JOURNAL ARTICLE

Enhancing Smart Contract Security Analysis with Execution Property Graphs

Kaihua Qin哲 田野Zhun WangW. D. LiLiyi ZhouChao ZhangDawn SongArthur Gervais

Year: 2025 Journal:   Proceedings of the ACM on software engineering. Vol: 2 (ISSTA)Pages: 1101-1122   Publisher: Association for Computing Machinery

Abstract

Smart contract vulnerabilities have led to significant financial losses, with their increasing complexity rendering outright prevention of hacks increasingly challenging. This trend highlights the crucial need for advanced forensic analysis and real-time intrusion detection, where dynamic analysis plays a key role in dissecting smart contract executions. Therefore, there is a pressing need for a unified and generic representation of smart contract executions, complemented by an efficient methodology that enables the modeling and identification of a broad spectrum of emerging attacks. We introduce Clue, a dynamic analysis framework specifically designed for the Ethereum virtual machine. Central to Clue is its ability to capture critical runtime information during contract executions, employing a novel graph-based representation, the Execution Property Graph. A key feature of Clue is its innovative graph traversal technique, which is adept at detecting complex attacks, including (read-only) reentrancy and price manipulation. Evaluation results reveal Clue's superior performance with high true positive rates and low false positive rates, outperforming state-of-the-art tools. Furthermore, Clue's efficiency positions it as a valuable tool for both forensic analysis and real-time intrusion detection.

Keywords:
Computer science Graph Rendering (computer graphics) Tree traversal Key (lock) Representation (politics) Security analysis Intrusion detection system Computer security Theoretical computer science Artificial intelligence Programming language

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
33
Refs
0.26
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Blockchain Technology Applications and Security
Physical Sciences →  Computer Science →  Information Systems
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
© 2026 ScienceGate Book Chapters — All rights reserved.