Jisuanji kexue yu tansuo (Nov 2022)

Survey of Research on Smart Contract Vulnerability Detection

  • LI Leixiao, ZHENG Yue, GAO Haoyu, XIONG Xiao, NIU Tieming, DU Jinze, GAO Jing

DOI
https://doi.org/10.3778/j.issn.1673-9418.2203024
Journal volume & issue
Vol. 16, no. 11
pp. 2456 – 2470

Abstract

Read online

As an important part of blockchain technology, smart contracts are widely used in various fields through decentralized applications written by smart contracts, providing important technical support for the development and application of blockchain. However, the development has brought security problems at the same time, and a large number of vulnerability attacks against smart contracts have made researchers pay more attention to the security vulnerabilities of smart contracts. How to quickly and accurately perform vulnerability detection has become an urgent problem to be solved. Firstly, through the analysis of common vulnerabilities such as reentrancy attack vulnerabilities, integer overflow and access control vulnerabilities, researchers can fully understand the common vulnerabilities. Secondly, by investigating the current status of vulnerability detection methods such as formal verification, symbolic execution, machine learning and their corresponding tools at home and abroad, analyzing and discussing the advantages and disadvantages of the tools, at the same time, replicating some tools for experiments, the performance of the vulnerability detection tools is demonstrated based on the detection speed, accuracy, and the number of vulnerabilities that support detection. Finally, suggestions for future research directions are given based on the analysis results of smart contract vulnerability detection tools.

Keywords