Security Analysis Methods on Ethereum Smart Contract Vulnerabilities — a Survey
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Securing the Chain
Securing the chain KPMG International kpmg.com/blockchain360 Foreword It’s no secret that blockchain1 is a potential game changer in financial services and other industries. This is evident by the US$1B investment2 in the technology last year alone. Or the fact that you don’t have to look very far for blockchain use cases, which are as diverse as a foreign exchange market in financial services to the pork supply chain in consumer retailing. Some even see blockchain as a “foundational” technology set to disrupt, enable and change business processing, as we know it across industries. To date, much of the blockchain frenzy has centered on its vast transformative potential across entire industries. So, organizations have focused squarely on “how” they can use blockchain for business. Yet, as more proof of concepts move toward practical implementations and cyber threats rapidly grow in number and sophistication, security and risk management can no longer take a backseat. In addition to “how”, the question then becomes, “Is blockchain secure for my business?” Simply put, it can be. But, not by just turning the key. Security will depend on a variety of factors, none the least of which requires a robust risk management framework. Consider, for example, that as many as half of vulnerability exploitations occur within 10 to 100 days after they are published according to one study3. Then add in the number of threats that are already known. Next, factor in the plethora of unknowns that accompany emerging technologies and you quickly see why a comprehensive view of your risk and threat landscape is necessary. -
Evmpatch: Timely and Automated Patching of Ethereum Smart Contracts
EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts Michael Rodler Wenting Li Ghassan O. Karame University of Duisburg-Essen NEC Laboratories Europe NEC Laboratories Europe Lucas Davi University of Duisburg-Essen Abstract some of these contracts hold, smart contracts have become an appealing target for attacks. Programming errors in smart Recent attacks exploiting errors in smart contract code had contract code can have devastating consequences as an attacker devastating consequences thereby questioning the benefits of can exploit these bugs to steal cryptocurrency or tokens. this technology. It is currently highly challenging to fix er- rors and deploy a patched contract in time. Instant patching is Recently, the blockchain community has witnessed several especially important since smart contracts are always online incidents due smart contract errors [7, 39]. One especially due to the distributed nature of blockchain systems. They also infamous incident is the “TheDAO” reentrancy attack, which manage considerable amounts of assets, which are at risk and resulted in a loss of over 50 million US Dollars worth of often beyond recovery after an attack. Existing solutions to Ether [31]. This led to a highly debated hard-fork of the upgrade smart contracts depend on manual and error-prone pro- Ethereum blockchain. Several proposals demonstrated how to defend against reentrancy vulnerabilities either by means of cesses. This paper presents a framework, called EVMPATCH, to instantly and automatically patch faulty smart contracts. offline analysis at development time or by performing run-time validation [16, 23, 32, 42]. Another infamous incident is the EVMPATCH features a bytecode rewriting engine for the pop- ular Ethereum blockchain, and transparently/automatically parity wallet attack [39]. -
Understanding Integer Overflow in C/C++
Appeared in Proceedings of the 34th International Conference on Software Engineering (ICSE), Zurich, Switzerland, June 2012. Understanding Integer Overflow in C/C++ Will Dietz,∗ Peng Li,y John Regehr,y and Vikram Adve∗ ∗Department of Computer Science University of Illinois at Urbana-Champaign fwdietz2,[email protected] ySchool of Computing University of Utah fpeterlee,[email protected] Abstract—Integer overflow bugs in C and C++ programs Detecting integer overflows is relatively straightforward are difficult to track down and may lead to fatal errors or by using a modified compiler to insert runtime checks. exploitable vulnerabilities. Although a number of tools for However, reliable detection of overflow errors is surprisingly finding these bugs exist, the situation is complicated because not all overflows are bugs. Better tools need to be constructed— difficult because overflow behaviors are not always bugs. but a thorough understanding of the issues behind these errors The low-level nature of C and C++ means that bit- and does not yet exist. We developed IOC, a dynamic checking tool byte-level manipulation of objects is commonplace; the line for integer overflows, and used it to conduct the first detailed between mathematical and bit-level operations can often be empirical study of the prevalence and patterns of occurrence quite blurry. Wraparound behavior using unsigned integers of integer overflows in C and C++ code. Our results show that intentional uses of wraparound behaviors are more common is legal and well-defined, and there are code idioms that than is widely believed; for example, there are over 200 deliberately use it. -
Decentralized Autonomous Organization Supplement."
ARTICLE 1 - PROVISIONS 17-31-101. Short title. This chapter shall be known and may be cited as the "Wyoming Decentralized Autonomous Organization Supplement." 17-31-102. Definitions. (a) As used in this chapter: (i) "Blockchain" means as defined in W.S. 34-29- 106(g)(i); (ii) "Decentralized autonomous organization" means a limited liability company organized under this chapter; (iii) "Digital asset" means as defined in W.S. 34-29- 101(a)(i); (iv) "Limited liability autonomous organization" or "LAO" means a decentralized autonomous organization; (v) "Majority of the members," means the approval of more than fifty percent (50%) of participating membership interests in a vote for which a quorum of members is participating. A person dissociated as a member as set forth in W.S. 17-29-602 shall not be included for the purposes of calculating the majority of the members; (vi) "Membership interest" means a member's ownership share in a member managed decentralized autonomous organization, which may be defined in the entity's articles of organization, smart contract or operating agreement. A membership interest may also be characterized as either a digital security or a digital consumer asset as defined in W.S. 34-29-101, if designated as such in the organization's articles of organization or operating agreement; (vii) "Open blockchain" means a blockchain as defined in W.S. 34-29-106(g)(i) that is publicly accessible and its ledger of transactions is transparent; (viii) "Quorum" means a minimum requirement on the sum of membership interests participating in a vote for that vote to be valid; 1 (ix) "Smart contract" means an automated transaction, as defined in W.S. -
Collecting Vulnerable Source Code from Open-Source Repositories for Dataset Generation
applied sciences Article Collecting Vulnerable Source Code from Open-Source Repositories for Dataset Generation Razvan Raducu * , Gonzalo Esteban , Francisco J. Rodríguez Lera and Camino Fernández Grupo de Robótica, Universidad de León. Avenida Jesuitas, s/n, 24007 León, Spain; [email protected] (G.E.); [email protected] (F.J.R.L.); [email protected] (C.F.) * Correspondence: [email protected] Received:29 December 2019; Accepted: 7 February 2020; Published: 13 February 2020 Abstract: Different Machine Learning techniques to detect software vulnerabilities have emerged in scientific and industrial scenarios. Different actors in these scenarios aim to develop algorithms for predicting security threats without requiring human intervention. However, these algorithms require data-driven engines based on the processing of huge amounts of data, known as datasets. This paper introduces the SonarCloud Vulnerable Code Prospector for C (SVCP4C). This tool aims to collect vulnerable source code from open source repositories linked to SonarCloud, an online tool that performs static analysis and tags the potentially vulnerable code. The tool provides a set of tagged files suitable for extracting features and creating training datasets for Machine Learning algorithms. This study presents a descriptive analysis of these files and overviews current status of C vulnerabilities, specifically buffer overflow, in the reviewed public repositories. Keywords: vulnerability; sonarcloud; bot; source code; repository; buffer overflow 1. Introduction In November 1988 the Internet suffered what is publicly known as “the first successful buffer overflow exploitation”. The exploit took advantage of the absence of buffer range-checking in one of the functions implemented in the fingerd daemon [1,2]. Even though it is considered to be the first exploited buffer overflow, different researchers had been working on buffer overflow for years. -
Blockchain & Cryptocurrency Regulation
Blockchain & Cryptocurrency Regulation Third Edition Contributing Editor: Josias N. Dewey Global Legal Insights Blockchain & Cryptocurrency Regulation 2021, Third Edition Contributing Editor: Josias N. Dewey Published by Global Legal Group GLOBAL LEGAL INSIGHTS – BLOCKCHAIN & CRYPTOCURRENCY REGULATION 2021, THIRD EDITION Contributing Editor Josias N. Dewey, Holland & Knight LLP Head of Production Suzie Levy Senior Editor Sam Friend Sub Editor Megan Hylton Consulting Group Publisher Rory Smith Chief Media Officer Fraser Allan We are extremely grateful for all contributions to this edition. Special thanks are reserved for Josias N. Dewey of Holland & Knight LLP for all of his assistance. Published by Global Legal Group Ltd. 59 Tanner Street, London SE1 3PL, United Kingdom Tel: +44 207 367 0720 / URL: www.glgroup.co.uk Copyright © 2020 Global Legal Group Ltd. All rights reserved No photocopying ISBN 978-1-83918-077-4 ISSN 2631-2999 This publication is for general information purposes only. It does not purport to provide comprehensive full legal or other advice. Global Legal Group Ltd. and the contributors accept no responsibility for losses that may arise from reliance upon information contained in this publication. This publication is intended to give an indication of legal issues upon which you may need advice. Full legal advice should be taken from a qualified professional when dealing with specific situations. The information contained herein is accurate as of the date of publication. Printed and bound by TJ International, Trecerus Industrial Estate, Padstow, Cornwall, PL28 8RW October 2020 PREFACE nother year has passed and virtual currency and other blockchain-based digital assets continue to attract the attention of policymakers across the globe. -
Article Friis Glaser
International Journal of Community Currency Research 2018 VOLUME 22 (SUMMER) EXTENDING BLOCKCHAIN TECHNOLOGY TO HOST CUSTOMIZA- BLE AND INTEROPERABLE COMMUNITY CURRENCIES Gustav R.B. Friis* and Florian Glaser** * Brainbot Technologies AG, Mainz ** Karlsruhe Institute of Technology (KIT), Karlsruhe ABSTRACT The goal of this paper is to propose an open platform for secure and interoperable virtual community currencies. We follow the established information systems design-science approach to develop a prototype that aims to combine best practices for building mutual-credit community currencies with the unique features of blockchain technology. The result is a specification of an open Internet platform that enables users to join and to host customized community currencies. The hosted currencies can be classified as credit-based future type of money with decentralized issuance. Furthermore, we describe how the transparency, security and interoperability properties of blockchain technology offer a solution to the inherent problems of existing, centrally operated community currency software. The characteristics of the prototype and its ability to fulfil the design-objectives are examined by a relative evaluation against existing payment and currency systems like Bitcoin, LETS and M-Pesa. KEYWORDS Virtual community currencies; blockchain technology; mutual-credit; LETS; Trustlines Network To cite this article: Friis, Gustav R.B. and Glaser, Florian (2018) ‘Extending Blockchain Technology to host Customizable and Interoperable Community Currencies’ International Journal of Community Currency Research 2018 Volume 22 (Summer) 71-84 <www.ijccr.net> ISSN 1325-9547. DOI http://dx.doi.org/10.15133/j.ijccr.2018.017 INTERNATIONAL JOURNAL OF COMMUNITY CURRENCY RESEARCH 2018 VOLUME 22 (SUMMER) 71-84 FRIIS & GLASER 1. -
Read the Report Brief
A REVOLUTION IN TRUST Distributed Ledger Technology in Relief & Development MAY 2017 “The principal challenge associated with [DLT] is a lack of awareness of the technology, especially in sectors other than banking, and a lack of widespread understanding of how it works.” - Deloitte Executive Summary1 The Upside In 2016, the blockchain was recognized as one of the top 10 In a recent report, Accenture surveyed emerging technologies by the World Economic Forum.2 The cost data from eight of the world’s ten potential of the blockchain and distributed ledger technology largest investment banks, with the goal of putting a dollar figure against potential (hereinafter “DLT”) to deliver benefits is significant. Gartner cost savings that might be achieved with estimates that DLT will result in $176 billion in added business DLT. The report concluded that the value by 2025; that total reaches $3.1 trillion by 2030.3 banks analyzed could reduce infrastructure costs by an average $8 to Investment in the field reflects the widespread belief that the $12 billion a year. The survey mapped technology can deliver value. Numerous trials, and some more than 50 operational cost metrics deployments, can be found across multiple sectors. and found the savings would break down as follows: Over two dozen countries are investing in DLT 70% savings on central financial More than 2,500 patents have been filed in the last 3 reporting 4 30-50% savings on compliance years 50% savings on centralized operations As of Q4, 2016, 28 of the top 30 banks were engaged in 50% savings on business blockchain proofs-of-concept operations. -
More Legal Aspects of Smart Contract Applications
More Legal Aspects of Smart Contract Applications Token Sales, Capital Markets, Supply Chain Management, Government and Smart Cities, Real Estate Registries, and Enabling Self-Sovereign Identity J. DAX HANSEN | PARTNER LAURIE ROSINI | ASSOCIATE CARLA L. REYES | ASSISTANT PROFESSOR OF LAW +1.206.359.6324 +1.206.359.3052 Director of Legal RnD - Michigan State University College of Law [email protected] [email protected] Faculty Associate - Berkman Klein Center for Internet & Society at Harvard University [email protected] PerkinsCoie.com/Blockchain Perkins Coie LLP | October 2018 Table of Contents INTRODUCTION .............................................................................................................................................................................. 3 I. A (VERY) BRIEF INTRODUCTION TO SMART CONTRACTS ............................................................................................... 3 THE ORIGINS OF SMART CONTRACTS ........................................................................................................................................................................... 3 SMART CONTRACTS IN A DISTRIBUTED LEDGER TECHNOLOGY WORLD ....................................................................................................... 4 II. CURRENT ACADEMIC LITERATURE AND INDUSTRY INITIATIVES RELATING TO SMART CONTRACTS .................... 6 SMART CONTRACTS AND CONTRACT LAW ................................................................................................................................................................ -
ISDA Legal Guidelines for Smart Derivatives Contracts: Foreign Exchange Derivatives
ISDA Legal Guidelines for Smart Derivatives Contracts: Foreign Exchange Derivatives Contents Disclaimer .................................................................................................................................. 3 Introduction ................................................................................................................................ 4 The Over-the-Counter FX Market ............................................................................................... 5 Types of FX ............................................................................................................................... 6 Building the foundation for Smart Derivatives Contracts ............................................................11 Constructing Smart Derivatives Contracts for FX ......................................................................16 Valuations and Calculations ......................................................................................................17 Issues for technology developers to consider ............................................................................20 Settlement .................................................................................................................................32 Clearing ....................................................................................................................................37 Reporting ..................................................................................................................................37 -
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
RICH: Automatically Protecting Against Integer-Based Vulnerabilities David Brumley, Tzi-cker Chiueh, Robert Johnson [email protected], [email protected], [email protected] Huijia Lin, Dawn Song [email protected], [email protected] Abstract against integer-based attacks. Integer bugs appear because programmers do not antici- We present the design and implementation of RICH pate the semantics of C operations. The C99 standard [16] (Run-time Integer CHecking), a tool for efficiently detecting defines about a dozen rules governinghow integer types can integer-based attacks against C programs at run time. C be cast or promoted. The standard allows several common integer bugs, a popular avenue of attack and frequent pro- cases, such as many types of down-casting, to be compiler- gramming error [1–15], occur when a variable value goes implementation specific. In addition, the written rules are out of the range of the machine word used to materialize it, not accompanied by an unambiguous set of formal rules, e.g. when assigning a large 32-bit int to a 16-bit short. making it difficult for a programmer to verify that he un- We show that safe and unsafe integer operations in C can derstands C99 correctly. Integer bugs are not exclusive to be captured by well-known sub-typing theory. The RICH C. Similar languages such as C++, and even type-safe lan- compiler extension compiles C programs to object code that guages such as Java and OCaml, do not raise exceptions on monitors its own execution to detect integer-based attacks. -
Blockchain Implementation Method for Interoperability Between Cbdcs
future internet Article Blockchain Implementation Method for Interoperability between CBDCs Hyunjun Jung and Dongwon Jeong * Department of Software Convergence Engineering, Kunsan National University, Gunsan 54150, Korea; [email protected] * Correspondence: [email protected]; Tel.: +82-(063)-469-8912 Abstract: Central Bank Digital Currency (CBDC) is a digital currency issued by a central bank. Motivated by the financial crisis and prospect of a cashless society, countries are researching CBDC. Recently, global consideration has been given to paying basic income to avoid consumer sentiment shrinkage and recession due to epidemics. CBDC is coming into the spotlight as the way to manage the public finance policy of nations comprehensively. CBDC is studied by many countries. The bank of the Bahamas released Sand Dollar. Each country’s central bank should consider the situation in which CBDCs are exchanged. The transaction of the CDDB is open data. Transaction registers CBDC exchange information of the central bank in the blockchain. Open data on currency exchange between countries will provide information on the flow of money between countries. This paper proposes a blockchain system and management method based on the ISO/IEC 11179 metadata registry for exchange between CBDCs that records transactions between registered CBDCs. Each country’s CBDC will have a different implementation and time of publication. We implement the blockchain system and experiment with the operation method, measuring the block generation time of blockchains using the proposed method. Keywords: CBDC; CBDC exchange; ISO/IEC 11179; CBDC interoperability blockchain system Citation: Jung, H.; Jeong, D. Blockchain Implementation Method for Interoperability between CBDCs. Future Internet 2021, 13, 133.