2019
DOI: 10.1007/978-3-030-32409-4_18
|View full text |Cite
|
Sign up to set email alerts
|

sCompile: Critical Path Identification and Analysis for Smart Contracts

Abstract: Smart contracts are an innovation built on top of the blockchain technology. It provides a platform for automatically executing contracts in an anonymous, distributed, and trusted way, which has the potential to revolutionize many industries. The most popular programming language for creating smart contracts is called Solidity, which is supported by Ethereum. Like ordinary programs, Solidity programs may contain vulnerabilities, which potentially lead to attacks. The problem is magnified by the fact that smart… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
72
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 75 publications
(72 citation statements)
references
References 20 publications
0
72
0
Order By: Relevance
“…teEther leverages SE to discover vulnerabilities and generate transactions which can attack vulnerable smart contracts [65]. sCompile ranks the program paths according to their criticalness, and applies SE to discover vulnerabilities by exploring the topranked critical paths [14]. ContractFuzzer leverages fuzzing to reveal vulnerabilities [12].…”
Section: B Offline Approachesmentioning
confidence: 99%
“…teEther leverages SE to discover vulnerabilities and generate transactions which can attack vulnerable smart contracts [65]. sCompile ranks the program paths according to their criticalness, and applies SE to discover vulnerabilities by exploring the topranked critical paths [14]. ContractFuzzer leverages fuzzing to reveal vulnerabilities [12].…”
Section: B Offline Approachesmentioning
confidence: 99%
“…There are works addressing vulnerability detection in smart contracts with other strategies as well [35][36][37]. Liu et al proposed a novel semantic-aware security auditing technique called S-gram for Ethereum [35].…”
Section: Related Workmentioning
confidence: 99%
“…Chang et al propose an alternative approach to automatically identify critical program paths (with multiple function calls including inter-contract function calls) in a smart contract, rank the paths according to their criticalness, discard them if they are infeasible or otherwise present them with user-friendly warnings for user inspection [37]. Their approach has been implemented in a tool called sCompile.…”
Section: Related Workmentioning
confidence: 99%
“…The other accessible data are smart contracts, for example, their bytecode written in the blocks. There are some work analyzing these code to give advises for smart contract developers and blockchain users [25], [26], [46]. Researchers also try to decompile them into source code [47] so that more approaches to source code analysis can be used.…”
Section: A Blockchain Systemsmentioning
confidence: 99%