谷歌浏览器插件
订阅小程序
在清言上使用

Automated Attack Synthesis for Constant Product Market Makers

arXiv (Cornell University)(2024)

引用 0|浏览10
暂无评分
摘要
Decentralized Finance enables many novel applications that were impossible intraditional finances. However, it also introduces new types of vulnerabilities,such as composability bugs. The composability bugs refer to issues that lead toerroneous behaviors when multiple smart contracts operate together. One typicalexample of composability bugs is those between token contracts and ConstantProduct Market Makers (CPMM), the most widely used model for DecentralizedExchanges. Since 2022, 23 exploits of such kind have resulted in a total lossof 2.2M USD. BlockSec, a smart contract auditing company, once reported that138 exploits of such kind occurred just in February 2023. We proposeCPMM-Exploiter, which automatically detects and generates end-to-end exploitsfor CPMM composability bugs. Generating such end-to-end exploits is challengingdue to the large search space of multiple contracts and various fees involvedwith financial services. To tackle this, we investigated real-world exploitsregarding these vulnerabilities and identified that they arise due to violatingtwo safety invariants. Based on this observation, we implementedCPMM-Exploiter, a new grammar-based fuzzer targeting the detection of thesebugs. CPMM-Exploiter uses fuzzing to find transactions that break theinvariants. It then refines these transactions to make them profitable for theattacker. We evaluated CPMM-Exploiter on two real-world exploit datasets.CPMM-Exploiter obtained recalls of 0.91 and 0.89, respectively, while fivebaselines achieved maximum recalls of 0.36 and 0.58, respectively. We furtherevaluated CPMM-Exploiter by running it on the latest blocks of the Ethereum andBinance networks. It successfully generated 18 new exploits, which can resultin 12.9K USD profit in total.
更多
查看译文
关键词
Attack Graphs,Dynamic Analysis,Security Analysis
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要