Securing the Ethereum from Smart Ponzi Schemes: Identification Using Static Features
Citations Over TimeTop 10% of 2022 papers
Abstract
Malware detection approaches have been extensively studied for traditional software systems. However, the development of blockchain technology has promoted the birth of a new type of software system–decentralized applications. Composed of smart contracts, a type of application that implements the Ponzi scheme logic (called smart Ponzi schemes) has caused irreversible loss and hindered the development of blockchain technology. These smart contracts generally had a short life but involved a large amount of money. Whereas identification of these Ponzi schemes before causing financial loss has been significantly important, existing methods suffer from three main deficiencies, i.e., the insufficient dataset, the reliance on the transaction records, and the low accuracy. In this study, we first build a larger dataset. Then, a large number of features from multiple views, including bytecode, semantic, and developers, are extracted. These features are independent of the transaction records. Furthermore, we leveraged machine learning methods to build our identification model, i.e., Mul ti-view Cas cade Ensemble model (MulCas). The experiment results show that MulCas can achieve higher performance and robustness in the scope of our dataset. Most importantly, the proposed method can identify smart Ponzi scheme at the creation time.
Related Papers
- → Idea: Opcode-Sequence-Based Malware Detection(2010)192 cited
- → VulHunter: Hunting Vulnerable Smart Contracts at EVM Bytecode-Level via Multiple Instance Learning(2023)29 cited
- → A comparison between API call sequences and opcode sequences as reflectors of malware behavior(2017)9 cited
- → Analysis and Comparison of Opcode-based Malware Detection Approaches(2018)5 cited
- → Malware Detection Approaches based on Operational Codes (OpCodes) of Executable Programs: A Review(2023)