Proceedings of the 15th ACM Asia Conference on Computer and Communications Security 2020
DOI: 10.1145/3320269.3384756
|View full text |Cite
|
Sign up to set email alerts
|

ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks

Abstract: In recent years, smart contracts have suffered major exploits, costing millions of dollars. Unlike traditional programs, smart contracts are deployed on a blockchain. As such, they cannot be modified once deployed. Though various tools have been proposed to detect vulnerable smart contracts, the majority fails to protect vulnerable contracts that have already been deployed on the blockchain. Only very few solutions have been proposed so far to tackle the issue of post-deployment. However, these solutions suffe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 33 publications
(18 citation statements)
references
References 30 publications
0
18
0
Order By: Relevance
“…Horus has flagged none of the 14 false positives. Next, we compare our results to AEGIS [14,16]. Horus successfully detected the 7 contracts that were reported by AEGIS.…”
Section: Validationmentioning
confidence: 96%
See 1 more Smart Citation
“…Horus has flagged none of the 14 false positives. Next, we compare our results to AEGIS [14,16]. Horus successfully detected the 7 contracts that were reported by AEGIS.…”
Section: Validationmentioning
confidence: 96%
“…Sereum [36] proposes a modified EVM to protect deployed smart contracts against reentrancy attacks. AEGIS [14,16] presents a smart contract and a DSL to protect against all kinds of runtime attacks. SODA [3] uses a modified Ethereum client to inject custom modules for the online detection of malicious transactions.…”
Section: Related Workmentioning
confidence: 99%
“…We generalize all the threat models by subdividing them into three major groups: victim contract, malicious contract, and hybrid malicious or victim contract. Sereum [133], teEther [97], Hydra [42], Osiris [149], SODA [53], AEGIS [65], EVMPatch [134], SeRIF [47], and OpenZeppelin Contracts [9] are threat mitigation solutions with the vulnerable contract threat model. Solutions with malicious contract threat models are the Ethereum honeypot detector HoneyBadger [150], GASPER [54], and the social engineering attack detector by Ivanov et al [88].…”
Section: Threat Modelmentioning
confidence: 99%
“…Previous studies proposed smart contract-level multi-signature voting schemes. AEGIS [10] implements a voting-based mechanism, in which trusted experts vote for a security patch. Unfortunately, the voting mechanism in AEGIS has been design for different context and cannot be applied, even with modifications, to the trustee-based contract maintenance scenarios.…”
Section: Related Workmentioning
confidence: 99%