ETrace:Event-Driven Vulnerability Detection in Smart Contracts via LLM-Based Trace Analysis

📅 2025-06-18
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
To address the challenge of security auditing for source-code-unavailable smart contracts, this paper proposes an event-driven vulnerability identification framework. It first parses on-chain transaction logs to extract fine-grained event sequences; then leverages large language models (LLMs) for semantic understanding and chain-of-thought (CoT) reasoning; finally, it incorporates a causal pattern-matching mechanism to dynamically correlate observed contract behaviors with known attack patterns. This work pioneers an “event-trajectory + LLM” collaborative paradigm for source-code-agnostic vulnerability detection, enabling precise vulnerability localization without access to source code. Experimental evaluation demonstrates substantial improvements in detection accuracy and interpretability across representative vulnerabilities—including reentrancy, integer overflow, and access-control flaws—outperforming existing black-box approaches. The framework establishes a novel, practical pathway for automated, explainable on-chain smart contract security auditing.

Technology Category

Application Category

📝 Abstract
With the advance application of blockchain technology in various fields, ensuring the security and stability of smart contracts has emerged as a critical challenge. Current security analysis methodologies in vulnerability detection can be categorized into static analysis and dynamic analysis methods.However, these existing traditional vulnerability detection methods predominantly rely on analyzing original contract code, not all smart contracts provide accessible code.We present ETrace, a novel event-driven vulnerability detection framework for smart contracts, which uniquely identifies potential vulnerabilities through LLM-powered trace analysis without requiring source code access. By extracting fine-grained event sequences from transaction logs, the framework leverages Large Language Models (LLMs) as adaptive semantic interpreters to reconstruct event analysis through chain-of-thought reasoning. ETrace implements pattern-matching to establish causal links between transaction behavior patterns and known attack behaviors. Furthermore, we validate the effectiveness of ETrace through preliminary experimental results.
Problem

Research questions and friction points this paper is trying to address.

Detect vulnerabilities in smart contracts without source code
Use LLM-based trace analysis for event-driven detection
Link transaction patterns to known attack behaviors
Innovation

Methods, ideas, or system contributions that make the work stand out.

LLM-based trace analysis without source code
Event-driven vulnerability detection via transaction logs
Pattern-matching links behavior to attack patterns
🔎 Similar Papers
No similar papers found.
C
Chenyang Peng
Xi’an Jiaotong University, Xi’an, Shaanxi, China
H
Haijun Wang
Xi’an Jiaotong University, Xi’an, Shaanxi, China
Yin Wu
Yin Wu
Karlsruher Institut für Technologie
Autonomous DrivingADASScenario ExtractionAnomaly Detection
H
Hao Wu
Xi’an Jiaotong University, Xi’an, Shaanxi, China
M
Ming Fan
Xi’an Jiaotong University, Xi’an, Shaanxi, China
Y
Yitao Zhao
Yunnan Power Grid Co., Ltd, Yunnan, China
T
Ting Liu
Xi’an Jiaotong University, Xi’an, Shaanxi, China