Open Access iconOpen Access

ARTICLE

crossmark

ISmart: Protecting Smart Contract Against Integer Bugs

Xingyu Zeng1, Hua Zhang1,*, Chaosong Yan2, Liu Zhao1, Qiaoyan Wen1

1 State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China
2 Olin Business School, Washington University in St. Louis, St. Louis, 63130, USA

* Corresponding Author: Hua Zhang. Email: email

Intelligent Automation & Soft Computing 2022, 33(2), 997-1008. https://doi.org/10.32604/iasc.2022.022801

Abstract

Blockchain technology is known as a decentralized, distributed ledger that records digital asset. It has been applied in numbers of aspects of society, including finance, judiciary and commerce. Ethereum is referred to as the next generation decentralized application platform. It is one of the most popular blockchain platforms that supports smart contracts. Smart contract is a set of codes that sored on blockchain and can be called and created as turing-complete programs running on the blockchain. Developers use smart contracts to build decentralized applications (Dapp) which has widely used cryptocurrency related project. As smart contracts become more popular and more valuable, they are faced with more risk of being hacked. As a result that smart contracts cannot be modified once deployed on the blockchain, it is a great challenge to fix and update deployed vulnerable contract which can lead to a huge loss of cryptocurrency and financial disorder. In this paper, we focus on Integer Bugs in Ethereum Smart Contracts and present ISmart, which protects deployed smart contracts against attacks caused by Integer Bugs. We implemented ISmart based on go-ethereum, a Ethereum client written in Go, by adding a simplified taint analysis component. In our preliminary, ISmart can prevent attacks accurately with little runtime overhead.

Keywords


Cite This Article

X. Zeng, H. Zhang, C. Yan, L. Zhao and Q. Wen, "Ismart: protecting smart contract against integer bugs," Intelligent Automation & Soft Computing, vol. 33, no.2, pp. 997–1008, 2022. https://doi.org/10.32604/iasc.2022.022801



cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1198

    View

  • 782

    Download

  • 0

    Like

Share Link