Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts

Christof Ferreira Torres, H.L. Jonker, Radu State

Research output: Chapter in Book/Report/Conference proceedingConference Article in proceedingAcademicpeer-review

Abstract

Fixing bugs is easiest by patching source code. However, source code is not always available: only 0.3% of the ∼49M smart contracts that are currently deployed on Ethereum have their source code publicly available. Moreover, since contracts may call functions from other contracts, security flaws in closed-source contracts may affect open-source contracts as well. However, current state-of-the-art approaches that operate on closed-source contracts (i.e., EVM bytecode), such as EVMPatch and SmartShield, make use of purely hard-coded templates that leverage fix patching patterns. As a result, they cannot dynamically adapt to the bytecode that is being patched, which severely limits their flexibility and scalability. For instance, when patching integer overflows using hard-coded templates, a particular patch template needs to be employed as the bounds to be checked are different for each integer size (i.e., one template for uint256, another template for uint64, etc.). In this paper, we propose Elysium, a scalable approach towards automatic smart contract repair at the bytecode level. Elysium combines template-based and semantic-based patching by inferring context information from bytecode. Elysium is currently able to patch 7 different types of vulnerabilities in smart contracts automatically and can easily be extended with new templates and new bug-finding tools. We evaluate its effectiveness and correctness using 3 different datasets by replaying more than 500K transactions on patched contracts. We find that Elysium outperforms existing tools by patching at least 30% more contracts correctly. Finally, we also compare the overhead of Elysium in terms of deployment and transaction cost. In comparison to other tools, we find that generally Elysium minimizes the runtime cost (i.e., transaction cost) up to a factor of 1.7, for only a marginally higher deployment cost, where deployment cost is a one-time cost as compared to the runtime cost.

Original languageEnglish
Title of host publicationRAID '22: Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses
PublisherAssociation for Computing Machinery (ACM)
Pages115-128
Number of pages14
ISBN (Electronic)9781450397049
DOIs
Publication statusPublished - 26 Oct 2022
Event25th International Symposium on Research in Attacks, Intrusions and Defenses - Limassol , Cyprus
Duration: 26 Oct 202228 Oct 2022
Conference number: 25
http://raid2022.cs.ucy.ac.cy

Conference

Conference25th International Symposium on Research in Attacks, Intrusions and Defenses
Abbreviated titleRAID 2022
Country/TerritoryCyprus
City Limassol
Period26/10/2228/10/22
Internet address

Keywords

  • Ethereum
  • bytecode
  • context-aware patching
  • smart contracts

Fingerprint

Dive into the research topics of 'Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal Vulnerable Smart Contracts'. Together they form a unique fingerprint.

Cite this