More about HKUST
Enhancing Smart Contract Security: Empirical Characterization, Fault Analysis, and Vulnerability Detection
PhD Thesis Proposal Defence Title: "Enhancing Smart Contract Security: Empirical Characterization, Fault Analysis, and Vulnerability Detection" by Miss Lu LIU Abstract: The advent of smart contracts on blockchains has fueled the rapid growth of Decentralized Finance (DeFi), an ecosystem managing billions of dollars in assets. Due to the immutability and autonomous execution nature of blockchains, the security and reliability of smart contracts are paramount. The exploitation of a single, subtle vulnerability in a smart contract can lead to catastrophic and irreversible financial losses. However, a significant gap exists in understanding how developers use fundamental language primitives to enforce correctness and the types of logic flaws that arise from their misuse. This thesis aims to enhance smart contract security through comprehensive studies, beginning with an empirical characterization of defensive programming practices, followed by a systematic analysis of associated faults, and then proposing a novel, hybrid vulnerability detection framework. It consists of the following three studies. The first study empirically characterizes state-reverting statements, require, revert, and throw, the principal mechanisms for handling exceptional conditions in Ethereum smart contracts. The study conducts the first large-scale empirical study on their usage across thousands of real-world smart contracts. The analysis reveals that these statements are pervasive, appearing more frequently than general-purpose if statements, and are primarily used to perform seven critical types of authority verification and input validity checks. This study establishes an understanding of the intended purpose and importance of these statements in securing contract logic. The second study investigates the landscape of faults that occur when state-reverting statements are used improperly. The study constructs the first comprehensive dataset of 320 real-world state-reverting faults, curated from open-source project histories and security audit reports. Through manual analysis, the study derives a detailed taxonomy of 17 distinct fault types and distills 12 common fixing strategies. To assess the capabilities of the existing security tools, the study performs a large- scale evaluation of 12 state-of-the-art security analysis tools on a benchmark of these faults. The results reveal that existing tools achieve an average detection rate of only 14.4%, proving their inability to effectively identify these subtle yet critical logic flaws. The third study focuses on the automated detection of smart contract vulnerabilities. The study proposes a hybrid framework for identifying price manipulation vulnerabilities in DeFi. Focusing on financially devastating price manipulation attacks, the study combines static taint analysis for identifying potentially vulnerable code paths, a two-stage Large Language Model (LLM) pipeline for deep semantic reasoning about economic logic and defensive measures, and a final static analysis checker to validate findings and mitigate LLM hallucinations. Evaluated on a comprehensive benchmark of 73 real-world vulnerable DeFi protocols and 288 benign ones, the proposed framework achieves 88% precision and 90% recall, significantly outperforming existing static analysis and LLM-based approaches. Date: Monday, 29 September 2025 Time: 4:00pm - 6:00pm Venue: Room 3598 Lifts 27/28 Committee Members: Prof. Shing-Chi Cheung (Supervisor) Dr. Yepang Liu (Co-supervisor, SUSTech) Prof. Raymond Wong (Chairperson) Dr. Shuai Wang