CoinWatch:一种基于克隆的加密货币漏洞检测方法

Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, I. Homoliak, Yun Lin, Jun Sun
{"title":"CoinWatch:一种基于克隆的加密货币漏洞检测方法","authors":"Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, I. Homoliak, Yun Lin, Jun Sun","doi":"10.1109/Blockchain50366.2020.00011","DOIUrl":null,"url":null,"abstract":"Cryptocurrencies have become very popular in recent years. Thousands of new cryptocurrencies have emerged, proposing new and novel techniques that improve on Bitcoin’s core innovation of the blockchain data structure and consensus mechanism. However, cryptocurrencies are a major target for cyber-attacks, as they can be sold on exchanges anonymously and most cryptocurrencies have their codebases publicly available. One particular issue is the prevalence of code clones in cryptocurrencies, which may amplify security threats. If a vulnerability is found in one cryptocurrency, it might be propagated into other cloned cryptocurrencies. In this work, we propose a systematic remedy to this problem, called COINWATCH $\\left( {\\mathcal{C}\\mathcal{W}} \\right)$. Given a reported vulnerability at the input, $\\mathcal{C}\\mathcal{W}$ uses the code evolution analysis and a clone detection technique for the indication of cryptocurrencies that might be vulnerable. We applied $\\mathcal{C}\\mathcal{W}$ on 1094 cryptocurrencies using 4 CVEs and obtained 786 true vulnerabilities present in 384 projects, which were confirmed with developers and successfully reported as CVE extensions.","PeriodicalId":109440,"journal":{"name":"2020 IEEE International Conference on Blockchain (Blockchain)","volume":"79 8","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"CoinWatch: A Clone-Based Approach For Detecting Vulnerabilities in Cryptocurrencies\",\"authors\":\"Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, I. Homoliak, Yun Lin, Jun Sun\",\"doi\":\"10.1109/Blockchain50366.2020.00011\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cryptocurrencies have become very popular in recent years. Thousands of new cryptocurrencies have emerged, proposing new and novel techniques that improve on Bitcoin’s core innovation of the blockchain data structure and consensus mechanism. However, cryptocurrencies are a major target for cyber-attacks, as they can be sold on exchanges anonymously and most cryptocurrencies have their codebases publicly available. One particular issue is the prevalence of code clones in cryptocurrencies, which may amplify security threats. If a vulnerability is found in one cryptocurrency, it might be propagated into other cloned cryptocurrencies. In this work, we propose a systematic remedy to this problem, called COINWATCH $\\\\left( {\\\\mathcal{C}\\\\mathcal{W}} \\\\right)$. Given a reported vulnerability at the input, $\\\\mathcal{C}\\\\mathcal{W}$ uses the code evolution analysis and a clone detection technique for the indication of cryptocurrencies that might be vulnerable. We applied $\\\\mathcal{C}\\\\mathcal{W}$ on 1094 cryptocurrencies using 4 CVEs and obtained 786 true vulnerabilities present in 384 projects, which were confirmed with developers and successfully reported as CVE extensions.\",\"PeriodicalId\":109440,\"journal\":{\"name\":\"2020 IEEE International Conference on Blockchain (Blockchain)\",\"volume\":\"79 8\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-06-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE International Conference on Blockchain (Blockchain)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/Blockchain50366.2020.00011\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Conference on Blockchain (Blockchain)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Blockchain50366.2020.00011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

摘要

近年来,加密货币变得非常流行。成千上万种新的加密货币已经出现,提出了新的和新颖的技术,这些技术改进了比特币在区块链数据结构和共识机制方面的核心创新。然而,加密货币是网络攻击的主要目标,因为它们可以在交易所匿名出售,而且大多数加密货币的代码库都是公开的。一个特别的问题是加密货币中普遍存在的代码克隆,这可能会放大安全威胁。如果在一种加密货币中发现漏洞,它可能会传播到其他克隆的加密货币中。在这项工作中,我们提出了一个系统的解决这个问题的方法,称为COINWATCH $\left({\mathcal{C}\mathcal{W}} \right)$。给定输入处报告的漏洞,$\mathcal{C}\mathcal{W}$使用代码演化分析和克隆检测技术来指示可能易受攻击的加密货币。我们使用4个CVE对1094种加密货币应用$\mathcal{C}\mathcal{W}$,获得384个项目中存在的786个真实漏洞,并与开发人员确认并成功报告为CVE扩展。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
CoinWatch: A Clone-Based Approach For Detecting Vulnerabilities in Cryptocurrencies
Cryptocurrencies have become very popular in recent years. Thousands of new cryptocurrencies have emerged, proposing new and novel techniques that improve on Bitcoin’s core innovation of the blockchain data structure and consensus mechanism. However, cryptocurrencies are a major target for cyber-attacks, as they can be sold on exchanges anonymously and most cryptocurrencies have their codebases publicly available. One particular issue is the prevalence of code clones in cryptocurrencies, which may amplify security threats. If a vulnerability is found in one cryptocurrency, it might be propagated into other cloned cryptocurrencies. In this work, we propose a systematic remedy to this problem, called COINWATCH $\left( {\mathcal{C}\mathcal{W}} \right)$. Given a reported vulnerability at the input, $\mathcal{C}\mathcal{W}$ uses the code evolution analysis and a clone detection technique for the indication of cryptocurrencies that might be vulnerable. We applied $\mathcal{C}\mathcal{W}$ on 1094 cryptocurrencies using 4 CVEs and obtained 786 true vulnerabilities present in 384 projects, which were confirmed with developers and successfully reported as CVE extensions.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信