Characterizing Code Clones in the Ethereum Smart Contract Ecosystem

05/01/2019
by   Ningyu He, et al.
0

In this paper, we present the first large-scale and systematic study to characterize the code reuse practice in the Ethereum smart contract ecosystem. We first performed a detailed similarity comparison study on a dataset of 10 million contracts we had harvested, and then we further conducted a qualitative analysis to characterize the diversity of the ecosystem, understand the correlation between code reuse and vulnerabilities, and detect the plagiarist DApps. Our analysis revealed that over 96 while a large number of them were similar, which suggests that the ecosystem is highly homogeneous. Our results also suggested that roughly 9.7 contract pairs have exactly the same vulnerabilities, which we assume were introduced by code clones. In addition, we identified 41 DApps clusters, involving 73 plagiarized DApps which had caused huge financial loss to the original creators, accounting for 1/3 of the original market volume.

READ FULL TEXT
research
07/02/2023

Abusing the Ethereum Smart Contract Verification Services for Fun and Profit

Smart contracts play a vital role in the Ethereum ecosystem. Due to the ...
research
07/01/2020

Maintaining Smart Contracts on Ethereum: Issues, Techniques, and Future Challenges

Smart contracts are self-executed programs that run on a blockchain. The...
research
01/14/2021

EDSC: An Event-Driven Smart Contract Platform

This paper presents EDSC, a novel smart contract platform design based o...
research
02/18/2019

Smart Contract Vulnerabilities: Does Anyone Care?

In the last year we have seen a great deal of both academic and practica...
research
04/24/2022

Exploring Security Practices of Smart Contract Developers

Smart contracts are self-executing programs that run on blockchains (e.g...
research
02/16/2018

Finding The Greedy, Prodigal, and Suicidal Contracts at Scale

Smart contracts---stateful executable objects hosted on blockchains like...
research
11/05/2020

Tracking Counterfeit Cryptocurrency End-to-end

The production of counterfeit money has a long history. It refers to the...

Please sign up or login with your details

Forgot password? Click here to reset