Proceedings 2023 Network and Distributed System Security Symposium 2023
DOI: 10.14722/ndss.2023.24222
|View full text |Cite
|
Sign up to set email alerts
|

BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects

Abstract: Due to the open-source nature of the blockchain ecosystem, it is common for new blockchains to fork or partially reuse the code of classic blockchains. For example, the popular Dogecoin, Litecoin, Binance BSC, and Polygon are all variants of Bitcoin/Ethereum. These "forked" blockchains thus could encounter similar vulnerabilities that are propagated from Bitcoin/Ethereum during forking or subsequently commit fetching. In this paper, we conduct a systematic study of detecting and investigating the propagated vu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…On the other hand, similarity scores can be computed at the code-level or path-level, as explored in the work by Wang et al [129], where they tackled the tracking problem among devices and calculated similarity scores between devices for tracking purposes. Similarly, Yi et al [62] compared code in forked projects with their original counterparts to identify the spread of vulnerabilities using similarity score computation.…”
Section: Table V: Collection Of Academic Defense Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…On the other hand, similarity scores can be computed at the code-level or path-level, as explored in the work by Wang et al [129], where they tackled the tracking problem among devices and calculated similarity scores between devices for tracking purposes. Similarly, Yi et al [62] compared code in forked projects with their original counterparts to identify the spread of vulnerabilities using similarity score computation.…”
Section: Table V: Collection Of Academic Defense Methodsmentioning
confidence: 99%
“…In [62], the authors present an alternative approach to identifying propagated vulnerabilities in forked blockchain programs through the development of a tool called BlockScope. The analysis is based on patched code in original projects.…”
Section: B Censoring Methodsmentioning
confidence: 99%
See 2 more Smart Citations