2019 26th Asia-Pacific Software Engineering Conference (APSEC) 2019
DOI: 10.1109/apsec48747.2019.00071
|View full text |Cite
|
Sign up to set email alerts
|

SolAnalyser: A Framework for Analysing and Testing Smart Contracts

Abstract: Executing, verifying and enforcing credible transactions on permissionless blockchains is done using smart contracts. A key challenge with smart contracts is ensuring their correctness and security. To address this challenge, we present a fully automated technique, SolAnalyser, for vulnerability detection over Solidity smart contracts that uses both static and dynamic analysis. Analysis techniques in the literature rely on static analysis with a high rate of false positives or lack support for vulnerabilities … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
53
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 45 publications
(55 citation statements)
references
References 16 publications
0
53
0
2
Order By: Relevance
“…In this section, we have reviewed Ethereum Smart Contract vulnerabilities [9], [31]- [45], [122], [123], [131], [132], [138]- [142] with some well-known attacks/example [32], [46]- [49], detection tools [30], [37], [50]- [58], [125], [133]- [137], [143], and their suggested preventive methods [30], [47], [59]- [63], [124], [126]. Researchers classified these vulnerabilities based on different criteria such as seriousness, root cause, flaws in solidity, security flaws, privacy flaws, performance flaws, flaws in EVM [27] byte code, and blockchain [64] characteristics.…”
Section: Ethereum Smart Contract Vulnerabilities and Preventive Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we have reviewed Ethereum Smart Contract vulnerabilities [9], [31]- [45], [122], [123], [131], [132], [138]- [142] with some well-known attacks/example [32], [46]- [49], detection tools [30], [37], [50]- [58], [125], [133]- [137], [143], and their suggested preventive methods [30], [47], [59]- [63], [124], [126]. Researchers classified these vulnerabilities based on different criteria such as seriousness, root cause, flaws in solidity, security flaws, privacy flaws, performance flaws, flaws in EVM [27] byte code, and blockchain [64] characteristics.…”
Section: Ethereum Smart Contract Vulnerabilities and Preventive Methodsmentioning
confidence: 99%
“…This paper presents a deep insight into each vulnerability as well as its detection tools, real life attacks and prevention mechanisms. Academic Haskell E-EVM [25] Academic Python EtherTrust [104] Academic java EthIR [105] Academic Python FSolidM [106] Academic Java Script Gasper [42] *SDSLabs Go KEVM [107] Academic Python MAIAN [59] Academic Python Manticore [108] *Trail of Bits Python Mythril [72] *ConsenSys Python Osiris [61] Academic Python Oyente [10] Community Python Porosity [109] *Comae Technologies C++ Rattle [110] *Trail of Bits Python ReGaurd [76] *Chieftin Lab C++ Remix-IDE [111] Community Java Script SASC [112] *Fujitsu Python sCompile [113] Academic C++ Securify [71] Academic Java SmartCheck [69] Academic Java Solgraph [114] *Raine Revere Java Script SolMet [93] Academic Java teEther [26] Academic Python Vandal [115] Academic Python Zeus [116] *IBM Research India C++ * Tool development company name [129] Harz et al [130] Angelo et al [54] Chen et al [145] Luu et al [10] Atzei et al [48] Tang et al [144] Durieux et al [145] at a very fast speed. Ethereum blockchain design and EVM features pose several security challenges [38], [117]-[121].…”
Section: A Comparison With Related Workmentioning
confidence: 99%
“…In works related to code analysis, selected flaws in smart contract code (e.g., overflow and underflow [20] or reentrancy [22]) and their detection using formal methods have been researched (e.g., [132], [163], [164]). For automated detection of these flaws, software tools have been proposed that perform formal verification (e.g., [163], [165], [166]), dynamic code analysis (e.g., [132], [133], [152]), static code analysis (e.g., [23], [24], [167]- [169]), or machine learning using classifiers like XGBoost or AdaBoost (e.g., [25]). These tools are designed to support developers in improving their code by identifying recurring flaws in smart contract code (e.g., by using formalized patterns of code flaws).…”
Section: Related Workmentioning
confidence: 99%
“…Besides code analysis, research has proposed approaches and tools for software testing (e.g., [24], [171]- [173]). Related works offer valuable and practical insights that support smart contract developers in improving their code through different testing strategies and tools.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation