Stop Pulling my Rug: Exposing Rug Pull Risks in Crypto Token to Investors
Crypto token is a digital asset used in blockchain-based decentralized applications. Today, tokens have attracted many investors and collected a large amount of money. Unfortunately, the increasing interest from investors has also attracted the attention of scammers who have devised numerous scam schemes within the token ecosystem. Rug pull is one of the well-known scams, where fraudulent developers lure investors into seemingly profitable projects and then run off with their money, leaving the investors with worthless assets. To prevent future losses, researchers in both industry and academia have attempted to expose rug pull risks. However, rug pull can manifest in various scenarios during the transfer process, posing significant challenges for effective detection.
In this paper, we first conduct an in-depth study of 201 real-world rug pull incidents, and summarize 4 common types of rug pull risks. Then, we establish a component-configurable transfer model to locate and analyze the transfer process. Based on it, we generate effective oracles for the 4 rug pull risks. We propose Tokeer, a token verification tool that implements the transfer model and oracles with datalog technique to expose rug pull risks hidden in token contracts. We apply Tokeer on real-world tokens and compare it with state-of-the-art tools: the commercial tool GoPlus and the academic tool Pied-Piper. Tokeer achieves an average of 98.0% recall and 98.9% precision, significantly outperforming the commercial tool GoPlus and the academic tool Pied-Piper. Besides, Tokeer detects 27.2% more real rug pull risks in wild production than state-of-the-art tools.
Thu 18 AprDisplayed time zone: Lisbon change
14:00 - 15:30 | Security 3Research Track / Journal-first Papers / Software Engineering in Practice at Sophia de Mello Breyner Andresen Chair(s): Akond Rahman Auburn University | ||
14:00 15mTalk | An Empirical Study on Oculus Virtual Reality Applications: Security and Privacy Perspectives Research Track Hanyang Guo Hong Kong Baptist University; Sun Yat-sen University, Hong-Ning Dai Hong Kong Baptist University, Xiapu Luo The Hong Kong Polytechnic University, Zibin Zheng Sun Yat-sen University, Gengyang Xu Department of Computer Science, Hong Kong Baptist University, Fengliang He Department of Computer Science, Hong Kong Baptist University | ||
14:15 15mTalk | Fairness Improvement with Multiple Protected Attributes: How Far Are We? Research Track Zhenpeng Chen Nanyang Technological University, Jie M. Zhang King's College London, Federica Sarro University College London, Mark Harman Meta Platforms, Inc. and UCL Pre-print | ||
14:30 15mTalk | An Empirical Study of Data Disruption by Ransomware Attacks Research Track Yiwei Hou Tsinghua University, Lihua Guo Tsinghua University, Chijin Zhou Tsinghua University, Yiwen Xu Tsinghua University, Zijing Yin Tsinghua University, Shanshan Li National University of Defense Technology, Chengnian Sun University of Waterloo, Yu Jiang Tsinghua University | ||
14:45 15mTalk | Stop Pulling my Rug: Exposing Rug Pull Risks in Crypto Token to Investors Software Engineering in Practice Yuanhang Zhou Tsinghua University, Jingxuan Sun Beijing University of Posts and Telecommunications, Fuchen Ma Tsinghua University, Yuanliang Chen Tsinghua University, Zhen Yan Tsinghua University, Yu Jiang Tsinghua University | ||
15:00 7mTalk | A Closer Look at the Security Risks in the Rust Ecosystem Journal-first Papers Xiaoye Zheng Zhejiang University, Zhiyuan Wan Zhejiang University, Yun Zhang Hangzhou City University, Rui Chang Zhejiang University, David Lo Singapore Management University | ||
15:07 7mTalk | An Empirical Study of Vulnerabilities in Edge Frameworks to Support Security Testing Improvement Journal-first Papers | ||
15:14 7mTalk | A First Look at On-device Models in iOS Apps Journal-first Papers Han Hu Faculty of Information Technology, Monash University, Yujin Huang Monash University, Qiuyuan Chen Tencent Technology, Terry Yue Zhuo Monash University and CSIRO's Data61, Chunyang Chen Technical University of Munich (TUM) |