How effective can we detect software vulnerabilities using code clones? - A Case Study on Ethereum Smart Contracts
dc.contributor.advisor | Jiang, ZhenMing | |
dc.contributor.author | Ma, Yinghang | |
dc.date.accessioned | 2023-12-08T14:36:22Z | |
dc.date.available | 2023-12-08T14:36:22Z | |
dc.date.issued | 2023-12-08 | |
dc.date.updated | 2023-12-08T14:36:21Z | |
dc.degree.discipline | Electrical and Computer Engineering | |
dc.degree.level | Master's | |
dc.degree.name | MASc - Master of Applied Science | |
dc.description.abstract | Smart contracts are self-executing programs that are deployed on blockchain platforms to provide services and handle transactions. Solidity contracts exhibit different code characteristics compared to software projects written in conventional programming languages and have a much higher level of code-to-clone ratio. These differences can impose a wider spread of security risks, and cloned code snippets may suffer from the same security problems as their cloned counterpart. In this thesis, we have conducted an empirical study on the effectiveness of leveraging code detection techniques to identify software vulnerabilities in the Solidity contract code. We have experimented with a set of configuration tuning approaches while keeping everything else constant. After carefully tuning these configurations, the tools tuned under the context-specific tuning approaches can achieve significant improvement while detecting vulnerabilities. This thesis highlighted the need for further research into context-specific clone detection and management and motivating studies in the domain of blockchain-based applications. | |
dc.identifier.uri | https://hdl.handle.net/10315/41695 | |
dc.language | en | |
dc.rights | Author owns copyright, except where explicitly noted. Please contact the author directly with licensing requests. | |
dc.subject | Computer engineering | |
dc.subject | Computer science | |
dc.subject.keywords | Genetic algorithm | |
dc.subject.keywords | Clone detection | |
dc.subject.keywords | Vulnerability detection | |
dc.subject.keywords | Ethereum | |
dc.subject.keywords | Solidity | |
dc.subject.keywords | Smart contract | |
dc.subject.keywords | Common vulnerabilities and exposures | |
dc.title | How effective can we detect software vulnerabilities using code clones? - A Case Study on Ethereum Smart Contracts | |
dc.type | Electronic Thesis or Dissertation |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Ma_Yinghang_2023_Master.pdf
- Size:
- 3.58 MB
- Format:
- Adobe Portable Document Format