28
14

DeFiTail: DeFi Protocol Inspection through Cross-Contract Execution Analysis

Abstract

Decentralized finance (DeFi) protocols are crypto projects developed on the blockchain to manage digital assets. Attacks on DeFi have been frequent and have resulted in losses exceeding \77billion.However,detectionmethodsformaliciousDeFieventsarestilllacking.Inthispaper,weproposeDeFiTail,thefirstframeworkthatutilizesdeeplearningtodetectaccesscontrolandflashloanexploitsthatmayoccuronDeFi.SincetheDeFiprotocoleventsinvolveinvocationswithmultiaccounttransactions,whichrequiresexecutionpathunificationwithdifferentcontracts.Moreover,tomitigatetheimpactofmistakesinControlFlowGraph(CFG)connections,wevalidatethedatapathbyemployingthesymbolicexecutionstack.Furthermore,wefeedthedatapathsthroughourmodeltoachievetheinspectionofDeFiprotocols.ExperimentalresultsindicatethatDeFiTailachievesthehighestaccuracy,with98.39accesscontroland97.43enhancedcapabilitytodetectmaliciouscontracts,identifying86.67fromtheCVEdataset.77 billion. However, detection methods for malicious DeFi events are still lacking. In this paper, we propose DeFiTail, the first framework that utilizes deep learning to detect access control and flash loan exploits that may occur on DeFi. Since the DeFi protocol events involve invocations with multi-account transactions, which requires execution path unification with different contracts. Moreover, to mitigate the impact of mistakes in Control Flow Graph (CFG) connections, we validate the data path by employing the symbolic execution stack. Furthermore, we feed the data paths through our model to achieve the inspection of DeFi protocols. Experimental results indicate that DeFiTail achieves the highest accuracy, with 98.39% in access control and 97.43% in flash loan exploits. DeFiTail also demonstrates an enhanced capability to detect malicious contracts, identifying 86.67% accuracy from the CVE dataset.

View on arXiv
Comments on this paper