Papers
Topics
Authors
Recent
Search
2000 character limit reached

Hunting DeFi Vulnerabilities via Context-Sensitive Concolic Verification

Published 16 Apr 2024 in cs.SE | (2404.10376v1)

Abstract: Decentralized finance (DeFi) is revolutionizing the traditional centralized finance paradigm with its attractive features such as high availability, transparency, and tamper-proofing. However, attacks targeting DeFi services have severely damaged the DeFi market, as evidenced by our investigation of 80 real-world DeFi incidents from 2017 to 2022. Existing methods, based on symbolic execution, model checking, semantic analysis, and fuzzing, fall short in identifying the most DeFi vulnerability types. To address the deficiency, we propose Context-Sensitive Concolic Verification (CSCV), a method of automating the DeFi vulnerability finding based on user-defined properties formulated in temporal logic. CSCV builds and optimizes contexts to guide verification processes that dynamically construct context-carrying transition systems in tandem with concolic executions. Furthermore, we demonstrate the effectiveness of CSCV through experiments on real-world DeFi services and qualitative comparison. The experiment results show that our CSCV prototype successfully detects 76.25% of the vulnerabilities from the investigated incidents with an average time of 253.06 seconds.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (6)
  1. {ETHBMC}: A Bounded Model Checker for Smart Contracts. In 29th USENIX Security Symposium (USENIX Security 20), pages 2757–2774, 2020. ISBN 1-939133-17-3.
  2. sfuzz: An efficient adaptive fuzzer for solidity smart contracts. In Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, pages 778–788, 2020.
  3. SMARTIAN: Enhancing smart contract fuzzing with static and dynamic data-flow analyses. In 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE), pages 227–239. IEEE, 2021. ISBN 1-66540-337-3.
  4. SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution. In USENIX Security Symposium, pages 1361–1378, 2021.
  5. A survey of symbolic execution techniques. ACM Computing Surveys (CSUR), 51(3):1–39, 2018. ISBN: 0360-0300 Publisher: ACM New York, NY, USA.
  6. Handbook of model checking, volume 10. Springer, 2018.

Summary

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 1 tweet with 1 like about this paper.