1,067 research outputs found
The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts
Modern blockchains, such as Ethereum, enable the execution of so-called smart
contracts - programs that are executed across a decentralised network of nodes.
As smart contracts become more popular and carry more value, they become more
of an interesting target for attackers. In the past few years, several smart
contracts have been exploited by attackers. However, a new trend towards a more
proactive approach seems to be on the rise, where attackers do not search for
vulnerable contracts anymore. Instead, they try to lure their victims into
traps by deploying seemingly vulnerable contracts that contain hidden traps.
This new type of contracts is commonly referred to as honeypots. In this paper,
we present the first systematic analysis of honeypot smart contracts, by
investigating their prevalence, behaviour and impact on the Ethereum
blockchain. We develop a taxonomy of honeypot techniques and use this to build
HoneyBadger - a tool that employs symbolic execution and well defined
heuristics to expose honeypots. We perform a large-scale analysis on more than
2 million smart contracts and show that our tool not only achieves high
precision, but is also highly efficient. We identify 690 honeypot smart
contracts as well as 240 victims in the wild, with an accumulated profit of
more than $90,000 for the honeypot creators. Our manual validation shows that
87% of the reported contracts are indeed honeypots
Towards Smart Hybrid Fuzzing for Smart Contracts
Smart contracts are Turing-complete programs that are executed across a
blockchain network. Unlike traditional programs, once deployed they cannot be
modified. As smart contracts become more popular and carry more value, they
become more of an interesting target for attackers. In recent years, smart
contracts suffered major exploits, costing millions of dollars, due to
programming errors. As a result, a variety of tools for detecting bugs has been
proposed. However, majority of these tools often yield many false positives due
to over-approximation or poor code coverage due to complex path constraints.
Fuzzing or fuzz testing is a popular and effective software testing technique.
However, traditional fuzzers tend to be more effective towards finding shallow
bugs and less effective in finding bugs that lie deeper in the execution. In
this work, we present CONFUZZIUS, a hybrid fuzzer that combines evolutionary
fuzzing with constraint solving in order to execute more code and find more
bugs in smart contracts. Evolutionary fuzzing is used to exercise shallow parts
of a smart contract, while constraint solving is used to generate inputs which
satisfy complex conditions that prevent the evolutionary fuzzing from exploring
deeper paths. Moreover, we use data dependency analysis to efficiently generate
sequences of transactions, that create specific contract states in which bugs
may be hidden. We evaluate the effectiveness of our fuzzing strategy, by
comparing CONFUZZIUS with state-of-the-art symbolic execution tools and
fuzzers. Our evaluation shows that our hybrid fuzzing approach produces
significantly better results than state-of-the-art symbolic execution tools and
fuzzers
Towards Usable Protection Against Honeypots
The Ethereum blockchain enables the execution of so-called smart contracts. These are programs that facilitate the automated transfer of funds according to a given business logic without the participants requiring to trust one another. However, recently attackers started using smart contracts to lure users into traps by deploying contracts that pretend to give away funds but in fact contain hidden traps. This new type of scam is commonly referred to as honeypots. In this paper, we propose a system that aims to protect users from falling into these traps. The system consists of a plugin for MetaMask and a back-end service that continuously scans the Ethereum blockchain for honeypots. Whenever a user is about to perform a transaction through MetaMask, our plugin sends a request to the back-end and warns the user if the target contract is a honeypot
Ethereum's Proposer-Builder Separation: Promises and Realities
With Ethereum's transition from Proof-of-Work to Proof-of-Stake in September
2022 came another paradigm shift, the Proposer-Builder Separation (PBS) scheme.
PBS was introduced to decouple the roles of selecting and ordering transactions
in a block (i.e., the builder), from those validating its contents and
proposing the block to the network as the new head of the blockchain (i.e., the
proposer). In this landscape, proposers are the validators in the
Proof-of-Stake consensus protocol who validate and secure the network, while
now relying on specialized block builders for creating blocks with the most
value (e.g., transaction fees) for the proposer. Additionally, relays play a
crucial new role in this ecosystem, acting as mediators between builders and
proposers, being entrusted with the responsibility of transmitting the most
lucrative blocks from the builders to the proposers.
PBS is currently an opt-in protocol (i.e., a proposer can still opt-out and
build their own blocks). In this work, we study it's adoption and show that the
current PBS landscape exhibits significant centralization amongst the builders
and relays. We further explore whether PBS effectively achieves its intended
objectives of enabling hobbyist validators to maximize block profitability and
preventing censorship. Our findings reveal that although PBS grants all
validators the same opportunity to access optimized and competitive blocks, it
tends to stimulate censorship rather than reduce it. Additionally, our analysis
demonstrates that relays do not consistently uphold their commitments and may
prove unreliable. Specifically, there are instances where proposers do not
receive the complete value as initially promised, and the censorship or
filtering capabilities pledged by the relay exhibit significant gaps
High-Frequency Trading on Decentralized On-Chain Exchanges
Decentralized exchanges (DEXs) allow parties to participate in financial
markets while retaining full custody of their funds. However, the transparency
of blockchain-based DEX in combination with the latency for transactions to be
processed, makes market-manipulation feasible. For instance, adversaries could
perform front-running -- the practice of exploiting (typically non-public)
information that may change the price of an asset for financial gain. In this
work we formalize, analytically exposit and empirically evaluate an augmented
variant of front-running: sandwich attacks, which involve front- and
back-running victim transactions on a blockchain-based DEX. We quantify the
probability of an adversarial trader being able to undertake the attack, based
on the relative positioning of a transaction within a blockchain block. We find
that a single adversarial trader can earn a daily revenue of over several
thousand USD when performing sandwich attacks on one particular DEX -- Uniswap,
an exchange with over 5M USD daily trading volume by June 2020. In addition to
a single-adversary game, we simulate the outcome of sandwich attacks under
multiple competing adversaries, to account for the real-world trading
environment
ÆGIS: Smart Shielding of Smart Contracts
In recent years, smart contracts have suffered major exploits, losing millions of dollars. Unlike traditional programs, smart contracts cannot be updated once deployed. Though various tools were pro- posed to detect vulnerable smart contracts, they all fail to protect contracts that have already been deployed on the blockchain. More- over, they focus on vulnerabilities, but do not address scams (e.g., honeypots). In this work, we introduce ÆGIS, a tool that shields smart contracts and users on the blockchain from being exploited. To this end, ÆGIS reverts transactions in real-time based on pat- tern matching. These patterns encode the detection of malicious transactions that trigger exploits or scams. New patterns are voted upon and stored via a smart contract, thus leveraging the benefits of tamper-resistance and transparency provided by blockchain. By allowing its protection to be updated, the smart contract acts as a smart shield
A Flash(bot) in the Pan: Measuring Maximal Extractable Value in Private Pools
The rise of Ethereum has lead to a flourishing decentralized marketplace that has, unfortunately, fallen victim to frontrunning and Maximal Extractable Value (MEV) activities, where savvy participants game transaction orderings within a block for profit. One popular solution to address such behavior is Flashbots, a private pool with infrastructure and design goals aimed at eliminating the negative externalities associated with MEV. While Flashbots has established laudable goals to address MEV behavior, no evidence has been provided to show that these goals are achieved in practice.
In this paper, we measure the popularity of Flashbots and evaluate if it is meeting its chartered goals. We find that (1) Flashbots miners account for over 99.9% of the hashing power in the Ethereum network, (2) powerful miners are making more than 2x what they were making prior to using Flashbots, while non-miners' slice of the pie has shrunk commensurately, (3) mining is just as centralized as it was prior to Flashbots with more than 90% of Flashbots blocks coming from just two miners, and (4) while more than 80% of MEV extraction in Ethereum is happening through Flashbots, 13.2% is coming from other private pools
The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts
In recent years, Ethereum gained tremendously in popularity, growing from a
daily transaction average of 10K in January 2016 to an average of 500K in
January 2020. Similarly, smart contracts began to carry more value, making them
appealing targets for attackers. As a result, they started to become victims of
attacks, costing millions of dollars. In response to these attacks, both
academia and industry proposed a plethora of tools to scan smart contracts for
vulnerabilities before deploying them on the blockchain. However, most of these
tools solely focus on detecting vulnerabilities and not attacks, let alone
quantifying or tracing the number of stolen assets. In this paper, we present
Horus, a framework that empowers the automated detection and investigation of
smart contract attacks based on logic-driven and graph-driven analysis of
transactions. Horus provides quick means to quantify and trace the flow of
stolen assets across the Ethereum blockchain. We perform a large-scale analysis
of all the smart contracts deployed on Ethereum until May 2020. We identified
1,888 attacked smart contracts and 8,095 adversarial transactions in the wild.
Our investigation shows that the number of attacks did not necessarily decrease
over the past few years, but for some vulnerabilities remained constant.
Finally, we also demonstrate the practicality of our framework via an in-depth
analysis on the recent Uniswap and Lendf.me attacks
High-Frequency Trading on Decentralized On-Chain Exchanges
Decentralized exchanges (DEXs) allow parties to participate in financial markets while retaining full custody of their funds. However, the transparency of blockchain-based DEX in combination with the latency for transactions to be processed, makes market-manipulation feasible. For instance, adversaries could perform front-running — the practice of exploiting (typically non-public) information that may change the price of an asset for financial gain.
In this work we formalize, analytically exposit and empirically evaluate an augmented variant of front- running: sandwich attacks, which involve front- and back-running victim transactions on a blockchain-based DEX. We quantify the probability of an adversarial trader being able to undertake the attack, based on the relative positioning of a transaction within a blockchain block. We find that a single adversarial trader can earn a daily revenue of over several thousand USD when performing sandwich attacks on one particular DEX — Uniswap, an exchange with over 5M USD daily trading volume by June 2020. In addition to a single-adversary game, we simulate the outcome of sandwich attacks under multiple competing adversaries, to account for the real-world trading environment
- …