Chaofan Shou, Yuanyu Ke, Yupeng Yang, Qi Su, Or Dadosh, Assaf Eli, David Benchimol, Doudou Lu, Daniel Tong, Dex Chen, Zoey Tan, Jacob Chia, Koushik Sen, Wenke Lee
{"title":"BACKRUNNER: Mitigating Smart Contract Attacks in the Real World","authors":"Chaofan Shou, Yuanyu Ke, Yupeng Yang, Qi Su, Or Dadosh, Assaf Eli, David Benchimol, Doudou Lu, Daniel Tong, Dex Chen, Zoey Tan, Jacob Chia, Koushik Sen, Wenke Lee","doi":"arxiv-2409.06213","DOIUrl":null,"url":null,"abstract":"Billions of dollars have been lost due to vulnerabilities in smart contracts.\nTo counteract this, researchers have proposed attack frontrunning protections\ndesigned to preempt malicious transactions by inserting \"whitehat\" transactions\nahead of them to protect the assets. In this paper, we demonstrate that\nexisting frontrunning protections have become ineffective in real-world\nscenarios. Specifically, we collected 158 recent real-world attack transactions\nand discovered that 141 of them can bypass state-of-the-art frontrunning\nprotections. We systematically analyze these attacks and show how inherent\nlimitations of existing frontrunning techniques hinder them from protecting\nvaluable assets in the real world. We then propose a new approach involving 1)\npreemptive hijack, and 2) attack backrunning, which circumvent the existing\nlimitations and can help protect assets before and after an attack. Our\napproach adapts the exploit used in the attack to the same or similar contracts\nbefore and after the attack to safeguard the assets. We conceptualize adapting\nexploits as a program repair problem and apply established techniques to\nimplement our approach into a full-fledged framework, BACKRUNNER. Running on\nprevious attacks in 2023, BACKRUNNER can successfully rescue more than \\$410M.\nIn the real world, it has helped rescue over \\$11.2M worth of assets in 28\nseparate incidents within two months.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"17 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Cryptography and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.06213","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Billions of dollars have been lost due to vulnerabilities in smart contracts.
To counteract this, researchers have proposed attack frontrunning protections
designed to preempt malicious transactions by inserting "whitehat" transactions
ahead of them to protect the assets. In this paper, we demonstrate that
existing frontrunning protections have become ineffective in real-world
scenarios. Specifically, we collected 158 recent real-world attack transactions
and discovered that 141 of them can bypass state-of-the-art frontrunning
protections. We systematically analyze these attacks and show how inherent
limitations of existing frontrunning techniques hinder them from protecting
valuable assets in the real world. We then propose a new approach involving 1)
preemptive hijack, and 2) attack backrunning, which circumvent the existing
limitations and can help protect assets before and after an attack. Our
approach adapts the exploit used in the attack to the same or similar contracts
before and after the attack to safeguard the assets. We conceptualize adapting
exploits as a program repair problem and apply established techniques to
implement our approach into a full-fledged framework, BACKRUNNER. Running on
previous attacks in 2023, BACKRUNNER can successfully rescue more than \$410M.
In the real world, it has helped rescue over \$11.2M worth of assets in 28
separate incidents within two months.