IEEE Access (Jan 2024)

Involuntary Transfer: A Vulnerability Pattern in Smart Contracts

  • Zulfiqar Ali Khan,
  • Akbar Siami Namin

DOI
https://doi.org/10.1109/ACCESS.2024.3351736
Journal volume & issue
Vol. 12
pp. 62459 – 62479

Abstract

Read online

Smart Contracts (SCs) communicate with each other using external calls. Their interactions can be malicious, resulting in the loss of Ether. One can blame the reentrancy attack for this exploitation. Several previous endeavors detected the reentrancy vulnerability by creating testing tools using static analysis like Remix. However, these approaches do not execute the programs. Hence, we cannot confirm their actual results. In this paper, we present TechyTech that detects both reentrancy and ${\mathtt { tx.origin}}$ vulnerabilities using a novel dynamic analysis approach of involuntary transfer (i.e., unintended transfer). Henceforth, we use a tree-based categorization string to distinguish the two vulnerabilities and their variations. Further, our research discusses multiple SC-related issues like the hijackedStack, deployed owner, and non-generation of transaction receipts in connection with reentrant calls, which we could not find in previous work. Through an example, we demonstrate how the actual Ether transfer is greater than the intended due to reentrancy.

Keywords