An Adversarial Smart Contract Honeypot in Ethereum
作者机构:Key Laboratory of Trustworthy Distributed Computing and Service(BUPT)Ministry of EducationBeijing University of Posts and TelecommunicationsBeijing100876China Chinese Academy of Cyberspace StudiesBeijing100010China Qianxin Technology Group Co.Ltd.Beijing100088China Beijing DigApis Technology Co.Ltd.Beijing100081China Cyberspace Institute of Advanced TechnologyGuangzhou UniversityGuangzhou510006China
出 版 物:《Computer Modeling in Engineering & Sciences》 (工程与科学中的计算机建模(英文))
年 卷 期:2021年第128卷第7期
页 面:247-267页
核心收录:
学科分类:0809[工学-电子科学与技术(可授工学、理学学位)] 08[工学]
基 金:This work was supported by the Guangdong Province Key Field Research and Development Program under Nos.2019B010137003 and 2019B010136004 the National Key Research and Development Program under Grant Nos.2018YFB0803504 and 2019YFA0706404
主 题:Honeypot smart contract adversarial bypass detection
摘 要:A smart contract honeypot is a special type of smart *** type of contract seems to have obvious vulnerabilities in contract *** a user transfers a certain amount of funds to the contract,then the user can withdraw the funds in the ***,once users try to take advantage of this seemingly obvious vulnerability,they will fall into a real ***,the user’s investment in the contract cannot be *** honeypot induces other accounts to launch funds,which seriously threatens the security of property on the *** methods for honeypots are ***,studying the manner by which to defend existing honeypots is insufficient to fight against *** new honeypots that may appear in the future from the perspective of an attacker must also be ***,we propose a type of adversarial *** code and behavioral features of honeypots are obtained through a comparative analysis of the 158,568 nonhoneypots and 352 *** build an adversarial honeypot,we try to separately hide these features and make the honeypot bypass the existing detection *** construct 18 instances on the basis of the proposed adversarial honeypot and use an open-source honeypot detection tool to detect these *** experimental result shows that the proposed honeypot can bypass the detection tool with a 100%***,this type of honeypot should be given attention,and defensive measures should be proposed as soon as possible.