skip to main content
10.1145/3597503.3623318acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG)

Published:06 February 2024Publication History

ABSTRACT

Ponzi schemes, a form of scam, have been discovered in Ethereum smart contracts in recent years, causing massive financial losses. Rule-based detection approaches rely on pre-defined rules with limited capabilities and domain knowledge dependency. Additionally, using static information like opcodes and transactions for machine learning models fails to effectively characterize the Ponzi contracts, resulting in poor reliability and interpretability.

In this paper, we propose PonziGuard, an efficient Ponzi scheme detection approach based on contract runtime behavior. Inspired by the observation that a contract's runtime behavior is more effective in disguising Ponzi contracts from the innocent contracts, PonziGuard establishes a comprehensive graph representation called contract runtime behavior graph (CRBG), to accurately depict the behavior of Ponzi contracts. Furthermore, it formulates the detection process as a graph classification task, enhancing its overall effectiveness. We conducted comparative experiments on a ground-truth dataset and applied PonziGuard to Ethereum Mainnet. The results show that PonziGuard outperforms the current state-of-the-art approaches and is also effective in open environments. Using PonziGuard, we have identified 805 Ponzi contracts on Ethereum Mainnet, which have resulted in an estimated economic loss of 281,700 Ether or approximately $500 million USD.

References

  1. Alchemy. 2022. ethereum-statistics. Retrieved November 17, 2022 from https://www.alchemy.com/overviews/ethereum-statisticsGoogle ScholarGoogle Scholar
  2. Marc Artzrouni. 2009. The mathematics of Ponzi schemes. Mathematical Social Sciences 58 (2009).Google ScholarGoogle Scholar
  3. Massimo Bartoletti, Salvatore Carta, Tiziana Cimoli, and Roberto Saia. 2020. Dissecting Ponzi schemes on Ethereum: Identification, analysis, and impact. Future Generation Computer Systems 102 (2020).Google ScholarGoogle Scholar
  4. Giorgos Bouritsas, Fabrizio Frasca, Stefanos Zafeiriou, and Michael M Bronstein. 2022. Improving graph neural network expressivity via subgraph isomorphism counting. IEEE Transactions on Pattern Analysis and Machine Intelligence 45 (2022).Google ScholarGoogle Scholar
  5. Chainalysis. 2022. The Chainalysis 2022 Crypto Crime Report. Retrieved March 20, 2023 from https://go.chainalysis.com/2022-Crypto-Crime-Report.htmlGoogle ScholarGoogle Scholar
  6. Weimin Chen, Xinran Li, Yuting Sui, Ningyu He, Haoyu Wang, Lei Wu, and Xiapu Luo. 2021. SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts. In Proceedings of International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS).Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Weili Chen, Zibin Zheng, Jiahui Cui, Edith C. H. Ngai, Peilin Zheng, and Yuren Zhou. 2018. Detecting Ponzi Schemes on Ethereum: Towards Healthier Blockchain Technology. In Proceedings of International World Wide Web Conferences (WWW).Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. ConsenSys. 2023. Mythril. Retrieved April 22, 2023 from https://github.com/ConsenSys/mythril/Google ScholarGoogle Scholar
  9. Dimitris Drakopoulos. 2021. Crypto Boom Poses New Challenges to Financial Stability. Retrieved July 3, 2023 from https://www.imf.org/en/Blogs/Articles/2021/10/01/blog-gfsr-ch2-crypto-boom-poses-new-challenges-to-financial-stabilityGoogle ScholarGoogle Scholar
  10. ethereum. 2023. solc-bin. Retrieved September 19, 2022 from https://github.com/ethereum/solc-binGoogle ScholarGoogle Scholar
  11. ethereum foundation. 2023. Official Go implementation of the Ethereum protocol. Retrieved October 20, 2022 from https://geth.ethereum.org/Google ScholarGoogle Scholar
  12. Etherscan. 2023. Etherscan.io. Retrieved March 20, 2023 from https://etherscan.io/Google ScholarGoogle Scholar
  13. Shuhui Fan, Shaojing Fu, Haoran Xu, and Xiaochun Cheng. 2021. Al-SPSD: Anti-leakage smart Ponzi schemes detection in blockchain. Information Processing and Management 58 (2021).Google ScholarGoogle Scholar
  14. Shuhui Fan, Shaojing Fu, Haoran Xu, and Chengzhang Zhu. 2020. Expose Your Mask: Smart Ponzi Schemes Detection on Blockchain. In Proceedings of IEEE International Joint Conference on Neural Networks (IJCNN).Google ScholarGoogle ScholarCross RefCross Ref
  15. Shuhui Fan, Haoran Xu, Shaojing Fu, and Ming Xu. 2020. Smart Ponzi Scheme Detection using Federated Learning. In Proceedings of IEEE International Conference on High Performance Computing and Communications (HPCC).Google ScholarGoogle ScholarCross RefCross Ref
  16. Josselin Feist, Gustavo Grieco, and Alex Groce. 2019. Slither: a static analysis framework for smart contracts. In IEEE/ACM International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB).Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Justin E. Forrester and Barton P. Miller. 2000. An Empirical Study of the Robustness of Windows NT Applications Using Random Testing. In Proceedings of the 4th Conference on USENIX Windows Systems Symposium - Volume 4.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Jingxuan He, Mislav Balunovic, Nodar Ambroladze, Petar Tsankov, and Martin T. Vechev. 2019. Learning to Fuzz from Symbolic Execution with Application to Smart Contracts. In Proceedings of Conference on Computer and Communications Security (CCS).Google ScholarGoogle Scholar
  19. Sergei Ivanov and Liudmila Prokhorenkova. 2021. Boost then Convolve: Gradient Boosting Meets Graph Neural Networks. In International Conference on Learning Representations (ICLR).Google ScholarGoogle Scholar
  20. Bo Jiang, Ye Liu, and W. K. Chan. 2018. ContractFuzzer: fuzzing smart contracts for vulnerability detection. In Proceedings of International Conference on Automated Software Engineering (ASE).Google ScholarGoogle Scholar
  21. Eunjin Jung, Marion Le Tilly, Ashish Gehani, and Yunjie Ge. 2019. Data Mining-Based Ethereum Fraud Detection. In Proceedings of IEEE International Conference on Blockchain (Blockchain).Google ScholarGoogle ScholarCross RefCross Ref
  22. Kenun99. 2022. SadPonzi. Retrieved October 25, 2022 from https://github.com/Kenun99/SADPonziGoogle ScholarGoogle Scholar
  23. Quoc Le and Tomas Mikolov. 2014. Distributed representations of sentences and documents. In International conference on machine learning.Google ScholarGoogle Scholar
  24. Richard Lehman. 2021. Ponzi schemes dropped in 2020. Retrieved July 3, 2023 from https://www.ponzitracker.com/home/ponzi-schemes-dropped-in-2020-but-this-may-not-be-a-silver-liningGoogle ScholarGoogle Scholar
  25. Yincheng Lou, Yanmei Zhang, and Shiping Chen. 2020. Ponzi Contracts Detection Based on Improved Convolutional Neural Network. In Proceedings of International Conference on Services Computing (SCC).Google ScholarGoogle ScholarCross RefCross Ref
  26. Tai D. Nguyen, Long H. Pham, Jun Sun, Yun Lin, and Quang Tran Minh. 2020. sFuzz: an efficient adaptive fuzzer for solidity smart contracts. In Proceedings of International Conference on Software Engineering (ICSE).Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. polarwolf. 2021. Ponzi scheme contracts on Ethereum. Retrieved January 10, 2023 from https://www.kaggle.com/datasets/polarwolf/ponzi-scheme-contracts-on-ethereum?resource=downloadGoogle ScholarGoogle Scholar
  28. Remix Project. 2023. Remix. Retrieved June 12, 2023 from https://remix-project.org/Google ScholarGoogle Scholar
  29. pytorch. 2023. Pytorch. Retrieved June 12, 2023 from https://pytorch.org/Google ScholarGoogle Scholar
  30. Michael Rodler, Wenting Li, Ghassan O. Karame, and Lucas Davi. 2019. Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks. In Proceedings of Network and Distributed System Security Symposium (NDSS).Google ScholarGoogle ScholarCross RefCross Ref
  31. Nivesh Rustgi. 2020. Ethereum's Top Gas Guzzlers are Ponzi Schemes. Retrieved March 26, 2023 from https://cryptobriefing.com/ethereums-top-gas-guzzlers-ponzi-schemes/Google ScholarGoogle Scholar
  32. Clara Schneidewind, Ilya Grishchenko, Markus Scherer, and Matteo Maffei. 2020. ethor: Practical and provably sound static analysis of ethereum smart contracts. In Proceedings of ACM SIGSAC Conference on Computer and Communications Security (SIGSAC).Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Edward J. Schwartz, Thanassis Avgerinos, and David Brumley. 2010. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask). In Proceedings of IEEE Symposium on Security and Privacy (S&P).Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. U.S. SEC. 2019. U.S. Securities and Exchange Commission (SEC) Website. Retrieved February 7, 2023 from https://www.sec.gov/spotlight/enf-actions-ponzi.shtmlGoogle ScholarGoogle Scholar
  35. Weisong Sun, Guangyao Xu, Zijiang Yang, and Zhenyu Chen. 2020. Early Detection of Smart Ponzi Scheme Contracts Based on Behavior Forest Similarity. In Proceedings of International Conference on Software Quality, Reliability and Security (QRS).Google ScholarGoogle ScholarCross RefCross Ref
  36. Nick Szabo. 1994. Smart Contracts: Building Blocks for Digital Markets.Google ScholarGoogle Scholar
  37. Shantanu Thakoor, Corentin Tallec, Mohammad Gheshlaghi Azar, Mehdi Azabou, Eva L. Dyer, Rémi Munos, Petar Velickovic, and Michal Valko. 2022. Large-Scale Representation Learning on Graphs via Bootstrapping. In The Tenth International Conference on Learning Representations (ICLR).Google ScholarGoogle Scholar
  38. Christof Ferreira Torres, Antonio Ken Iannillo, Arthur Gervais, and Radu State. 2021. ConFuzzius: A Data Dependency-Aware Hybrid Fuzzer for Smart Contracts. In Proceedings of European Symposium on Security and Privacy (EuroS&P).Google ScholarGoogle ScholarCross RefCross Ref
  39. Christof Ferreira Torres, Julian Schütte, and Radu State. 2018. Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts. In Proceedings of Annual Computer Security Applications Conference (ACSAC).Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Lanning Wei, Huan Zhao, Zhiqiang He, and Quanming Yao. 2023. Neural Architecture Search for GNN-Based Graph Classification. ACM Trans. Inf. Syst. (2023).Google ScholarGoogle Scholar
  41. Gavin Wood. 2022. Ethereum: A secure decentralised generalised transaction ledger Berlin version. Retrieved January 26, 2023 from https://ethereum.github.io/yellowpaper/paper.pdfGoogle ScholarGoogle Scholar
  42. Zonghan Wu, Shirui Pan, Fengwen Chen, Guodong Long, Chengqi Zhang, and S Yu Philip. 2020. A comprehensive survey on graph neural networks. IEEE transactions on neural networks and learning systems 32 (2020).Google ScholarGoogle ScholarCross RefCross Ref
  43. Valentin Wüstholz and Maria Christakis. 2020. Harvey: a greybox fuzzer for smart contracts. In Proceedings of ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE).Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Jiaxuan You, Rex Ying, and Jure Leskovec. 2019. Position-aware graph neural networks. In International conference on machine learning (ICML). 7134--7143.Google ScholarGoogle Scholar
  45. Shanqing Yu, Jie Jin, Yunyi Xie, Jie Shen, and Qi Xuan. 2021. Ponzi Scheme Detection in Ethereum Transaction Network. In Blockchain and Trustworthy Systems (BlockSys). Google ScholarGoogle ScholarCross RefCross Ref
  46. Muhan Zhang, Pan Li, Yinglong Xia, Kai Wang, and Long Jin. 2021. Labeling trick: A theory of using graph neural networks for multi-node representation learning. Advances in Neural Information Processing Systems 34 (2021).Google ScholarGoogle Scholar
  47. Qingzhao Zhang, Yizhuo Wang, Juanru Li, and Siqi Ma. 2020. EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts. In Proceedings of IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER).Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG)

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software Engineering
        April 2024
        2931 pages
        ISBN:9798400702174
        DOI:10.1145/3597503

        Copyright © 2024 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 6 February 2024

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate276of1,856submissions,15%

        Upcoming Conference

        ICSE 2025
      • Article Metrics

        • Downloads (Last 12 months)127
        • Downloads (Last 6 weeks)52

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader