teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts

Authors: 

Johannes Krupp and Christian Rossow, CISPA, Saarland University, Saarland Informatics Campus

Abstract: 

Cryptocurrencies like Bitcoin not only provide a decentralized currency, but also provide a programmatic way to process transactions. Ethereum, the second largest cryptocurrency next to Bitcoin, is the first to provide a Turing-complete language to specify transaction processing, thereby enabling so-called smart contracts. This provides an opportune setting for attackers, as security vulnerabilities are tightly intertwined with financial gain. In this paper, we consider the problem of automatic vulnerability identification and exploit generation for smart contracts. We develop a generic definition of vulnerable contracts and use this to build teEther, a tool that allows creating an exploit for a contract given only its binary bytecode. We perform a large-scale analysis of all 38,757 unique Ethereum contracts, 815 out of which our tool finds working exploits for—completely automated.

Open Access Media

USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.

BibTeX
@inproceedings {217464,
author = {Johannes Krupp and Christian Rossow},
title = {{teEther}: Gnawing at Ethereum to Automatically Exploit Smart Contracts},
booktitle = {27th USENIX Security Symposium (USENIX Security 18)},
year = {2018},
isbn = {978-1-939133-04-5},
address = {Baltimore, MD},
pages = {1317--1333},
url = {https://www.usenix.org/conference/usenixsecurity18/presentation/krupp},
publisher = {USENIX Association},
month = aug
}

Presentation Video 

Presentation Audio