Skip to content

Published in USENIX Security'24: Understanding and Detecting Insecure OpenZeppelin Code in Smart Contracts

Notifications You must be signed in to change notification settings

VPRLab/ZepScope

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 

Repository files navigation

ZepScope

Using My Functions Should Follow My Checks: Understanding and Detecting Insecure OpenZeppelin Code in Smart Contracts

Structure:

ZepScope - Miner: MINER analyzes the official OpenZeppelin functions to extract the facts of explicit checks (i.e., the checks defined within the functions) and implicit checks (i.e., the conditions of calling the functions)

ZepScope - Checker: CHECKER examines real contracts to identify their OpenZeppelin functions, match their checks with those in the facts, and validate the consequences for those inconsistent checks.

How to Cite this project

@inproceedings{liu2024zepscope,
    author = {Liu, Han and Wu, Daoyuan and Sun, Yuqiang and Wang, Haijun and Li, Kaixuan and Liu, Yang and Chen, Yixiang},
    title = {Using My Functions Should Follow My Checks: Understanding and Detecting Insecure OpenZeppelin Code in Smart Contracts},
    year = {2024},
    publisher = {USENIX Association},
    address = {Philadelphia, PA, USA},
    booktitle = {Proceedings of the 2024 USENIX Security Symposium},
    series = {USENIX Security'24}
}

About

Published in USENIX Security'24: Understanding and Detecting Insecure OpenZeppelin Code in Smart Contracts

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Solidity 56.1%
  • Python 43.9%