论文标题

时间旅行调查:建立以太坊上的可扩展攻击检测框架

Time-Travel Investigation: Towards Building A Scalable Attack Detection Framework on Ethereum

论文作者

Wu, Lei, Wu, Siwei, Zhou, Yajin, Li, Runhuai, Wang, Zhi, Luo, Xiapu, Wang, Cong, Ren, Kui

论文摘要

作为代表性区块链平台之一,以太坊吸引了许多攻击。由于存在财务损失,因此需要迫切需要进行及时的调查并检测更多的攻击实例。尽管已经提出了多个系统,但由于以下原因,它们遭受了可伸缩性问题的困扰。首先,恶意检测和区块链数据导入之间的紧密耦合使它们无法反复检测到不同的攻击。其次,粗粒的存档数据使它们无法效率重播交易。第三,恶意合同检测与运行时状态恢复之间的分离会消耗大量存储。 在本文中,我们介绍了以太坊上可扩展的攻击检测框架的设计。它通过将以太坊状态保存到数据库中并提供了一种有效的方法来定位可疑交易来克服可伸缩性问题。保存的状态是细粒度的,以支持对任意交易的重播。该状态的设计经过精心设计,以避免保存不必要的状态以优化存储消耗。我们实施了一个名为Ethscope的原型,并解决了三个技术挑战,即不完整的以太坊状态,可扩展性和可扩展性。绩效评估表明,我们的系统可以解决可伸缩性问题,即对数十亿笔交易进行大规模分析,在重播交易时速度约为2300倍。与现有系统相比,它的存储消耗也较低。带有三种不同类型的信息的结果表明,我们的系统可以帮助分析师了解攻击行为并进一步检测更多攻击。为了吸引社区,我们将发布我们的系统和检测到的攻击数据集。

As one of the representative blockchain platforms, Ethereum has attracted lots of attacks. Due to the existed financial loss, there is a pressing need to perform timely investigation and detect more attack instances. Though multiple systems have been proposed, they suffer from the scalability issue due to the following reasons. First, the tight coupling between malicious contract detection and blockchain data importing makes them infeasible to repeatedly detect different attacks. Second, the coarse-grained archive data makes them inefficient to replay transactions. Third, the separation between malicious contract detection and runtime state recovery consumes lots of storage. In this paper, we present the design of a scalable attack detection framework on Ethereum. It overcomes the scalability issue by saving the Ethereum state into a database and providing an efficient way to locate suspicious transactions. The saved state is fine-grained to support the replay of arbitrary transactions. The state is well-designed to avoid saving unnecessary state to optimize the storage consumption. We implement a prototype named EthScope and solve three technical challenges, i.e., incomplete Ethereum state, scalability, and extensibility. The performance evaluation shows that our system can solve the scalability issue, i.e., efficiently performing a large-scale analysis on billions of transactions, and a speedup of around 2,300x when replaying transactions. It also has lower storage consumption compared with existing systems. The result with three different types of information as inputs shows that our system can help an analyst understand attack behaviors and further detect more attacks. To engage the community, we will release our system and the dataset of detected attacks.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源