2020
DOI: 10.1007/978-3-030-51280-4_35
|View full text |Cite
|
Sign up to set email alerts
|

Characterizing Code Clones in the Ethereum Smart Contract Ecosystem

Abstract: In this paper, we present the first large-scale and systematic study to characterize the code reuse practice in the Ethereum smart contract ecosystem. We first performed a detailed similarity comparison study on a dataset of 10 million contracts we had harvested, and then we further conducted a qualitative analysis to characterize the diversity of the ecosystem, understand the correlation between code reuse and vulnerabilities, and detect the plagiarist DApps. Our analysis revealed that over 96% of the contrac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
5

Relationship

1
9

Authors

Journals

citations
Cited by 47 publications
(22 citation statements)
references
References 29 publications
0
22
0
Order By: Relevance
“…EOAs are controlled by private keys and have no associated bytecode, whereas CAs have associated code (known as smart contracts) and data storage. Both accounts can communicate with those identical to them and also with one another albeit in different ways [53]. The circulated currency between peers in the Ethereum network is known as Ether.…”
Section: ) Ethereummentioning
confidence: 99%
“…EOAs are controlled by private keys and have no associated bytecode, whereas CAs have associated code (known as smart contracts) and data storage. Both accounts can communicate with those identical to them and also with one another albeit in different ways [53]. The circulated currency between peers in the Ethereum network is known as Ether.…”
Section: ) Ethereummentioning
confidence: 99%
“…Code Clones. To detect code clones, He et al [23] first de-duplicate contracts by 'removing function unrelated code (e.g., creation code and Swarm code), and tokenizing the code to keep opcodes only.' Then, they generate fingerprints of the de-duplicated contracts by a customized version of fuzzy hashing and compute pairwise similarity scores.…”
Section: Evm Bytecode Analysismentioning
confidence: 99%
“…With the rapid development of blockchain's distribution architecture, the Ethereum smart contract provides an environment for malicious code clones by injecting a piece of contract code and propagating it to other blocks. He et al [52] focused on the ecosystem of the Ethereum smart contract to characterize vulnerable code clones using the fuzzy hashing technique to calculate the edit distance between two fingerprints. Their approach compares the similarity between generated fingerprints of user-created contract code and contract-created contract code during Ethereum virtual machine runtime.…”
Section: D: Ethereum Smart Contractmentioning
confidence: 99%