Phantom Events: Demystifying the Issues of Log Forgery in Blockchain

📅 2025-02-19
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This paper identifies and formalizes “phantom events”—a novel security vulnerability in EVM-based blockchains wherein smart contract event logs are maliciously forged. We systematically model five realistic attack patterns exploiting this flaw. Methodologically, we propose a lightweight, high-precision detection framework that integrates symbolic execution with semantic modeling of event signatures, complemented by static analysis and runtime log verification. Our contributions include: (1) the first in-depth security analysis specifically targeting event log forgery, comprehensively covering all five attack classes; (2) discovery of dozens of real-world phantom event vulnerabilities across major EVM chains—including Ethereum—with significantly higher detection accuracy than state-of-the-art tools; and (3) empirical validation through concrete exploits in widely used DeFi protocols, leading to coordinated disclosure and critical contract patches.

Technology Category

Application Category

📝 Abstract
With the rapid development of blockchain technology, transaction logs play a central role in various applications, including decentralized exchanges, wallets, cross-chain bridges, and other third-party services. However, these logs, particularly those based on smart contract events, are highly susceptible to manipulation and forgery, creating substantial security risks across the ecosystem. To address this issue, we present the first in-depth security analysis of transaction log forgery in EVM-based blockchains, a phenomenon we term Phantom Events. We systematically model five types of attacks and propose a tool designed to detect event forgery vulnerabilities in smart contracts. Our evaluation demonstrates that our approach outperforms existing tools in identifying potential phantom events. Furthermore, we have successfully identified real-world instances for all five types of attacks across multiple decentralized applications. Finally, we call on community developers to take proactive steps to address these critical security vulnerabilities.
Problem

Research questions and friction points this paper is trying to address.

Analyzes transaction log forgery in EVM-based blockchains.
Proposes tool to detect event forgery in smart contracts.
Identifies real-world instances of phantom event attacks.
Innovation

Methods, ideas, or system contributions that make the work stand out.

Analyzes EVM-based blockchain log forgery
Proposes tool for smart contract vulnerability detection
Identifies real-world instances of Phantom Events
🔎 Similar Papers
No similar papers found.
Yixuan Liu
Yixuan Liu
AMD, Tsinghua University
Generative AI
Yuxin Dong
Yuxin Dong
Ohio State University
machine learninginformation theorylearning theory
Y
Ye Liu
School of Computing and Information Systems, Singapore Management University, Singapore
Xiapu Luo
Xiapu Luo
The Hong Kong Polytechnic University
Mobile SecuritySmart ContractsNetwork SecurityBlockchainSoftware Engineering
Y
Yi Li
College of Computing and Data Science, Nanyang Technological University, Singapore