Please use this identifier to cite or link to this item: https://www.um.edu.mt/library/oar/handle/123456789/99376
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAquilina, Simon Joseph-
dc.contributor.authorCasino, Fran-
dc.contributor.authorVella, Mark Joseph-
dc.contributor.authorEllul, Joshua-
dc.contributor.authorPatsakis, Constantinos-
dc.date.accessioned2022-07-15T07:35:39Z-
dc.date.available2022-07-15T07:35:39Z-
dc.date.issued2021-
dc.identifier.citationAquilina, S. J., Casino, F., Vella, M., Ellul, J., & Patsakis, C. (2021). EtherClue: Digital investigation of attacks on Ethereum smart contracts. Blockchain: Research and Applications, 2(4), 100028en_GB
dc.identifier.urihttps://www.um.edu.mt/library/oar/handle/123456789/99376-
dc.description.abstractProgramming errors in Ethereum smart contracts can result in catastrophic financial losses from stolen cryptocurrency. While vulnerability detectors can prevent vulnerable contracts from being deployed, this does not mean that such contracts will not be deployed. Once a vulnerable contract is instantiated on the blockchain and becomes the target of attacks, the identification of exploit transactions becomes indispensable in assessing whether it has been actually exploited and identifying which malicious or subverted accounts were involved. In this work, we study the problem of post-factum investigation of Ethereum attacks using Indicators of Compromise (IoC) specially crafted for use in the blockchain. IoC definitions need to capture the side-effects of successful exploitation in the context of the Ethereum blockchain. Therefore, we define a model for smart contract execution, comprising multiple abstraction levels that mirror the multiple views of code execution on a blockchain. Subsequently, we compare IoCs defined across the different levels in terms of their effectiveness and practicality through EtherClue, a prototype tool for investigating Ethereum security incidents. Our results illustrate that coarse-grained IoCs defined over blocks of transactions can detect exploit transactions with less computation. However, they are contract-specific and suffer from false negatives. On the other hand, fine-grained IoCs defined over virtual machine instructions can avoid these pitfalls at the expense of increased computation, which is nevertheless applicable for practical use.en_GB
dc.language.isoenen_GB
dc.publisherElsevier Ltd.en_GB
dc.rightsinfo:eu-repo/semantics/openAccessen_GB
dc.subjectBlockchains (Databases)en_GB
dc.subjectComputer crimesen_GB
dc.subjectMalware (Computer software)en_GB
dc.subjectComputer securityen_GB
dc.subjectCriminal investigation -- Technological innovationsen_GB
dc.titleEtherClue : digital investigation of attacks on Ethereum smart contractsen_GB
dc.typearticleen_GB
dc.rights.holderThe copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holder.en_GB
dc.description.reviewedpeer-revieweden_GB
dc.identifier.doi10.1016/j.bcra.2021.100028-
dc.publication.titleBlockchain : Research and Applicationsen_GB
Appears in Collections:Scholarly Works - FacICTCS

Files in This Item:
File Description SizeFormat 
EtherClue__Digital_investigation_of_attacks_on_Ethereum_smart_contracts(2021).pdf2.45 MBAdobe PDFView/Open


Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.