2021 IEEE European Symposium on Security and Privacy (EuroS&P) 2021
DOI: 10.1109/eurosp51992.2021.00018
|View full text |Cite
|
Sign up to set email alerts
|

ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
62
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 74 publications
(62 citation statements)
references
References 28 publications
0
62
0
Order By: Relevance
“…We compare TxT with 13 state-of-the-art defenses based on their self-reported coverage disclosure. Tool Oyente [7] Securify [21] Mythril [24] Sereum [11] Vandal [25] sGuard [42] ZEUS [6] ConFuzzius [8] VeriSmart [43] SmarTest [27] Osiris [44] ECFChecker [45] Maian [28] TxT (this work) -full support; -partial support; -no support; -explicit detection of vulnerability. † https://swcregistry.io/.…”
Section: B Vulnerability Coverage By Txtmentioning
confidence: 99%
See 2 more Smart Citations
“…We compare TxT with 13 state-of-the-art defenses based on their self-reported coverage disclosure. Tool Oyente [7] Securify [21] Mythril [24] Sereum [11] Vandal [25] sGuard [42] ZEUS [6] ConFuzzius [8] VeriSmart [43] SmarTest [27] Osiris [44] ECFChecker [45] Maian [28] TxT (this work) -full support; -partial support; -no support; -explicit detection of vulnerability. † https://swcregistry.io/.…”
Section: B Vulnerability Coverage By Txtmentioning
confidence: 99%
“…Following the common vulnerabilities and exposures (CVE) database, the smart contract weakness classification and test cases (SWC) registry [3] identifies 37 classes of known smart contract vulnerabilities (as of January 2022). To counter the security threats, different types of defense tools have been developed, including syntactic analyzers [4], [5], security scanners based on symbolic execution [6], [7], fuzzing tools [8], [9], transaction analyzers [10], [11], security libraries [12], [13], formal defense methods [14], [15], and various hybrid analysis approaches [16], [17]. In this work, we scrutinize 106 existing smart contract security defense solutions, and find that each of them only addresses very few classes of known vulnerabilities.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…They usually use static analysis approaches, such as symbolic execution, to uncover vulnerabilities and bugs in smart contracts. Some other works [15], [38], [40], [41], [43], [44], [53], [57], [72], [84] make use of fuzzing techniques to discover bugs in smart contracts. In contrast, our work analyzes private transactions to understand their mechanisms, incentives, and security risks.…”
Section: Bug Detection On Smart Contractsmentioning
confidence: 99%
“…However, private transactions have not attracted much attention from the research community. There are several works that have analyzed the Ethereum blockchain and DeFi platforms, but they mainly focus on 1) detecting bugs from smart contracts [37], [46], [47], [55], [58], [72], [73], [76], 2) measuring Ethereum networks and transactions [4], [14], [49], [52], [67], [86], [88], and 3) analyzing transactions to uncover attacks [63], [66], [83], [87].…”
Section: Introductionmentioning
confidence: 99%