• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xiang Jie, Yang Zhemin, Zhou Shunfan, Yang Min. A Runtime Information Based Defense Technique for Ethereum Smart Contract[J]. Journal of Computer Research and Development, 2021, 58(4): 834-848. DOI: 10.7544/issn1000-1239.2021.20200135
Citation: Xiang Jie, Yang Zhemin, Zhou Shunfan, Yang Min. A Runtime Information Based Defense Technique for Ethereum Smart Contract[J]. Journal of Computer Research and Development, 2021, 58(4): 834-848. DOI: 10.7544/issn1000-1239.2021.20200135

A Runtime Information Based Defense Technique for Ethereum Smart Contract

More Information
  • Published Date: March 31, 2021
  • As one of the most successful applications of blockchain technology, Ethereum smart contract has been widely integrated into programs and become a common implementation scheme for decentralized applications. However, smart contract suffers from security attacks since born because of its unique financial characteristics, and fresh attack forms continue to dribble out. State-of-art research works have proposed many effective mechanisms to detect vulnerabilities in smart contract, but they all have limitations in practical, such as design only for known vulnerabilities, need to modify the contract code, and the cost on-chain is too high. Because of the immutability of smart contract, these defense techniques which aim at specific vulnerabilities cannot fix the original contract, and as a result, they can hardly work on the new attack forms. To this end, we present a runtime information based upgradable defense system for Ethereum smart contract, which provides real-time data for the off-chain attack detection by collecting kinds of runtime information. At the same time, we design an access control mechanism deployed on smart contract, which restricts the access to the contract based on the dynamic detection result, so that we can secure the contract without modifying the code. Ethereum does not provide a mechanism to recognize and intercept real-time attack transactions, So we make use of race condition to enhance the defense on the real-time attack. The evaluation results show that out defense technology is extremely effective to prevent attacks, which can achieve 100% success rate for the follow-up attacks and achieve 97.5% success rate for the first attack detected by the use of race condition.
  • Related Articles

    [1]Du Ruizhong, Liu Yan, Tian Junfeng. An Access Control Method Using Smart Contract for Internet of Things[J]. Journal of Computer Research and Development, 2019, 56(10): 2287-2298. DOI: 10.7544/issn1000-1239.2019.20190416
    [2]Su Mang, Li Fenghua, Shi Guozhen. Action-Based Multi-level Access Control Model[J]. Journal of Computer Research and Development, 2014, 51(7): 1604-1613.
    [3]Liu Wu, Duan Haixin, Zhang Hong, Ren Ping, Wu Jianping. TRBAC: Trust Based Access Control Model[J]. Journal of Computer Research and Development, 2011, 48(8): 1414-1420.
    [4]Wu Xinsong, He Yeping, Zhou Zhouyi, Liang Hongliang. An Environment-Adaptive Role-Based Access Control Model[J]. Journal of Computer Research and Development, 2011, 48(6): 983-990.
    [5]Nie Xiaowei, Feng Dengguo. TXACML—An Access Control Policy Framework Based on Trusted Platform[J]. Journal of Computer Research and Development, 2008, 45(10): 1676-1686.
    [6]Shan Zhiyong and Shi Wenchang. STBAC: A New Access Control Model for Operating System[J]. Journal of Computer Research and Development, 2008, 45(5): 758-764.
    [7]Li Xiaofeng, Feng Dengguo, and Xu Zhen. A Generic Access Control Administration Model[J]. Journal of Computer Research and Development, 2007, 44(6): 947-957.
    [8]Chen Ying, Yang Shoubao, Guo Leitao, and Shen Kai. A Dynamic Access Control Scheme Across Multi-Domains in Grid Environment[J]. Journal of Computer Research and Development, 2006, 43(11): 1863-1869.
    [9]Xu Zhen, Li Lan, Feng Dengguo. An Access Control Model for DBMS Based on Dynamic Context Stack[J]. Journal of Computer Research and Development, 2005, 42(12): 2093-2099.
    [10]Long Qin, Liu Peng, Pan Aimin. Research and Implementation of an Extended Administrative Role-Based Access Control Model[J]. Journal of Computer Research and Development, 2005, 42(5): 868-876.
  • Cited by

    Periodical cited type(6)

    1. 屠要峰,韩银俊,金浩,陈正华,陈兵. UStore:面向新型硬件的统一存储系统. 计算机研究与发展. 2023(03): 525-538 . 本站查看
    2. 杨阔,李海涛,张雪梅. 基于可信云计算的非集中式元数据存储结构优化. 计算技术与自动化. 2023(01): 183-187 .
    3. 杨锋,张旭东,焦彦华,李上群,童胜昌. 基于遗传算法的业务标签优先级排序系统. 电子设计工程. 2023(11): 36-40 .
    4. 李可成. 基于嵌入式软PLC分布式控制系统设计. 计算机测量与控制. 2023(08): 110-115 .
    5. 马潇潇,杨帆,王展,元国军,安学军. 智能网卡综述. 计算机研究与发展. 2022(01): 1-21 . 本站查看
    6. 郑涛,林亮景,邓永强. 动态加权聚类算法在多媒体信息融合中的应用. 现代计算机. 2021(20): 1-7 .

    Other cited types(1)

Catalog

    Article views (767) PDF downloads (462) Cited by(7)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return