Repository logo
  • Log In
    Log in via Symplectic to deposit your publication(s).
Repository logo
  • Communities & Collections
  • Research Outputs
  • Statistics
  • Log In
    Log in via Symplectic to deposit your publication(s).
  1. Home
  2. Faculty of Engineering
  3. Computing
  4. Computing
  5. Securify: practical security analysis of smart contracts
 
  • Details
Securify: practical security analysis of smart contracts
File(s)
1806.01143.pdf (1.71 MB)
Accepted version
Author(s)
Tsankov, Petar
Dan, Andrei
Drachsler-Cohen, Dana
Gervais, Arthur
Bünzli, Florian
more
Type
Conference Paper
Abstract
Permissionless blockchains allow the execution of arbitrary programs (called smart contracts), enabling mutually untrusted entities to interact without relying on trusted third parties. Despite their potential, repeated security concerns have shaken the trust in handling billions of USD by smart contracts. To address this problem, we present Securify, a security analyzer for Ethereum smart contracts that is scalable, fully automated, and able to prove contract behaviors as safe/unsafe with respect to a given property. Securify's analysis consists of two steps. First, it symbolically analyzes the contract's dependency graph to extract precise semantic information from the code. Then, it checks compliance and violation patterns that capture sufficient conditions for proving if a property holds or not. To enable extensibility, all patterns are specified in a designated domain-specific language. Securify is publicly released, it has analyzed >18K contracts submitted by its users, and is regularly used to conduct security audits by experts. We present an extensive evaluation of Securify over real-world Ethereum smart contracts and demonstrate that it can effectively prove the correctness of smart contracts and discover critical violations.
Date Issued
2018-10-15
Date Acceptance
2018-10-01
Citation
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, pp.1-16
URI
http://hdl.handle.net/10044/1/87935
URL
https://dl.acm.org/doi/10.1145/3243734.3243780
DOI
https://www.dx.doi.org/10.1145/3243734.3243780
ISBN
9781450356930
Publisher
ACM
Start Page
1
End Page
16
Journal / Book Title
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
Identifier
https://dl.acm.org/doi/10.1145/3243734.3243780
Source
CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security
Publication Status
Published
Start Date
2018-10-15
Finish Date
2018-10-19
Coverage Spatial
Toronto, Canada
Date Publish Online
2018-10-15
About
Spiral Depositing with Spiral Publishing with Spiral Symplectic
Contact us
Open access team Report an issue
Other Services
Scholarly Communications Library Services
logo

Imperial College London

South Kensington Campus

London SW7 2AZ, UK

tel: +44 (0)20 7589 5111

Accessibility Modern slavery statement Cookie Policy

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback