-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Systematic Literature Review & Grey Literature Review #3
Comments
Analyzing Ethereum Smart Contract Vulnerabilities at Scale Based on Inter-Contract Dependency |
TODLER: A Transaction Ordering Dependency anaLyzER - for Ethereum Smart Contracts |
Towards Automated Security Analysis of Smart Contracts based on Execution Property Graph |
HoRStify: Sound Security Analysis of Smart Contracts |
https://ieeexplore.ieee.org/abstract/document/10197106 Dynamic Analysis for Detection of Self-Destructive Smart Contracts |
https://dl.acm.org/doi/full/10.1145/3488245 Why Do Smart Contracts Self-Destruct? Investigating the Selfdestruct Function on Ethereum |
The Sword of Damocles: Upgradeable Smart Contract in Ethereum The paper examines the prevalence of upgradeable smart contracts on Ethereum, focusing on two upgrade techniques: the proxy pattern and metamorphic contracts. It seeks to answer 4 RQs on this topic: A review of Ethereum StackExchange posts from 2016 to 2022 found 355 posts related to upgradeable contracts, with the proportion increasing from 20% to 70% over the years. These posts focus on requirements (49%), code issues (39%), and security concerns (5%), with security concerns becoming more prominent in recent years. RQ2: How to detect upgradeable contracts? RQ3: What's the frequency of upgradeable contracts? From the 12M blocks, a subset of contracts with TXs containing DELEGATECALL, CREATE2, and SELFDESTRUCT was collected. After running the classifier on this subset of contracts 126,500 were identified as proxy upgradeable and 28 were metamorphically upgraded. 7 of these 28 contracts were flagged as MV bots by Etherscan. RQ4: Why do developers use upgradeable contracts? The study manually reviewed a random sample of 300 upgraded contracts to determine the reasons for upgrades. The findings revealed that developers primarily used upgradeable contracts for functionality changes (46%), vulnerability repairs (24%), code optimizations (25%), and other factors (5%). thanks @Mokita-J |
Immutable in Principle, Upgradeable by Design: Exploratory Study of Smart Contract Upgradeability This study collected 44M deployed smart contracts to analyze the upgradeable contracts. summary thanks @Stamp9 |
Some literature on smart contract supply chain (off-chain, i.e. npm packages, open-zeppeling): Code cloning in smart contracts: a case study on verified contracts from the Ethereum blockchain platform ESE journal 2020 Analysis of Source Code Duplication in Ethreum Smart Contracts SANER 2021 |
Self-Destruct related: Dynamic Analysis for Detection of Self-Destructive Smart Contracts |
Literature on Network of Smart Contracts: #11 |
Literature on Blockchain Oriented Software: #10 |
Instrumenting Transaction Trace Properties in Smart Contracts: Extending the EVM for Real-Time Security
The proposed solution combines key aspects of both approaches. Implementation of the Idea: Evaluation: System Overhead: Tools/Code/Dataset: Not found. How it differs from what we want to do? Implementing the solution in this paper would require updating all Ethereum nodes, whereas SCSC achieves its goals without needing any changes from the community. Is that useful for us? |
Proxion: Uncovering Hidden Proxy Smart Contracts for Finding Collision Vulnerabilities in Ethereum. Proxion is a tool with these features:
Novelty: It can work solely on bytecode, unlike previous tools that require source code or transaction history. Scope: Focuses on proxy contracts with delegate calls in the fallback function. Methodology:
Evaluation: Tool repo. Notes on some of the tools: |
Related to smart contract dependencies.
The text was updated successfully, but these errors were encountered: