TY - EJOU AU - Han, Yu AU - Ji, Tiantian AU - Wang, Zhongru AU - Liu, Hao AU - Jiang, Hai AU - Wang, Wendi AU - Cui, Xiang TI - An Adversarial Smart Contract Honeypot in Ethereum T2 - Computer Modeling in Engineering \& Sciences PY - 2021 VL - 128 IS - 1 SN - 1526-1506 AB - A smart contract honeypot is a special type of smart contract. This type of contract seems to have obvious vulnerabilities in contract design. If a user transfers a certain amount of funds to the contract, then the user can withdraw the funds in the contract. However, once users try to take advantage of this seemingly obvious vulnerability, they will fall into a real trap. Consequently, the user’s investment in the contract cannot be retrieved. The honeypot induces other accounts to launch funds, which seriously threatens the security of property on the blockchain. Detection methods for honeypots are available. However, studying the manner by which to defend existing honeypots is insufficient to fight against honeypots. The new honeypots that may appear in the future from the perspective of an attacker must also be predicted. Therefore, we propose a type of adversarial honeypot. The code and behavioral features of honeypots are obtained through a comparative analysis of the 158,568 non-honeypots and 352 honeypots. To build an adversarial honeypot, we try to separately hide these features and make the honeypot bypass the existing detection technology. We construct 18 instances on the basis of the proposed adversarial honeypot and use an open-source honeypot detection tool to detect these instances. The experimental result shows that the proposed honeypot can bypass the detection tool with a 100% ratio. Therefore, this type of honeypot should be given attention, and defensive measures should be proposed as soon as possible. KW - Honeypot; smart contract; adversarial; bypass detection DO - 10.32604/cmes.2021.015809