Netinfo Security ›› 2025, Vol. 25 ›› Issue (5): 732-746.doi: 10.3969/j.issn.1671-1122.2025.05.006

Previous Articles     Next Articles

Research on Price Oracle Manipulation Source Code Detection Method Based on Static Analysis

YE Jiajun, GAO Cuifeng, XUE Yinxing()   

  1. Department of Computer Science and Technology, University of Science and Technology of China, Hefei 230026, China
  • Received:2024-04-29 Online:2025-05-10 Published:2025-06-10

Abstract:

Aiming at the problem of price oracle manipulation attacks on smart contracts, this paper proposed a price oracle manipulation source code detection method based on static analysis. This approach first established correspondences between caller function variables and called function parameters, as well as between callee function return values and caller variables based on user-input function call relationships. Subsequently, static analysis was applied to the source code of the tested function and other contracts involved during runtime to obtain data flow and controled flow information for each contract. Then, utilized the data flow and controled flow information for individual contracts, along with function call relationships, cross-contract data flow graphs and control flow graphs were constructed to ascertain variable data dependencies and controled dependencies. Finally, the method detected whether the transfer amount in transfer operations and controled statements which the transfer operations controled depend involve manipulation-prone information to determine the existence of price oracle manipulation risk in the tested contract. Experimental results demonstrate that this method effectively detects price oracle manipulation attacks in smart contracts with high precision and recall rates.

Key words: smart contract, static analysis, price oracle manipulation attack, blockchain security

CLC Number: