DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts

06/11/2020
by   Ru Ji, et al.
0

Cryptocurrency has seen an explosive growth in recent years, thanks to the evolvement of blockchain technology and its economic ecosystem. Besides Bitcoin, thousands of cryptocurrencies have been distributed on blockchains, while hundreds of cryptocurrency exchanges are emerging to facilitate the trading of digital assets. At the same time, it also attracts the attentions of attackers. Fake deposit, as one of the most representative attacks (vulnerabilities) related to exchanges and tokens, has been frequently observed in the blockchain ecosystem, causing large financial losses. However, besides a few security reports, our community lacks of the understanding of this vulnerability, for example its scale and the impacts. In this paper, we take the first step to demystify the fake deposit vulnerability. Based on the essential patterns we have summarized, we implement DEPOSafe, an automated tool to detect and verify (exploit) the fake deposit vulnerability in ERC-20 smart contracts. DEPOSafe incorporates several key techniques including symbolic execution based static analysis and behavior modeling based dynamic verification. By applying DEPOSafe to 176,000 ERC-20 smart contracts, we have identified over 7,000 vulnerable contracts that may suffer from two types of attacks. Our findings demonstrate the urgency to identify and prevent the fake deposit vulnerability.

READ FULL TEXT
research
12/14/2022

Vulnerability Analysis of Smart Contracts

Blockchain platforms and smart contracts are vulnerable to security brea...
research
03/16/2020

Characterizing Cryptocurrency Exchange Scams

As the indispensable trading platforms of the ecosystem, hundreds of cry...
research
12/14/2019

Cerberus: A Blockchain-Based Accreditation and Degree Verification System

Credential fraud is a widespread practice that undermines investment and...
research
08/08/2023

An Ethereum-based Product Identification System for Anti-counterfeits

Fake products are items that are marketed and sold as genuine, high-qual...
research
06/25/2019

EVulHunter: Detecting Fake Transfer Vulnerabilities for EOSIO's Smart Contracts at Webassembly-level

As one of the representative Delegated Proof-of-Stake (DPoS) blockchain ...
research
10/23/2021

Diving Into Blockchain's Weaknesses: An Empirical Study of Blockchain System Vulnerabilities

Blockchain is an emerging technology for its decentralization and the ca...
research
07/19/2022

A Survey on EOSIO Systems Security: Vulnerability, Attack, and Mitigation

EOSIO, as one of the most representative blockchain 3.0 platforms, invol...

Please sign up or login with your details

Forgot password? Click here to reset