Source Code Obfuscation for Smart Contracts

State-of-the-art work of evaluating smart contract static analysis tools faces a major problem: most test cases (i.e., labeled buggy contracts) are too simple and lack complexity, which makes the evaluation unable to show the real performance of the analysis tools when complex contracts are analyzed...

Full description

Saved in:
Bibliographic Details
Published in2020 27th Asia-Pacific Software Engineering Conference (APSEC) pp. 513 - 514
Main Authors Zhang, Meng, Zhang, Pengcheng, Luo, Xiapu, Xiao, Feng
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2020
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:State-of-the-art work of evaluating smart contract static analysis tools faces a major problem: most test cases (i.e., labeled buggy contracts) are too simple and lack complexity, which makes the evaluation unable to show the real performance of the analysis tools when complex contracts are analyzed. To fill the gap, we propose a novel source code obfuscation approach for Ethereum smart contracts. We use the buggy contracts in the public dataset 1 1 https://github.com/smartbugs/smartbugs/tree/master/dataset to evaluate our approach. The evaluation result shows that our approach can effectively increase the complexity of a contract. Besides, we use obfuscated contracts to evaluate the static analysis tools. The evaluation result shows that the performance of most smart contract static analysis tools decreases in different degree when the original contracts are obfuscated.
ISSN:2640-0715
DOI:10.1109/APSEC51365.2020.00069