BugMagnifier: TON Transaction Simulator for Revealing Smart Contract Vulnerabilities

📅 2025-09-29
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
TON’s asynchronous execution model renders message processing order non-deterministic, leading to timing-related security vulnerabilities—such as race conditions—that evade conventional static analysis. To address this, we propose the first dynamic detection framework tailored for TON, enabling precise orchestration of message sequences and comparative state evolution analysis within an integrated TON Sandbox and TVM environment. Our approach combines controlled message queue manipulation, differential state analysis, and probabilistic permutation testing. It automatically generates reproducible vulnerability evidence, shifting verification from expert-driven heuristics to systematic, repeatable validation. Experimental evaluation demonstrates its effectiveness in identifying message-ratio-dependent vulnerabilities; detection outcomes align closely with theoretical predictions, significantly enhancing the capability to uncover timing defects in TON smart contracts under asynchronous execution.

Technology Category

Application Category

📝 Abstract
The Open Network (TON) blockchain employs an asynchronous execution model that introduces unique security challenges for smart contracts, particularly race conditions arising from unpredictable message processing order. While previous work established vulnerability patterns through static analysis of audit reports, dynamic detection of temporal dependencies through systematic testing remains an open problem. We present BugMagnifier, a transaction simulation framework that systematically reveals vulnerabilities in TON smart contracts through controlled message orchestration. Built atop TON Sandbox and integrated with the TON Virtual Machine (TVM), our tool combines precise message queue manipulation with differential state analysis and probabilistic permutation testing to detect asynchronous execution flaws. Experimental evaluation demonstrates BugMagnifier's effectiveness through extensive parametric studies on purpose-built vulnerable contracts, revealing message ratio-dependent detection complexity that aligns with theoretical predictions. This quantitative model enables predictive vulnerability assessment while shifting discovery from manual expert analysis to automated evidence generation. By providing reproducible test scenarios for temporal vulnerabilities, BugMagnifier addresses a critical gap in the TON security tooling, offering practical support for safer smart contract development in asynchronous blockchain environments.
Problem

Research questions and friction points this paper is trying to address.

Detects smart contract vulnerabilities in asynchronous TON blockchain environments
Reveals race conditions through controlled message orchestration and testing
Automates discovery of temporal dependencies via differential state analysis
Innovation

Methods, ideas, or system contributions that make the work stand out.

Simulates TON transactions to detect vulnerabilities
Manipulates message queues for differential state analysis
Uses probabilistic testing for asynchronous execution flaws
🔎 Similar Papers
No similar papers found.
Yury Yanovich
Yury Yanovich
Skolkovo Institute of Science and Technology
BlockchainStatisticsMachine learning
V
Victoria Kovalevskaya
Moscow Institute of Physics and Technology, Moscow, Russia
M
Maksim Egorov
Moscow Institute of Physics and Technology, Moscow, Russia
E
Elizaveta Smirnova
Moscow Institute of Physics and Technology, Moscow, Russia
M
Matvey Mishuris
Moscow Institute of Physics and Technology, Moscow, Russia
Y
Yash Madhwal
Skolkovo Institute of Science and Technology, Moscow, Russia
K
Kirill Ziborov
Lomonosov Moscow State University, Moscow, Russia
V
Vladimir Gorgadze
Moscow Institute of Physics and Technology, Moscow, Russia
Subodh Sharma
Subodh Sharma
Indian Institute of Technology, Delhi, India