kth.sePublications KTH
Change search
Link to record
Permanent link

Direct link
Publications (10 of 88) Show all publications
Liu, X., Belkhiri, A., Jin, M., Li, Y. & Artho, C. (2025). ContractViz: Extending Eclipse Trace Compass for Smart Contract Transaction Analysis. In: Proceedings - 2025 IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2025: . Paper presented at 32nd IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2025, Montreal, Canada, March 4-7, 2025 (pp. 819-823). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>ContractViz: Extending Eclipse Trace Compass for Smart Contract Transaction Analysis
Show others...
2025 (English)In: Proceedings - 2025 IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2025, Institute of Electrical and Electronics Engineers (IEEE) , 2025, p. 819-823Conference paper, Published paper (Refereed)
Abstract [en]

The complexity of the Ethereum smart contracts makes it challenging to avoid security flaws. This problem led to many code analysis tools, which detect potential flaws and report them textually. However, the lack of context and visual information in these reports hinders the stakeholders' under-standing of the detailed information. Visualization can assist a developer in grasping such context, but current state-of-the-art visualization tools provide only fixed and limited visualization types. To this end, we present Contract Viz, based on the versatile platform Eclipse Trace Compass (TC), which supports various views and analyses in parallel. Our contribution enables TC to visualize Ethereum transaction traces using flame charts and gas consumption plots. This reveals information on account activities and provides insights into the correct or possibly flawed behaviors. GitHub repo-https://github.com/AisXiaolinlContractViz You Tube video-https://aisxiaolin.github.io/VideoDemo/

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
Blockchain, Eclipse Trace Compass, Smart Contracts, Transaction Logs, Visualization
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:kth:diva-364407 (URN)10.1109/SANER64311.2025.00084 (DOI)001506888600076 ()2-s2.0-105007288497 (Scopus ID)
Conference
32nd IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2025, Montreal, Canada, March 4-7, 2025
Note

Part of ISBN 9798331535100

QC 20250615

Available from: 2025-06-12 Created: 2025-06-12 Last updated: 2025-12-08Bibliographically approved
Kamboj, P., Artho, C., Guanciale, R., Jabbarvand, R. & Godfrey, B. (2025). Leveraging Petri Nets for Workflow Anomaly Detection in Microservice Architectures. In: Application and Theory of Petri Nets and Concurrency - 46th International Conference, PETRI NETS 2025, Proceedings: . Paper presented at 46th International Conference on Applications and Theory of Petri Nets and Concurrency, PETRI NETS 2025, Paris, France, Jun 22 2025 - Jun 27 2025 (pp. 219-241). Springer Nature
Open this publication in new window or tab >>Leveraging Petri Nets for Workflow Anomaly Detection in Microservice Architectures
Show others...
2025 (English)In: Application and Theory of Petri Nets and Concurrency - 46th International Conference, PETRI NETS 2025, Proceedings, Springer Nature , 2025, p. 219-241Conference paper, Published paper (Refereed)
Abstract [en]

Modern microservice architectures pose challenges in understanding and managing the complex workflows within these decentralized services. In particular, it is difficult to identify anomalous behavior that could indicate a bug or attack. We use traces of microservice application activity (requests and responses) to infer a model of the application’s normal behavior. Our approach mines Petri nets to formally represent concurrent operations and their temporal dependencies with a targeted delay injection approach that accurately and efficiently learns these dependencies. The models produced are both explainable and easy to inspect, which offers more transparency and control. Our evaluation shows that injecting delays during model training allows us to achieve perfect model and log fitness (Move-Model and Move-Log fitness of 1) with just 29 traces. In contrast, a straightforward approach requires over 10,000 traces to achieve similar accuracy. Our models successfully identify anomalies in various experiments, such as traces with one missing or multiple missing activities, and reordered sequences to simulate issues in real-world scenarios. Our approach outperforms the state-of-the-art method, demonstrating higher accuracy.

Place, publisher, year, edition, pages
Springer Nature, 2025
Keywords
Alignments, Conformance Checking, Cost function, Delay, Microservices, Process discovery, Process mining
National Category
Computer Sciences Computer Systems Robotics and automation
Identifiers
urn:nbn:se:kth:diva-368632 (URN)10.1007/978-3-031-94634-9_11 (DOI)2-s2.0-105008762714 (Scopus ID)
Conference
46th International Conference on Applications and Theory of Petri Nets and Concurrency, PETRI NETS 2025, Paris, France, Jun 22 2025 - Jun 27 2025
Note

Part of ISBN 9783031946332

QC 20250819

Available from: 2025-08-19 Created: 2025-08-19 Last updated: 2025-08-19Bibliographically approved
Liu, Y., Liu, Y., Li, Y. & Artho, C. (2025). Specification Mining for Smart Contracts with Trace Slicing and Predicate Abstraction. In: Proceedings - 2025 IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2025: . Paper presented at 32nd IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2025, Montreal, Canada, March 4-7, 2025 (pp. 147-158). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Specification Mining for Smart Contracts with Trace Slicing and Predicate Abstraction
2025 (English)In: Proceedings - 2025 IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2025, Institute of Electrical and Electronics Engineers (IEEE) , 2025, p. 147-158Conference paper, Published paper (Refereed)
Abstract [en]

Smart contracts are computer programs running on blockchains to implement Decentralized Applications. The absence of contract specifications hinders routine tasks, such as contract understanding and testing. In this work, we propose a specification mining approach to infer contract specifications from past transaction histories. Our approach derives high-level behavioral automata of function invocations, accompanied by program invariants statistically inferred from the transaction histories. We implemented our approach as tool SMCON and evaluated it on eleven well-studied Azure benchmark smart contracts and six popular real-world DApp smart contracts. The experiments show that SMCON mines reasonably accurate specifications that can be used to enhance symbolic analysis of smart contracts achieving higher code coverage and up to 56 % speedup, and facilitate DApp developers in maintaining high-quality documentation and test suites.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
predicate abstraction, smart contracts, specification mining
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:kth:diva-364404 (URN)10.1109/SANER64311.2025.00022 (DOI)001506888600014 ()2-s2.0-105007306192 (Scopus ID)
Conference
32nd IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2025, Montreal, Canada, March 4-7, 2025
Note

Part of ISBN 9798331535100

QC 20250615

Available from: 2025-06-12 Created: 2025-06-12 Last updated: 2025-12-08Bibliographically approved
Birgersson, M., Artho, C. & Balliu, M. (2025). Trust and Verify: Formally Verified and Upgradable Trusted Functions. In: Proceedings - 2025 IEEE International Conference on Software Maintenance and Evolution, ICSME 2025: . Paper presented at 41st IEEE International Conference on Software Maintenance and Evolution, ICSME 2025, Auckland, New Zealand, September 7-12, 2025 (pp. 356-367). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Trust and Verify: Formally Verified and Upgradable Trusted Functions
2025 (English)In: Proceedings - 2025 IEEE International Conference on Software Maintenance and Evolution, ICSME 2025, Institute of Electrical and Electronics Engineers (IEEE) , 2025, p. 356-367Conference paper, Published paper (Refereed)
Abstract [en]

Computation over sensitive data requires that the computation function is secure and trusted. Existing approaches either do not enforce formal verification, require the user to verify the proof, or lack secure attestation guarantees. In addition, neither addresses the issue of having users once again inspect the application after upgrading the code running in the enclave. We propose an approach that uses a formal specification to guarantee that the behavior of the computation function conforms to the desired functionality. By combining automated verification with attestation on a trusted execution environment, we ensure that only conformant applications are executed. At the same time, we allow updates of the computation function without changing the attestation response, as long as the formal specification still holds. We implement and evaluate the system on several functions; our results show an average overhead of only 50 %. Finally, we demonstrate the validity of the system using a real-world application, Dafny-EVM.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
confidential computation, formal verification, secure multi-party computation, trusted execution environments
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:kth:diva-373856 (URN)10.1109/ICSME64153.2025.00040 (DOI)2-s2.0-105022433284 (Scopus ID)
Conference
41st IEEE International Conference on Software Maintenance and Evolution, ICSME 2025, Auckland, New Zealand, September 7-12, 2025
Note

Part of ISBN 9798331595876

QC 20251211

Available from: 2025-12-11 Created: 2025-12-11 Last updated: 2025-12-11Bibliographically approved
Aghvamipanah, M., Amini, M., Artho, C. & Balliu, M. (2024). Activity Recognition Protection for IoT Trigger-Action Platforms. In: Proceedings - 9th IEEE European Symposium on Security and Privacy, Euro S and P 2024: . Paper presented at 9th IEEE European Symposium on Security and Privacy, Euro S and P 2024, July 8-12, 2024, Vienna, Austria (pp. 600-616). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Activity Recognition Protection for IoT Trigger-Action Platforms
2024 (English)In: Proceedings - 9th IEEE European Symposium on Security and Privacy, Euro S and P 2024, Institute of Electrical and Electronics Engineers (IEEE) , 2024, p. 600-616Conference paper, Published paper (Refereed)
Abstract [en]

Smart home devices collect and transmit user data to smart home Trigger Action Platforms (TAPs) for processing and executing automation rules. However, this data can also be used to infer user activities or other sensitive information. In this paper, we propose PTAP, a privacy-preserving approach based on adversarial example attacks. PTAP injects targeted perturbations into time-series sensor data, effectively confounding potentially malicious TAP classifiers. Our approach significantly reduces the chance of user activity recognition for a malicious TAP while preserving the essential information for automation rule execution, thus safeguarding TAP utility. We evaluated PTAP using a real-world smart-home dataset and examined its effectiveness in preserving utility through the execution of various IoT applications. Our results demonstrate that PTAP effectively preserves user privacy (reducing the accuracy of a malicious classifier 91 to 6 percent) while maintaining automation rule integrity, providing a practical and effective solution to protect user privacy in smart-home environments.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
Activity recognition, Adversarial example, Data perturbation, Data privacy, Smart home, Trigger Action platform
National Category
Computer Sciences Communication Systems Computer Systems
Identifiers
urn:nbn:se:kth:diva-353964 (URN)10.1109/EuroSP60621.2024.00039 (DOI)001304430300031 ()2-s2.0-85203675884 (Scopus ID)
Conference
9th IEEE European Symposium on Security and Privacy, Euro S and P 2024, July 8-12, 2024, Vienna, Austria
Note

Part of ISBN 9798350354256

QC 20241106

Available from: 2024-09-25 Created: 2024-09-25 Last updated: 2024-11-06Bibliographically approved
Eshghie, M., Jafari, M. & Artho, C. (2024). From Creation to Exploitation: The Oracle Lifecycle. In: Proceedings - 2024 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion, SANER-C 2024: . Paper presented at 2024 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion, SANER-C 2024, March 12-15, 2024, Rovaniemi, Finland (pp. 23-34). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>From Creation to Exploitation: The Oracle Lifecycle
2024 (English)In: Proceedings - 2024 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion, SANER-C 2024, Institute of Electrical and Electronics Engineers (IEEE) , 2024, p. 23-34Conference paper, Published paper (Refereed)
Abstract [en]

Decentralized Finance (DeFi) systems leverage blockchain oracles to access off/on-chain data as a service. Therefore, maintaining the integrity of oracle data is essential. However, the integrity of these oracles data can be compromised through different attacks, and the effectiveness of these attacks varies depending on the specific stage of the oracle’s lifecycle. This work presents a comprehensive analysis of this lifecycle, identifying potential attack types and examining the efficacy of existing defense mechanisms. We propose a generalized model encompassing data creation, submission, consensus, election, and deprecation stages. We evaluate our model against seven recent high-profile DeFi exploits totaling $ 187 million. We have also studied bond systems as a preventive measure against at least a subset of oracle exploits. Our findings suggest that while bond systems increase the cost of attacks, thereby fortifying oracle data integrity against adversarial manipulations, they also require careful calibration to avoid hindering honest participation.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
Attack Mitigation, Blockchain Oracles, Bond Systems, Data Lifecycle, Decentralized Finance, Security
National Category
Software Engineering Computer Sciences
Identifiers
urn:nbn:se:kth:diva-353536 (URN)10.1109/SANER-C62648.2024.00009 (DOI)001298155000005 ()2-s2.0-85202600979 (Scopus ID)
Conference
2024 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion, SANER-C 2024, March 12-15, 2024, Rovaniemi, Finland
Note

Part of ISBN: 9798350351576

QC 20241008

Available from: 2024-09-19 Created: 2024-09-19 Last updated: 2025-05-07Bibliographically approved
Eshghie, M., Artho, C., Stammler, H., Ahrendt, W., Hildebrandt, T. T. & Schneider, G. (2024). HighGuard: Cross-Chain Business Logic Monitoring of Smart Contracts. In: PROCEEDINGS OF 2024 39TH ACM/IEEE INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE 2024: . Paper presented at 39th ACM/IEEE International Conference on Automated Software Engineering (ASE), OCT 28-NOV 01, 2024, Sacramento, CA (pp. 2378-2381). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>HighGuard: Cross-Chain Business Logic Monitoring of Smart Contracts
Show others...
2024 (English)In: PROCEEDINGS OF 2024 39TH ACM/IEEE INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE 2024, Association for Computing Machinery (ACM) , 2024, p. 2378-2381Conference paper, Published paper (Refereed)
Abstract [en]

Logical flaws in smart contracts are often exploited, leading to significant financial losses. Our tool, HighGuard, detects transactions that violate business logic specifications of smart contracts. HighGuard employs dynamic condition response (DCR) graph models as formal specifications to verify contract execution against these models. It is capable of operating in a cross-chain environment for detecting business logic flaws across different blockchain platforms. We demonstrate HighGuard's effectiveness in identifying deviations from specified behaviors in smart contracts without requiring code instrumentation or incurring additional gas costs. By using precise specifications in the monitor, HighGuard achieves detection without false positives. Our evaluation, involving 54 exploits, confirms HighGuard's effectiveness in detecting business logic vulnerabilities. Our open-source implementation of HighGuard and a screencast of its usage are available at: https://github.com/mojtaba-eshghie/HighGuard https://www.youtube.com/watch?v=sZYVV-slDaY

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2024
Series
IEEE ACM International Conference on Automated Software Engineering, ISSN 1527-1366
Keywords
Smart Contracts, DCR Graphs, Runtime Monitoring, Blockchain, Security
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-361338 (URN)10.1145/3691620.3695356 (DOI)001353105400217 ()2-s2.0-85211650421 (Scopus ID)
Conference
39th ACM/IEEE International Conference on Automated Software Engineering (ASE), OCT 28-NOV 01, 2024, Sacramento, CA
Note

Part of ISBN 979-8-4007-1248-7

QC 20250317

Available from: 2025-03-17 Created: 2025-03-17 Last updated: 2025-05-07Bibliographically approved
Fu, H., Eldh, S., Wiklund, K., Ermedahl, A., Haller, P. & Artho, C. (2024). In industrial embedded software, are some compilation errors easier to localize and fix than others?. In: Proceedings - 2024 IEEE Conference on Software Testing, Verification and Validation, ICST 2024: . Paper presented at 17th IEEE Conference on Software Testing, Verification and Validation, ICST 2024, May 27-31, 2024, Toronto, Canada (pp. 383-394). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>In industrial embedded software, are some compilation errors easier to localize and fix than others?
Show others...
2024 (English)In: Proceedings - 2024 IEEE Conference on Software Testing, Verification and Validation, ICST 2024, Institute of Electrical and Electronics Engineers (IEEE) , 2024, p. 383-394Conference paper, Published paper (Refereed)
Abstract [en]

Industrial embedded systems often require special-ized hardware. However, software engineers have access to such domain-specific hardware only at the continuous integration (CI) stage and have to use simulated hardware otherwise. This results in a higher proportion of compilation errors at the CI stage than in other types of systems, warranting a deeper study. To this end, we create a CI diagnostics solution called 'Shadow Job' that analyzes our industrial CI system. We collected over 40000 builds from 4 projects from the product source code and categorized the compilation errors into 14 error types, showing that the five most common ones comprise 89 % of all compilation errors. Additionally, we analyze the resolution time, size, and distance for each error type, to see if different types of compilation errors are easier to localize or repair than others. Our results show that the resolution time, size, and distance are independent of each other. Our research also provides insights into the human effort required to fix the most common industrial compilation errors. We also identify the most promising directions for future research on fault localization.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
compilation error, continuous integration, fault localization, software build
National Category
Computer Engineering Software Engineering Computer Sciences
Identifiers
urn:nbn:se:kth:diva-353952 (URN)10.1109/ICST60714.2024.00042 (DOI)001307930000034 ()2-s2.0-85203842024 (Scopus ID)
Conference
17th IEEE Conference on Software Testing, Verification and Validation, ICST 2024, May 27-31, 2024, Toronto, Canada
Note

Part of ISBN: 979-8-3503-0818-1

QC 20240926

Available from: 2024-09-25 Created: 2024-09-25 Last updated: 2024-11-05Bibliographically approved
Artho, C., Parízek, P., Qu, D., Galgali, V. & Yi, P. L. (2024). JPF: From 2003 to 2023. In: Tools and Algorithms for the Construction and Analysis of Systems - 30th International Conference, TACAS 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Proceedings: . Paper presented at 30th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2024, which was held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Luxembourg City, Luxembourg, Apr 6 2024 - Apr 11 2024 (pp. 3-22). Springer Nature, 14571
Open this publication in new window or tab >>JPF: From 2003 to 2023
Show others...
2024 (English)In: Tools and Algorithms for the Construction and Analysis of Systems - 30th International Conference, TACAS 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Proceedings, Springer Nature , 2024, Vol. 14571, p. 3-22Conference paper, Published paper (Refereed)
Abstract [en]

We give an account of JPF’s current architecture as it has evolved over the last 20 years. Key changes include a modular, extensible design, and Java 11 support. Java 11 brought with it fundamental changes in the language and its runtime, in particular, a new modular library system, different compilation of string expressions to bootstrap methods, and changes in many internal interfaces that allow access to the loaded code and the virtual machine state. These changes required numerous adaptations in JPF to ensure a successful compilation and correct behavior under Java 11.

Place, publisher, year, edition, pages
Springer Nature, 2024
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 14571
Keywords
Java, JPF, Program analysis, Software model checking
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-346541 (URN)10.1007/978-3-031-57249-4_1 (DOI)001284179800001 ()2-s2.0-85192236732 (Scopus ID)
Conference
30th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2024, which was held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2024, Luxembourg City, Luxembourg, Apr 6 2024 - Apr 11 2024
Note

QC 20240521

Part of ISBN 978-303157248-7

Available from: 2024-05-16 Created: 2024-05-16 Last updated: 2024-10-04Bibliographically approved
Eshghie, M. & Artho, C. (2024). Oracle-Guided Vulnerability Diversity and Exploit Synthesis of Smart Contracts Using LLMs. In: PROCEEDINGS OF 2024 39TH ACM/IEEE INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE 2024: . Paper presented at 39th ACM/IEEE International Conference on Automated Software Engineering (ASE), OCT 28-NOV 01, 2024, Sacramento, CA (pp. 2240-2244). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>Oracle-Guided Vulnerability Diversity and Exploit Synthesis of Smart Contracts Using LLMs
2024 (English)In: PROCEEDINGS OF 2024 39TH ACM/IEEE INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE 2024, Association for Computing Machinery (ACM) , 2024, p. 2240-2244Conference paper, Published paper (Refereed)
Abstract [en]

Many smart contracts are prone to exploits, which has given rise to analysis tools that try to detect and fix vulnerabilities. Such analysis tools are often trained and evaluated on limited data sets, which has the following drawbacks: 1. The ground truth is often based on the verdict of related tools rather than an actual verification result; 2. Data sets focus on low-level vulnerabilities like reentrancy and overflow; 3. Data sets lack concrete exploit examples. To address these shortconUngs, we introduce XruiGEN, which uses a model-based oracle specification of the business logic of the smart contracts to synthesize valid exploits using LLMs. Our experiments, involving 104 synthesized vulnerability-exploit pairs, demonstrated a 57% success rate in exploiting targeted aspects of the contract. They achieved exploit efficiency with an average of only 3.5 transactions per exploit, highlighting the effectiveness of our methodology.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2024
Series
IEEE ACM International Conference on Automated Software Engineering, ISSN 1527-1366
Keywords
Exploit Synthesis, Smart Contract, Vulnerability, LLM, Large Language Models
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-361330 (URN)10.1145/3691620.3695292 (DOI)001353105400188 ()2-s2.0-85211646919 (Scopus ID)
Conference
39th ACM/IEEE International Conference on Automated Software Engineering (ASE), OCT 28-NOV 01, 2024, Sacramento, CA
Note

Part of ISBN 979-8-4007-1248-7

QC 20250317

Available from: 2025-03-17 Created: 2025-03-17 Last updated: 2025-05-07Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-3656-1614

Search in DiVA

Show all publications