2022
DOI: 10.1109/tse.2021.3123170
|View full text |Cite
|
Sign up to set email alerts
|

Aroc: An Automatic Repair Framework for On-Chain Smart Contracts

Abstract: Ongoing smart contract attack events have seriously impeded the practical application of blockchain. Although lots of researches have been conducted, they mostly focus on off-chain vulnerability detection. However, smart contracts cannot be modified once they have been deployed on-chain, thus existing techniques cannot protect those deployed contracts from being attacked. To mitigate this problem, we propose a general smart contract repairer named Aroc, which can automatically patch vulnerable deployed contrac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 25 publications
0
7
0
Order By: Relevance
“…Researchers also propose templates as an alternative way to unify smart contract design. For example, Jin et al [17] developed the Aroc tool, which generates a patch contract containing security rules based on the fixed template and deploys it to the blockchain. Templates are also the subject of other research.…”
Section: Related Workmentioning
confidence: 99%
“…Researchers also propose templates as an alternative way to unify smart contract design. For example, Jin et al [17] developed the Aroc tool, which generates a patch contract containing security rules based on the fixed template and deploys it to the blockchain. Templates are also the subject of other research.…”
Section: Related Workmentioning
confidence: 99%
“…IEEE 50 20 29 1 [Dharanikota et al 2021], [Dingman et al 2019], [Zeng et al 2022], [Tsiounis and Kontogiannis 2022], [Qasse et al 2021], [Barišić et al 2021], [Feist et al 2019], [Ferreira et al 2020], [Dong et al 2022b], [Jurgelaitis et al 2022], [Garamvölgyi et al 2018], [Chirtoaca et al 2020], [Dong et al 2022a], [Ren et al 2021], [Yu et al 2021], [Akca et al 2019], [Tsai et al 2019], [Bao and Liu 2021], [Jin et al 2022…”
Section: Conductionmentioning
confidence: 99%
“…Other tools have been proposed to facilitate or innovate in the area of smart contracts, such as in [Santiago et al 2021], where a tool was proposed that allows for the writing of contracts at runtime using models in JSON and Typescript. On the other hand, in [Jin et al 2022], a framework is presented that uses a patching mechanism to repair already deployed smart contracts. The framework works by intercepting calls to the original contract and blocking malicious transactions through another contract.…”
Section: (Rq2) How Are Software Engineering Techniques Being Used To ...mentioning
confidence: 99%
“…Elysium [294], sGuard [224], EVMPatch [250], Aroc [158], and HCC [125]. Most of these tools utilize a symbolic execution or static analysis component for a (predefined) vulnerability detection.…”
Section: Related Workmentioning
confidence: 99%
“…Automated program repair (APR) techniques could be used to automatically fix many of such bugs in the software code. At the same time, the existing research on automated repair of smart contracts is concentrated around template-based patching of common security vulnerabilities, which are detected as (hardcoded) patterns in the code of a smart contract by means of symbolic execution or static analysis [224,334,250,158]. For example, SmartShield [334], employs one of the predefined fixing strategies once one of the three code patterns is identified in the code of a smart contract: it detects state changes performed after an external call, missing checks for overflowing arithmetic operations, or missing checks on the result of a possibly failing external call.…”
Section: Motivation and Introductionmentioning
confidence: 99%