Skip to main content

Characterizing Erasable Accounts in Ethereum

  • Conference paper
  • First Online:
Information Security (ISC 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12472))

Included in the following conference series:

Abstract

Being the most popular permissionless blockchain that supports smart contracts, Ethereum allows any user to create accounts on it. However, not all accounts matter. For example, the accounts due to attacks can be removed. In this paper, we conduct the first investigation on erasable accounts that can be removed to save system resources and even users’ money (i.e., ETH or gas). In particular, we propose and develop a novel tool named Glaser, which analyzes the State DataBase of Ethereum to discover five kinds of erasable accounts. The experimental results show that Glaser can accurately reveal 508,482 erasable accounts and these accounts lead to users wasting more than 106 million dollars. Glaser can help stop further economic loss caused by these detected accounts. Moreover, Glaser characterizes the attacks/behaviors related to detected erasable accounts through graph analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Empty Accounts and the Ethereum State. https://bit.ly/2YVcL58

  2. Etherscan. https://etherscan.io/

  3. The Yellow Paper: Ethereum’s Formal Specification. http://bit.ly/35Cmkpt

  4. Brent, L., et al.: Vandal: a scalable security analysis framework for smart contracts. arXiv (2018)

    Google Scholar 

  5. Chang, J., Gao, B., Xiao, H., Sun, J., Yang, Z.: sCompile: critical path identification and analysis for smart contracts. arXiv (2018)

    Google Scholar 

  6. Chen, T., et al.: GasChecker: scalable analysis for discovering gas-inefficient smart contracts. IEEE Trans. Emerg. Top. Comput. (2020)

    Google Scholar 

  7. Chen, T., Li, X., Luo, X., Zhang, X.: Under-optimized smart contracts devour your money. In: Proceedings of the SANER (2017)

    Google Scholar 

  8. Chen, T., et al.: An adaptive gas cost mechanism for Ethereum to defend against under-priced DoS attacks. In: Liu, J.K., Samarati, P. (eds.) ISPEC 2017. LNCS, vol. 10701, pp. 3–24. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72359-4_1

    Chapter  Google Scholar 

  9. Chen, T., et al.: Towards saving money in using smart contracts. In: Proceedings of the ICSE (2018)

    Google Scholar 

  10. Chen, T., et al.: Understanding Ethereum via graph analysis. In: Proceedings of the INFOCOM (2018)

    Google Scholar 

  11. Chen, W., Zhang, T., Chen, Z., Zheng, Z., Lu, Y.: Traveling the token world: a graph analysis of Ethereum ERC20 token ecosystem. In: Proceedings of the WWW (2020)

    Google Scholar 

  12. Chess, B., McGraw, G.: Static analysis for security. In: IEEE S&P (2004)

    Google Scholar 

  13. Di Angelo, M., Salzer, G.: Collateral use of deployment code for smart contracts in Ethereum. In: Proceedings of the IFIP NTMS (2019)

    Google Scholar 

  14. Fröwis, M., Böhme, R.: In code we trust? In: Garcia-Alfaro, J., Navarro-Arribas, G., Hartenstein, H., Herrera-Joancomartí, J. (eds.) ESORICS/DPM/CBT -2017. LNCS, vol. 10436, pp. 357–372. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-67816-0_20

    Chapter  Google Scholar 

  15. Kiffer, L., Levin, D., Mislove, A.: Analyzing Ethereum’s contract topology. In: Proceedings of the IMC (2018)

    Google Scholar 

  16. Li, X., Chen, T., Luo, X., Zhang, T., Yu, L., Xu, Z.: STAN: towards describing bytecodes of smart contract. In: Proceedings of the QRS (2020)

    Google Scholar 

  17. Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems. Future Gener. Comput. Syst. 107, 841–853 (2020)

    Article  Google Scholar 

  18. Luu, L., Chu, D.H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: Proceedings of the CCS (2016)

    Google Scholar 

  19. Sergey, I., Kumar, A., Hobor, A.: Temporal properties of smart contracts. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11247, pp. 323–338. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-03427-6_25

    Chapter  Google Scholar 

  20. Wang, S., et al.: ForkBase: an efficient storage engine for blockchain and Forkable applications. In: Proceedings of the VLDB (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiapu Luo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, X., Chen, T., Luo, X., Yu, J. (2020). Characterizing Erasable Accounts in Ethereum. In: Susilo, W., Deng, R.H., Guo, F., Li, Y., Intan, R. (eds) Information Security. ISC 2020. Lecture Notes in Computer Science(), vol 12472. Springer, Cham. https://doi.org/10.1007/978-3-030-62974-8_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-62974-8_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-62973-1

  • Online ISBN: 978-3-030-62974-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics