Pied-Piper: Revealing the Backdoor Threats in Ethereum ERC Token Contracts
【Author】 Ma, Fuchen; Ren, Meng; Ouyang, Lerong; Chen, Yuanliang; Zhu, Juan; Chen, Ting; Zheng, Yingli; Dai, Xiao; Jiang, Yu; Sun, Jiaguang
【Source】ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY
【影响因子】3.685
【Abstract】With the development of decentralized networks, smart contracts, especially those for ERC tokens, are attracting more and more Dapp users to implement their applications. There are some functions in ERC token contracts that only a specific group of accounts could invoke. Among those functions, some even can influence other accounts or the whole system without prior notice or permission. These functions are referred to as contract backdoors. Once exploited by an attacker, they can cause property losses and harm users' privacy. In this work, we propose Pied-Piper, a hybrid analysis method that integrates datalog analysis and directed fuzzing to detect backdoor threats in Ethereum ERC token contracts. First, datalog analysis is applied to abstract the data structures and identification rules related to the threats for preliminary static detection. Then, directed fuzzing is applied to eliminate false positives caused by the static analysis. We first evaluated PiedPiper on 200 smart contracts, which are injected with different types of backdoors. It reported all problems without false positives, and none of the injected problems was missed. Then, we applied Pied-Piper on 13,484 real token contracts deployed on Ethereum. Pied-Piper reported 189 confirmed problems, four of which have been assigned unique CVE ids while others are still in the review process. Each contract takes 8.03 seconds for datalog analysis on average, and the fuzzing engine can eliminate the false positives within one minute.
【Keywords】Smart contract; backdoor detection; datalog analysis; directed fuzzing
【发表时间】2023 JUL
【收录时间】2023-07-06
【文献类型】
【主题类别】
--
【DOI】 10.1145/3560264
评论