and the vulnerabilities that still persist in practice.
arXiv Detail & Related papers (2023-12-27T11:26:26Z) - Blockchain Large Language Models [65.7726590159576]
This paper presents a dynamic, real-time approach to detecting anomalous blockchain transactions.
The proposed tool, BlockGPT, generates tracing representations of blockchain activity and trains from scratch a large language model to act as a real-time Intrusion Detection System.
arXiv Detail & Related papers (2023-04-25T11:56:18Z) - Detecting DeFi Securities Violations from Token Smart Contract Code [0.4263043028086136]
Decentralized Finance (DeFi) is a system of financial products and services built and delivered through smart contracts on various blockchains.
This study aims to uncover whether we can identify DeFi projects potentially engaging in securities violations based on their tokens' smart contract code.
arXiv Detail & Related papers (2021-12-06T01:44:08Z) - OpenForensics: Large-Scale Challenging Dataset For Multi-Face Forgery
Detection And Segmentation In-The-Wild [48.67582300190131]
This paper presents a study on two new countermeasure tasks: multi-face forgery detection and segmentation in-the-wild.
Localizing forged faces among multiple human faces in unrestricted natural scenes is far more challenging than the traditional deepfake recognition task.
With its rich annotations, our OpenForensics dataset has great potentials for research in both deepfake prevention and general human face detection.
arXiv Detail & Related papers (2021-07-30T08:15:41Z) - Smart Contract Vulnerability Detection: From Pure Neural Network to
Interpretable Graph Feature and Expert Pattern Fusion [48.744359070088166]
Conventional smart contract vulnerability detection methods heavily rely on fixed expert rules.
Recent deep learning approaches alleviate this issue but fail to encode useful expert knowledge.
We develop automatic tools to extract expert patterns from the source code.
We then cast the code into a semantic graph to extract deep graph features.
arXiv Detail & Related papers (2021-06-17T07:12:13Z) - ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep
Neural Network and Transfer Learning [80.85273827468063]
Existing machine learning-based vulnerability detection methods are limited and only inspect whether the smart contract is vulnerable.
We propose ESCORT, the first Deep Neural Network (DNN)-based vulnerability detection framework for smart contracts.
We show that ESCORT achieves an average F1-score of 95% on six vulnerability types and the detection time is 0.02 seconds per contract.
arXiv Detail & Related papers (2021-03-23T15:04:44Z) - TextHide: Tackling Data Privacy in Language Understanding Tasks [54.11691303032022]
TextHide mitigates privacy risks without slowing down training or reducing accuracy.
It requires all participants to add a simple encryption step to prevent an eavesdropping attacker from recovering private text data.
We evaluate TextHide on the GLUE benchmark, and our experiments show that TextHide can effectively defend attacks on shared gradients or representations.
arXiv Detail & Related papers (2020-10-12T22:22:15Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.