Your Token Becomes Worthless: Unveiling Rug Pull Schemes in Crypto Token via Code-and-Transaction Fusion Analysis

📅 2025-06-23
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Existing Rug Pull detection methods analyze smart contract code or on-chain transactions in isolation, failing to capture synergistic malicious patterns between them. To address this, this paper proposes the first dual-graph collaborative detection framework that jointly models static semantic features of smart contracts and dynamic on-chain transaction behaviors. It constructs a semantic risk code graph and a transaction behavior graph, leveraging graph neural networks and multi-head attention mechanisms to explicitly model complex interdependencies between code vulnerabilities and market manipulation activities. Innovatively integrating declarative rules, flow-sensitive static analysis, and market manipulation feature extraction, the framework enables fine-grained risk perception. Evaluated on a manually annotated dataset, it achieves 95.3% precision and 93.8% recall. In real-world on-chain deployment, it identifies 4,801 Rug Pull tokens with 91% empirical accuracy, significantly outperforming unimodal baselines.

Technology Category

Application Category

📝 Abstract
Rug pull scams have emerged as a persistent threat to cryptocurrency, causing significant financial losses. A typical scenario involves scammers deploying honeypot contracts to attract investments, restricting token sales, and draining the funds, which leaves investors with worthless tokens. Current methods either rely on predefined patterns to detect code risks or utilize statistical transaction data to train detection models. However, real-world Rug Pull schemes often involve a complex interplay between malicious code and suspicious transaction behaviors. These methods, which solely focus on one aspect, fall short in detecting such schemes effectively. In this paper, we propose RPhunter, a novel technique that integrates code and transaction for Rug Pull detection. First, RPhunter establishes declarative rules and performs flow analysis to extract code risk information, further constructing a semantic risk code graph (SRCG). Meanwhile, to leverage transaction information, RPhunter formulates dynamic token transaction activities as a token flow behavior graph (TFBG) in which nodes and edges are characterized from network structure and market manipulation perspectives. Finally, RPhunter employs graph neural networks to extract complementary features from SRCG and TFBG, integrating them through an attention fusion model to enhance the detection of Rug Pull. We manually analyzed 645 Rug Pull incidents from code and transaction aspects and constructed a ground-truth dataset. We evaluated RPhunter on our dataset, achieving a precision of 95.3%, a recall of 93.8% and an F1 score of 94.5%, which highlights superior performance compared to existing state-of-the-art methods. Furthermore, when applied to the real-world scenarios, RPhunter has identified 4801 Rug Pull tokens, achieving a precision of 91%.
Problem

Research questions and friction points this paper is trying to address.

Detects rug pull scams in crypto via code-transaction fusion analysis
Identifies complex interplay between malicious code and transaction behaviors
Improves detection precision and recall compared to existing methods
Innovation

Methods, ideas, or system contributions that make the work stand out.

Fuses code and transaction analysis for detection
Uses graph neural networks for feature extraction
Achieves high precision with attention fusion model
🔎 Similar Papers
No similar papers found.
H
Hao Wu
Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi’an Jiaotong University, Xi’an, China
H
Haijun Wang
Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi’an Jiaotong University, Xi’an, China
S
Shangwang Li
Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi’an Jiaotong University, Xi’an, China
Yin Wu
Yin Wu
Karlsruher Institut für Technologie
Autonomous DrivingADASScenario ExtractionAnomaly Detection
M
Ming Fan
Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi’an Jiaotong University, Xi’an, China
Wuxia Jin
Wuxia Jin
Xi'an Jiaotong university
software analysissoftware architecturemicroservices
Y
Yitao Zhao
Yunnan Power Grid Co., Ltd, Kunming, China
T
Ting Liu
Ministry of Education Key Laboratory of Intelligent Networks and Network Security, Xi’an Jiaotong University, Xi’an, China