Kaihua Qin哲 田野Zhun WangW. D. LiLiyi ZhouChao ZhangDawn SongArthur Gervais
Smart contract vulnerabilities have led to significant financial losses, with their increasing complexity rendering outright prevention of hacks increasingly challenging. This trend highlights the crucial need for advanced forensic analysis and real-time intrusion detection, where dynamic analysis plays a key role in dissecting smart contract executions. Therefore, there is a pressing need for a unified and generic representation of smart contract executions, complemented by an efficient methodology that enables the modeling and identification of a broad spectrum of emerging attacks. We introduce Clue, a dynamic analysis framework specifically designed for the Ethereum virtual machine. Central to Clue is its ability to capture critical runtime information during contract executions, employing a novel graph-based representation, the Execution Property Graph. A key feature of Clue is its innovative graph traversal technique, which is adept at detecting complex attacks, including (read-only) reentrancy and price manipulation. Evaluation results reveal Clue's superior performance with high true positive rates and low false positive rates, outperforming state-of-the-art tools. Furthermore, Clue's efficiency positions it as a valuable tool for both forensic analysis and real-time intrusion detection.
Zhaoxuan LiZiming ZhaoWenhao LiRui ZhangRui XueSiqi LuFan Zhang
Felix AdlerDennis KitzmannMarc Jansen
Lian YuWei‐Tek TsaiGuannan LiYafe YaoChenjian HuEnyan Deng
Igor MazurokYevhen LeonchykOleksandr S. AntonenkoKyrylo S. Volkov