ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2504.05968
126
0
v1v2v3 (latest)

Security Vulnerabilities in Ethereum Smart Contracts: A Systematic Analysis

8 April 2025
Jixuan Wu
Lei Xie
Xiaoqi Li
ArXiv (abs)PDFHTML
Abstract

Smart contracts are a secure and trustworthy application that plays a vital role in decentralized applications in various fields such as insurance,the internet, and gaming. However, in recent years, smart contract security breaches have occurred frequently, and due to their financial properties, they have caused huge economic losses, such as the most famous security incident "The DAO" which caused a loss of over 60millioninEthereum.Thishasdrawnalotofattentionfromallsides.WritingasecuresmartcontractisnowacriticalthishttpURLpaperfocusesonEthersmartcontractsandexplainsthemaincomponentsofEther,smartcontractarchitectureandthishttpURLenvironmentusedinthispaperistheEthernetenvironment,usingremixonlinecompilationplatformandSoliditylanguage,accordingtothefoursecurityeventsofAmericanChain,TheDAO,ParityandKotET,theprinciplesofintegeroverflowattack,reentrantattack,accesscontrolattackanddenialofserviceattackarestudiedandanalyzedaccordingly,andthescenariosofthesevulnerabilitiesarereproduced,andthemeasurestopreventthemaregiven.Finally,preventivemeasuresaregiven.Inaddition,theprinciplesofshortaddressattack,earlytransactionattackandprivilegedfunctionexposureattackarealsointroducedindetail,andsecuritymeasuresarethishttpURLvulnerabilitiescontinuetoemerge,theirclassificationwillalsoevolve.Theanalysisandresearchofthecurrentvulnerabilitiesarealsotolayasolidfoundationforavoidingmorevulnerabilities.60 million in Ethereum. This has drawn a lot of attention from all sides. Writing a secure smart contract is now a critical this http URL paper focuses on Ether smart contracts and explains the main components of Ether, smart contract architecture and this http URL environment used in this paper is the Ethernet environment, using remix online compilation platform and Solidity language, according to the four security events of American Chain, The DAO, Parity and KotET, the principles of integer overflow attack, reentrant attack, access control attack and denial of service attack are studied and analyzed accordingly, and the scenarios of these vulnerabilities are reproduced, and the measures to prevent them are given. Finally, preventive measures are given. In addition, the principles of short address attack, early transaction attack and privileged function exposure attack are also introduced in detail, and security measures are this http URL vulnerabilities continue to emerge, their classification will also evolve. The analysis and research of the current vulnerabilities are also to lay a solid foundation for avoiding more vulnerabilities.60millioninEthereum.Thishasdrawnalotofattentionfromallsides.WritingasecuresmartcontractisnowacriticalthishttpURLpaperfocusesonEthersmartcontractsandexplainsthemaincomponentsofEther,smartcontractarchitectureandthishttpURLenvironmentusedinthispaperistheEthernetenvironment,usingremixonlinecompilationplatformandSoliditylanguage,accordingtothefoursecurityeventsofAmericanChain,TheDAO,ParityandKotET,theprinciplesofintegeroverflowattack,reentrantattack,accesscontrolattackanddenialofserviceattackarestudiedandanalyzedaccordingly,andthescenariosofthesevulnerabilitiesarereproduced,andthemeasurestopreventthemaregiven.Finally,preventivemeasuresaregiven.Inaddition,theprinciplesofshortaddressattack,earlytransactionattackandprivilegedfunctionexposureattackarealsointroducedindetail,andsecuritymeasuresarethishttpURLvulnerabilitiescontinuetoemerge,theirclassificationwillalsoevolve.Theanalysisandresearchofthecurrentvulnerabilitiesarealsotolayasolidfoundationforavoidingmorevulnerabilities.

View on arXiv
@article{wu2025_2504.05968,
  title={ Security Vulnerabilities in Ethereum Smart Contracts: A Systematic Analysis },
  author={ Jixuan Wu and Lei Xie and Xiaoqi Li },
  journal={arXiv preprint arXiv:2504.05968},
  year={ 2025 }
}
Comments on this paper