Skip to main content

Showing 1–11 of 11 results for author: Beillahi, S M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.05509  [pdf, other

    cs.CR cs.SE

    Secure Smart Contract with Control Flow Integrity

    Authors: Zhiyang Chen, Sidi Mohamed Beillahi, Pasha Barahimi, Cyrus Minwalla, Han Du, Andreas Veneris, Fan Long

    Abstract: Smart contracts power decentralized financial (DeFi) services but are vulnerable to complex security exploits that can lead to significant financial losses. Existing security measures often fail to adequately protect these contracts due to the composability of DeFi protocols and the increasing sophistication of attacks. Through a large-scale empirical study of historical transactions from the 30 h… ▽ More

    Submitted 7 April, 2025; originally announced April 2025.

    Comments: 11 pages, 2 figures, 3 tables

  2. arXiv:2407.10039  [pdf, other

    cs.SE cs.CR cs.PL

    OpenTracer: A Dynamic Transaction Trace Analyzer for Smart Contract Invariant Generation and Beyond

    Authors: Zhiyang Chen, Ye Liu, Sidi Mohamed Beillahi, Yi Li, Fan Long

    Abstract: Smart contracts, self-executing programs on the blockchain, facilitate reliable value exchanges without centralized oversight. Despite the recent focus on dynamic analysis of their transaction histories in both industry and academia, no open-source tool currently offers comprehensive tracking of complete transaction information to extract user-desired data such as invariant-related data. This pape… ▽ More

    Submitted 13 July, 2024; originally announced July 2024.

  3. arXiv:2407.05411  [pdf, other

    cs.SE

    Assessing Code Generation with Intermediate Languages

    Authors: Xun Deng, Sicheng Zhong, Honghua Dong, Jingyu Hu, Sidi Mohamed Beillahi, Xujie Si, Fan Long

    Abstract: Intermediate step methodologies like chain of thoughts (COT) have demonstrated effectiveness in enhancing the performance of Large Language Models (LLMs) on code generation. This study explores the utilization of intermediate languages, including various programming languages, natural language solutions, and pseudo-code, and systematically evaluates their impact on the performance of LLMs in code… ▽ More

    Submitted 7 July, 2024; originally announced July 2024.

  4. arXiv:2404.14580  [pdf, other

    cs.CR cs.PL cs.SE

    Demystifying Invariant Effectiveness for Securing Smart Contracts

    Authors: Zhiyang Chen, Ye Liu, Sidi Mohamed Beillahi, Yi Li, Fan Long

    Abstract: Smart contract transactions associated with security attacks often exhibit distinct behavioral patterns compared with historical benign transactions before the attacking events. While many runtime monitoring and guarding mechanisms have been proposed to validate invariants and stop anomalous transactions on the fly, the empirical effectiveness of the invariants used remains largely unexplored. In… ▽ More

    Submitted 13 July, 2024; v1 submitted 22 April, 2024; originally announced April 2024.

  5. arXiv:2401.06044  [pdf, other

    cs.SE

    Safeguarding DeFi Smart Contracts against Oracle Deviations

    Authors: Xun Deng, Sidi Mohamed Beillahi, Cyrus Minwalla, Han Du, Andreas Veneris, Fan Long

    Abstract: This paper presents OVer, a framework designed to automatically analyze the behavior of decentralized finance (DeFi) protocols when subjected to a "skewed" oracle input. OVer firstly performs symbolic analysis on the given contract and constructs a model of constraints. Then, the framework leverages an SMT solver to identify parameters that allow its secure operation. Furthermore, guard statements… ▽ More

    Submitted 11 January, 2024; originally announced January 2024.

    Comments: 13 pages; extended version of paper accepted in ICSE'24

    ACM Class: D.2.4

  6. arXiv:2209.06648  [pdf, other

    cs.PL cs.LO

    Automated Synthesis of Asynchronizations

    Authors: Sidi Mohamed Beillahi, Ahmed Bouajjani, Constantin Enea, Shuvendu Lahiri

    Abstract: Asynchronous programming is widely adopted for building responsive and efficient software, and modern languages such as C# provide async/await primitives to simplify the use of asynchrony. In this paper, we propose an approach for refactoring a sequential program into an asynchronous program that uses async/await, called asynchronization. The refactoring process is parametrized by a set of methods… ▽ More

    Submitted 14 September, 2022; originally announced September 2022.

    Comments: 37 pages, 18 figures, an extended version of a SAS 2022 paper with the same title

  7. FlashSyn: Flash Loan Attack Synthesis via Counter Example Driven Approximation

    Authors: Zhiyang Chen, Sidi Mohamed Beillahi, Fan Long

    Abstract: In decentralized finance (DeFi), lenders can offer flash loans to borrowers, i.e., loans that are only valid within a blockchain transaction and must be repaid with fees by the end of that transaction. Unlike normal loans, flash loans allow borrowers to borrow large assets without upfront collaterals deposits. Malicious adversaries use flash loans to gather large assets to exploit vulnerable DeFi… ▽ More

    Submitted 12 January, 2024; v1 submitted 21 June, 2022; originally announced June 2022.

    Comments: 29 pages, 8 figures, conference paper extended version

  8. arXiv:2102.10784  [pdf, other

    cs.PL cs.CR

    SigVM: Enabling Event-Driven Execution for Autonomous Smart Contracts

    Authors: Zihan Zhao, Sidi Mohamed Beillahi, Ryan Song, Yuxi Cai, Andreas Veneris, Fan Long

    Abstract: This paper presents SigVM, a novel blockchain virtual machine that supports an event-driven execution model, enabling developers to build autonomous smart contracts. Contracts in SigVM can emit signal events, on which other contracts can listen. Once an event is triggered, corresponding handler functions are automatically executed as signal transactions. We build an end-to-end blockchain platform… ▽ More

    Submitted 17 November, 2021; v1 submitted 22 February, 2021; originally announced February 2021.

    Comments: 14 Pages

  9. arXiv:2101.09032  [pdf, other

    cs.PL cs.LO

    Checking Robustness Between Weak Transactional Consistency Models

    Authors: Sidi Mohamed Beillahi, Ahmed Bouajjani, Constantin Enea

    Abstract: Concurrent accesses to databases are typically encapsulated in transactions in order to enable isolation from other concurrent computations and resilience to failures. Modern databases provide transactions with various semantics corresponding to different trade-offs between consistency and availability. Since a weaker consistency model provides better performance, an important issue is investigati… ▽ More

    Submitted 22 January, 2021; originally announced January 2021.

    Comments: 38 pages, 7 figures, 2 tables, extended version of ESOP 2021 conference paper

  10. Robustness Against Transactional Causal Consistency

    Authors: Sidi Mohamed Beillahi, Ahmed Bouajjani, Constantin Enea

    Abstract: Distributed storage systems and databases are widely used by various types of applications. Transactional access to these storage systems is an important abstraction allowing application programmers to consider blocks of actions (i.e., transactions) as executing atomically. For performance reasons, the consistency models implemented by modern databases are weaker than the standard serializability… ▽ More

    Submitted 2 February, 2021; v1 submitted 28 June, 2019; originally announced June 2019.

    Journal ref: Logical Methods in Computer Science, Volume 17, Issue 1 (February 3, 2021) lmcs:5987

  11. arXiv:1905.08406  [pdf, ps, other

    cs.LO

    Checking Robustness Against Snapshot Isolation

    Authors: Sidi Mohamed Beillahi, Ahmed Bouajjani, Constantin Enea

    Abstract: Transactional access to databases is an important abstraction allowing programmers to consider blocks of actions (transactions) as executing in isolation. The strongest consistency model is {\em serializability}, which ensures the atomicity abstraction of transactions executing over a sequentially consistent memory. Since ensuring serializability carries a significant penalty on availability, mode… ▽ More

    Submitted 22 May, 2019; v1 submitted 20 May, 2019; originally announced May 2019.

    Comments: CAV 2019: 31st International Conference on Computer-Aided Verification