首页> 外文期刊>Communications of the ACM >MadMax: Analyzing the Out-of-Gas World of Smart Contracts
【24h】

MadMax: Analyzing the Out-of-Gas World of Smart Contracts

机译:Madmax:分析智能合约的瓦斯瓦护

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

Ethereum is a distributed blockchain platform, serving as an ecosystem for smart contracts: full-fledged intercommunicating programs that capture the transaction logic of an account. A gas limit caps the execution of an Ethereum smart contract: instructions, when executed, consume gas, and the execution proceeds as long as gas is available.Gas-focused vulnerabilities permit an attacker to force key contract functionality to run out of gas-effectively performing a permanent denial-of-service attack on the contract. Such vulnerabilities are among the hardest for programmers to protect against, as out-of-gas behavior may be uncommon in nonattack scenarios and reasoning about these vulnerabilities is nontrivial.In this paper, we identify gas-focused vulnerabilities and present MadMax: a static program analysis technique that automatically detects gas-focused vulnerabilities with very high confidence. MadMax combines a smart contract decompiler and semantic queries in Datalog. Our approach captures high-level program modeling concepts (such as "dynamic data structure storage" and "safely resumable loops") and delivers high precision and scalability. MadMax analyzes the entirety of smart contracts in the Ethereum blockchain in just 10 hours and flags vulnerabilities in contracts with a monetary value in billions of dollars. Manual inspection of a sample of flagged contracts shows that 81% of the sampled warnings do indeed lead to vulnerabilities.
机译:Ethereum是一个分布式区块链平台,作为智能合同的生态系统:捕获帐户的事务逻辑的全面互通程序。一个气体限制帽的执行了一个Ethereum智能合同:只要有空气所获得的,消耗气体和执行所需的说明,就可以获得燃气。焦点漏洞允许攻击者强制关键合同功能效应耗尽储气对合同执行永久拒绝服务攻击。这些漏洞是程序员来防止的最难的,因为在非熟悉场景中可能罕见,并且对这些漏洞的推理可能是不常见的。在本文中,我们识别富有气体漏洞和现在的Madmax:静态计划分析技术以非常高的置信度自动检测燃气脆弱性。 Madmax在Datalog中结合了智能合同分解器和语义查询。我们的方法捕获高级节目建模概念(例如“动态数据结构存储”和“安全可恢复的循环”),并提供高精度和可扩展性。 Madmax在以10小时内完成了Ethereum区块链的全部智能合同,并在合同中标记漏洞,其中数十亿美元。手动检查标记合同样本表明,81%的采样警告确实导致漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号