WIKINDX Resources

Yi, X., Wu, D., Jiang, L., Fang, Y., Zhang, K., & Zhang, W. 2022, An empirical study of blockchain system vulnerabilities: Modules, types, and patterns. Paper presented at Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 
Added by: Rucknium (2022-12-02 16:31)   
Resource type: Proceedings Article
DOI: 10.1145/3540250.3549105
ID no. (ISBN etc.): 9781450394130
BibTeX citation key: Yi2022
View all bibliographic details
Categories: Monero-focused
Keywords: Blockchain Security, Data Mining, System Vulnerability
Creators: Fang, Jiang, Wu, Yi, Zhang, Zhang
Collection: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering
Views: 43/390
Attachments   3540250.3549105.pdf [4/77] URLs
Blockchain, as a distributed ledger technology, becomes increasingly popular, especially for enabling valuable cryptocurrencies and smart contracts. However, the blockchain software systems inevitably have many bugs. Although bugs in smart contracts have been extensively investigated, security bugs of the underlying blockchain systems are much less explored. In this paper, we conduct an empirical study on blockchain’s system vulnerabilities from four representative blockchains, Bitcoin, Ethereum, Monero, and Stellar. Specifically, we first design a systematic filtering process to effectively identify 1,037 vulnerabilities and their 2,317 patches from 34,245 issues/PRs (pull requests) and 85,164 commits on GitHub. We thus build the first blockchain vulnerability dataset, which is available at We then perform unique analyses of this dataset at three levels, including (i) file-level vulnerable module categorization by identifying and correlating module paths across projects, (ii) text-level vulnerability type clustering by natural language processing and similarity-based sentence clustering, and (iii) code-level vulnerability pattern analysis by generating and clustering code change signatures that capture both syntactic and semantic information of patch code fragments. Our analyses reveal three key findings: (i) some blockchain modules are more susceptible than the others; notably, each of the modules related to consensus, wallet, and networking has over 200 issues; (ii) about 70% of blockchain vulnerabilities are of traditional types, but we also identify four new types specific to blockchains; and (iii) we obtain 21 blockchain-specific vulnerability patterns that capture unique blockchain attributes and statuses, and demonstrate that they can be used to detect similar vulnerabilities in other popular blockchains, such as Dogecoin, Bitcoin SV, and Zcash.
Added by: Rucknium  
WIKINDX 6.5.0 | Total resources: 161 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: American Psychological Association (APA)