Evaluating Current Techniques for Detecting Vulnerabilities in Ethereum Smart Contracts

Authors

  • Sai Sirisha Maddula Front End Developer, Delta Airlines, Atlanta, Georgia, USA

DOI:

https://doi.org/10.18034/ei.v11i1.717

Keywords:

Ethereum, Smart contracts, Vulnerability Detection, Security Analysis, Blockchain Technology, Code Auditing, Solidity programming, Risk assessment

Abstract

Ethereum intelligent contract security must be guaranteed since these decentralized apps oversee large-scale financial transactions independently. To strengthen the dependability and credibility of Ethereum smart contracts, this paper assesses existing methods for finding weaknesses in them. The primary goals are to evaluate how well hybrid approaches, formal verification, dynamic analysis, and static analysis find vulnerabilities. Methodologically, a thorough assessment of available resources and instruments was carried out to evaluate the advantages and disadvantages of each approach. Important discoveries show that although static analysis covers a large area, it ignores runtime-specific problems and produces false positives. While highly effective in finding runtime vulnerabilities, dynamic analysis is resource-intensive. High assurance is provided by formal verification, although it is complex and resource-intensive. Hybrid approaches combine several approaches to provide a well-rounded strategy but must be used carefully. The policy implications emphasize that to limit risks effectively, it is crucial to embrace multifaceted security techniques, set explicit norms, and promote easily accessible verification tools. This research advances our knowledge of smart contract security and guides policymakers and developers on securing blockchain applications.

Downloads

Download data is not yet available.

References

Addimulam, S., Mohammed, M. A., Karanam, R. K., Ying, D., Pydipalli, R., Patel, B., Shajahan, M. A., Dhameliya, N., & Natakam, V. M. (2020). Deep Learning-Enhanced Image Segmentation for Medical Diagnostics. Malaysian Journal of Medical and Biological Research, 7(2), 145-152. https://mjmbr.my/index.php/mjmbr/article/view/687

Ahmmed. S., Sachani, D. K., Natakam, V. M., Karanam, R. K. (2021). Stock Market Fluctuations and Their Immediate Impact on GDP. Journal of Fareast International University, 4(1), 1-6. https://www.academia.edu/121248146

Anumandla, S. K. R. (2018). AI-enabled Decision Support Systems and Reciprocal Symmetry: Empowering Managers for Better Business Outcomes. International Journal of Reciprocal Symmetry and Theoretical Physics, 5, 33-41. https://upright.pub/index.php/ijrstp/article/view/129

Colbaugh, R., Glass, K. (2012). Anticipating Complex Network Vulnerabilities Through Abstraction-based Analysis. Security Informatics, 1(1), 1-11. https://doi.org/10.1186/2190-8532-1-9 DOI: https://doi.org/10.1186/2190-8532-1-9

Dhameliya, N. (2022). Power Electronics Innovations: Improving Efficiency and Sustainability in Energy Systems. Asia Pacific Journal of Energy and Environment, 9(2), 71-80. https://doi.org/10.18034/apjee.v9i2.752 DOI: https://doi.org/10.18034/apjee.v9i2.752

Dhameliya, N., Mullangi, K., Shajahan, M. A., Sandu, A. K., & Khair, M. A. (2020). Blockchain-Integrated HR Analytics for Improved Employee Management. ABC Journal of Advanced Research, 9(2), 127-140. https://doi.org/10.18034/abcjar.v9i2.738 DOI: https://doi.org/10.18034/abcjar.v9i2.738

Dhameliya, N., Sai Sirisha Maddula, Kishore Mullangi, & Bhavik Patel. (2021). Neural Networks for Autonomous Drone Navigation in Urban Environments. Technology & Management Review, 6, 20-35. https://upright.pub/index.php/tmr/article/view/141

Fang, Z., Liu, Q., Zhang, Y., Wang, K., Wang, Z. (2017). A Static Technique for Detecting Input Validation Vulnerabilities in Android Apps. Science China. Information Sciences, 60(5), 052111. https://doi.org/10.1007/s11432-015-5422-7 DOI: https://doi.org/10.1007/s11432-015-5422-7

Kaulartz, M., Heckmann, J. (2016). Smart Contracts - Anwendungen der Blockchain-Technologie. Computer und Recht, 32(9), 618-624. https://doi.org/10.9785/cr-2016-0923 DOI: https://doi.org/10.9785/cr-2016-0923

Koehler, S., Dhameliya, N., Patel, B., & Anumandla, S. K. R. (2018). AI-Enhanced Cryptocurrency Trading Algorithm for Optimal Investment Strategies. Asian Accounting and Auditing Advancement, 9(1), 101–114. https://4ajournal.com/article/view/91

Maddula, S. S. (2018). The Impact of AI and Reciprocal Symmetry on Organizational Culture and Leadership in the Digital Economy. Engineering International, 6(2), 201–210. https://doi.org/10.18034/ei.v6i2.703 DOI: https://doi.org/10.18034/ei.v6i2.703

Maddula, S. S., Shajahan, M. A., & Sandu, A. K. (2019). From Data to Insights: Leveraging AI and Reciprocal Symmetry for Business Intelligence. Asian Journal of Applied Science and Engineering, 8(1), 73–84. https://doi.org/10.18034/ajase.v8i1.86 DOI: https://doi.org/10.18034/ajase.v8i1.86

Mohammed, M. A., Kothapalli, K. R. V., Mohammed, R., Pasam, P., Sachani, D. K., & Richardson, N. (2017). Machine Learning-Based Real-Time Fraud Detection in Financial Transactions. Asian Accounting and Auditing Advancement, 8(1), 67–76. https://4ajournal.com/article/view/93

Mouzarani, M., Sadeghiyan, B., Zolfaghari, M. (2016). A Smart Fuzzing Method for Detecting Heap-based Vulnerabilities in Executable Codes. Security and Communication Networks, 9(18), 5098-5115. https://doi.org/10.1002/sec.1681 DOI: https://doi.org/10.1002/sec.1681

Mullangi, K. (2017). Enhancing Financial Performance through AI-driven Predictive Analytics and Reciprocal Symmetry. Asian Accounting and Auditing Advancement, 8(1), 57–66. https://4ajournal.com/article/view/89

Mullangi, K., Maddula, S. S., Shajahan, M. A., & Sandu, A. K. (2018). Artificial Intelligence, Reciprocal Symmetry, and Customer Relationship Management: A Paradigm Shift in Business. Asian Business Review, 8(3), 183–190. https://doi.org/10.18034/abr.v8i3.704 DOI: https://doi.org/10.18034/abr.v8i3.704

Mullangi, K., Yarlagadda, V. K., Dhameliya, N., & Rodriguez, M. (2018). Integrating AI and Reciprocal Symmetry in Financial Management: A Pathway to Enhanced Decision-Making. International Journal of Reciprocal Symmetry and Theoretical Physics, 5, 42-52. https://upright.pub/index.php/ijrstp/article/view/134

Nizamuddin, M., Natakam, V. M., Sachani, D. K., Vennapusa, S. C. R., Addimulam, S., & Mullangi, K. (2019). The Paradox of Retail Automation: How Self-Checkout Convenience Contrasts with Loyalty to Human Cashiers. Asian Journal of Humanity, Art and Literature, 6(2), 219-232. https://doi.org/10.18034/ajhal.v6i2.751 DOI: https://doi.org/10.18034/ajhal.v6i2.751

Patel, B., Mullangi, K., Roberts, C., Dhameliya, N., & Maddula, S. S. (2019). Blockchain-Based Auditing Platform for Transparent Financial Transactions. Asian Accounting and Auditing Advancement, 10(1), 65–80. https://4ajournal.com/article/view/92

Patel, B., Yarlagadda, V. K., Dhameliya, N., Mullangi, K., & Vennapusa, S. C. R. (2022). Advancements in 5G Technology: Enhancing Connectivity and Performance in Communication Engineering. Engineering International, 10(2), 117–130. https://doi.org/10.18034/ei.v10i2.715 DOI: https://doi.org/10.18034/ei.v10i2.715

Puchkov, F. M., Shapchenko, K. A. (2005). Static Analysis Method for Detecting Buffer Overflow Vulnerabilities. Programming and Computer Software, 31(4), 179-189. https://doi.org/10.1007/s11086-005-0030-8 DOI: https://doi.org/10.1007/s11086-005-0030-8

Pydipalli, R., Anumandla, S. K. R., Dhameliya, N., Thompson, C. R., Patel, B., Vennapusa, S. C. R., Sandu, A. K., & Shajahan, M. A. (2022). Reciprocal Symmetry and the Unified Theory of Elementary Particles: Bridging Quantum Mechanics and Relativity. International Journal of Reciprocal Symmetry and Theoretical Physics, 9, 1-9. https://upright.pub/index.php/ijrstp/article/view/138

Rodriguez, M., Shajahan, M. A., Sandu, A. K., Maddula, S. S., & Mullangi, K. (2021). Emergence of Reciprocal Symmetry in String Theory: Towards a Unified Framework of Fundamental Forces. International Journal of Reciprocal Symmetry and Theoretical Physics, 8, 33-40. https://upright.pub/index.php/ijrstp/article/view/136

Sachani, D. K., & Vennapusa, S. C. R. (2017). Destination Marketing Strategies: Promoting Southeast Asia as a Premier Tourism Hub. ABC Journal of Advanced Research, 6(2), 127-138. https://doi.org/10.18034/abcjar.v6i2.746 DOI: https://doi.org/10.18034/abcjar.v6i2.746

Sengupta, A., Mazumdar, C., Bagchi, A. (2011). A Formal Methodology for Detecting Managerial Vulnerabilities and Threats in an Enterprise Information System. Journal of Network and Systems Management, 19(3), 319-342. https://doi.org/10.1007/s10922-010-9180-y DOI: https://doi.org/10.1007/s10922-010-9180-y

Shajahan, M. A. (2021). Next-Generation Automotive Electronics: Advancements in Electric Vehicle Powertrain Control. Digitalization & Sustainability Review, 1(1), 71-88. https://upright.pub/index.php/dsr/article/view/135

Shajahan, M. A. (2022). Bioprocess Automation with Robotics: Streamlining Microbiology for Biotech Industry. Asia Pacific Journal of Energy and Environment, 9(2), 61-70. https://doi.org/10.18034/apjee.v9i2.748 DOI: https://doi.org/10.18034/apjee.v9i2.748

Shajahan, M. A., Richardson, N., Dhameliya, N., Patel, B., Anumandla, S. K. R., & Yarlagadda, V. K. (2019). AUTOSAR Classic vs. AUTOSAR Adaptive: A Comparative Analysis in Stack Development. Engineering International, 7(2), 161–178. https://doi.org/10.18034/ei.v7i2.711 DOI: https://doi.org/10.18034/ei.v7i2.711

Sharma, S., Mahajan, S. (2017). Design and Implementation of a Security Scheme for Detecting System Vulnerabilities. International Journal of Computer Network and Information Security, 9(10), 24. https://doi.org/10.5815/ijcnis.2017.10.03 DOI: https://doi.org/10.5815/ijcnis.2017.10.03

Tsantarliotis, P., Pitoura, E., Tsaparas, P. (2017). Defining and Predicting Troll Vulnerability in Online Social Media. Social Network Analysis and Mining, 7(1), 26. https://doi.org/10.1007/s13278-017-0445-2 DOI: https://doi.org/10.1007/s13278-017-0445-2

Vennapusa, S. C. R., Fadziso, T., Sachani, D. K., Yarlagadda, V. K., & Anumandla, S. K. R. (2018). Cryptocurrency-Based Loyalty Programs for Enhanced Customer Engagement. Technology & Management Review, 3, 46-62. https://upright.pub/index.php/tmr/article/view/137

Yarlagadda, V. K., & Pydipalli, R. (2018). Secure Programming with SAS: Mitigating Risks and Protecting Data Integrity. Engineering International, 6(2), 211–222. https://doi.org/10.18034/ei.v6i2.709 DOI: https://doi.org/10.18034/ei.v6i2.709

Yarlagadda, V. K., Maddula, S. S., Sachani, D. K., Mullangi, K., Anumandla, S. K. R., & Patel, B. (2020). Unlocking Business Insights with XBRL: Leveraging Digital Tools for Financial Transparency and Efficiency. Asian Accounting and Auditing Advancement, 11(1), 101–116. https://4ajournal.com/article/view/94

Ying, D., & Addimulam, S. (2022). Innovative Additives for Rubber: Improving Performance and Reducing Carbon Footprint. Asia Pacific Journal of Energy and Environment, 9(2), 81-88. https://doi.org/10.18034/apjee.v9i2.753 DOI: https://doi.org/10.18034/apjee.v9i2.753

Ying, D., Patel, B., & Dhameliya, N. (2017). Managing Digital Transformation: The Role of Artificial Intelligence and Reciprocal Symmetry in Business. ABC Research Alert, 5(3), 67–77. https://doi.org/10.18034/ra.v5i3.659 DOI: https://doi.org/10.18034/ra.v5i3.659

Downloads

Published

2023-04-02

Issue

Section

Peer Reviewed Articles

How to Cite

Maddula, S. S. (2023). Evaluating Current Techniques for Detecting Vulnerabilities in Ethereum Smart Contracts. Engineering International, 11(1), 59-72. https://doi.org/10.18034/ei.v11i1.717

Similar Articles

1-10 of 93

You may also start an advanced similarity search for this article.