Proceedings 2020 Network and Distributed System Security Symposium 2020
DOI: 10.14722/ndss.2020.24449
|View full text |Cite
|
Sign up to set email alerts
|

SODA: A Generic Online Detection Framework for Smart Contracts

Abstract: Smart contracts have become lucrative and profitable targets for attackers because they can hold a great amount of money. Unfortunately, existing offline approaches for discovering the vulnerabilities in smart contracts or checking the correctness of smart contracts cannot conduct online detection of attacking transactions. Besides, existing online approaches only focus on specific attacks and cannot be easily extended to detect other attacks. Moreover, developing a new online detection system for smart contra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
50
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 74 publications
(62 citation statements)
references
References 23 publications
0
50
0
Order By: Relevance
“…As shown in Figure 1, in the second stage, the framework in [10] is used to collect complete transaction data, including internal transactions and external transactions, and then build different relationship graphs based on the attack data set of the first stage because different attack types have very different natures. For example, DDoS attacks do not involve profit from the attack, so we do not need to pay too much attention to the flow of money.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…As shown in Figure 1, in the second stage, the framework in [10] is used to collect complete transaction data, including internal transactions and external transactions, and then build different relationship graphs based on the attack data set of the first stage because different attack types have very different natures. For example, DDoS attacks do not involve profit from the attack, so we do not need to pay too much attention to the flow of money.…”
Section: Methodsmentioning
confidence: 99%
“…Even now, there are still many attackers active on Ethereum. ere are many ways to detect Ethereum contract vulnerabilities [7][8][9][10][11][12], and some people have studied the behavior of users on DAPPs [13]. However, few people trace the origin of the attackers.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The recent progress in big data analytics on blockchain data brings the opportunities to remedy the security vulnerabilities of blockchain. For example, the recent work [162] presented a framework to collect blockchain data and detect various attacks occurring on blockchain.…”
Section: B Secure Iiot Critical Infrastructuresmentioning
confidence: 99%
“…Lazarus monitors the software stack of each blockchain node for newly found or zeroday exploits and quarantines affected replicas. A number of tools exist for formal verification and vulnerability detection of Ethereum smart contracts, including both offline scanners [12], [13] and online detection frameworks [14].…”
Section: Related Workmentioning
confidence: 99%