<div class="csl-bib-body">
<div class="csl-entry">DiAngelo, M., Mohr, R., & Salzer, G. (2024). Systematic Study of Compilers and Vulnerability Scanners Using the Example of Integer Bugs. In <i>2024 IEEE International Conference on Blockchain (Blockchain)</i> (pp. 243–251). https://doi.org/10.1109/Blockchain62396.2024.00039</div>
</div>
-
dc.identifier.uri
http://hdl.handle.net/20.500.12708/201679
-
dc.description.abstract
Blockchain programs, also known as smart contracts, are particularly prone to attacks when they are freely accessible on public blockchains and manage valuable assets. Therefore, compilers and vulnerability scanners aim at the automated prevention and detection of weaknesses in such programs. To assess the effectiveness of these countermeasures, benchmark sets of real-world samples are the norm. While this approach is useful, it has shortcomings like selection bias, small size, and the controversial assessment of properties.
In this paper, we advocate the use of benchmark sets that are systematically generated from templates by varying parameters along several dimensions. This way, we obtain large benchmark sets covering the weakness space in a fine-grained manner. By running tools like compilers and vulnerability scanners on such sets, we obtain profiles that allow us to assess individual properties of a tool as well as differences between tools.
To showcase our approach, we take integer bugs in Solidity and the Ethereum virtual machine as an exemplary vulnerability. We collect variants of the bug from academic literature and generate two benchmark sets with 1411 and 174768 sample programs, respectively. We use the first set to compare the profiles of ten versions of the Solidity compiler and the second one to analyze the behavior of two vulnerability scanners, Mythril and Osiris. Our analysis reveals various discrepancies and peculiarities of the tools. Moreover, our systematic tests help explain why tools that address the same vulnerability tend to disagree.
en
dc.language.iso
en
-
dc.subject
benchmark
en
dc.subject
profiling
en
dc.subject
security
en
dc.subject
smart contract
en
dc.subject
vulnerability
en
dc.title
Systematic Study of Compilers and Vulnerability Scanners Using the Example of Integer Bugs
en
dc.type
Inproceedings
en
dc.type
Konferenzbeitrag
de
dc.relation.isbn
979-8-3503-5159-0
-
dc.description.startpage
243
-
dc.description.endpage
251
-
dc.type.category
Full-Paper Contribution
-
tuw.booktitle
2024 IEEE International Conference on Blockchain (Blockchain)
-
tuw.peerreviewed
true
-
tuw.researchTopic.id
I4
-
tuw.researchTopic.name
Information Systems Engineering
-
tuw.researchTopic.value
100
-
tuw.publication.orgunit
E191-03 - Forschungsbereich Automation Systems
-
tuw.publication.orgunit
E192-05 - Forschungsbereich Theory and Logic
-
tuw.publisher.doi
10.1109/Blockchain62396.2024.00039
-
dc.description.numberOfPages
9
-
tuw.author.orcid
0000-0002-4217-4530
-
tuw.author.orcid
0009-0000-9869-7122
-
tuw.author.orcid
0000-0002-8950-1551
-
tuw.event.name
IEEE International Conference on Blockchain (Blockchain) 2024