ISSTA 2025
Wed 25 - Sat 28 June 2025 Trondheim, Norway
co-located with FSE 2025
Thu 26 Jun 2025 11:25 - 11:50 at Cosmos 3A - Security 2 Chair(s): Jacques Klein

Rug pulls pose a critical threat to the blockchain ecosystem, causing substantial financial losses and eroding trust in decentralized finance (DeFi) projects. While research has advanced in understanding these fraudulent schemes, current work remains fragmented across academic and industry sources, with incomplete taxonomies and limited detection capabilities. Through systematic analysis of 31 academic papers and 27 industry sources, we develop a comprehensive taxonomy of 35 distinct rug pull types, including 9 previously unidentified variants. Our analysis reveals significant gaps in current detection mechanisms: existing datasets cover only 20% of known rug pull types, leading us to create an enhanced dataset of 2,391 instances that increases coverage to 82.9%. Our evaluation of 13 detection tools shows substantial variability in coverage rates (25.7% to 62.9%), with 9 types remaining completely undetectable. Most notably, tool performance significantly degrades in detecting complex, multi-technique rug pulls, with maximum detection rates dropping from 55.6% for real-world cases to 31.3% for compound scenarios. These findings provide a foundation for developing more robust security measures in the DeFi ecosystem.

Thu 26 Jun

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

11:00 - 12:15
Security 2Research Papers at Cosmos 3A
Chair(s): Jacques Klein University of Luxembourg
11:00
25m
Talk
Top Score on the Wrong Exam: On Benchmarking in Machine Learning for Vulnerability Detection
Research Papers
Niklas Risse Max-Planck-Institute for Security and Privacy, Jing Liu Max Planck Institute for Security and Privacy, Marcel Böhme MPI for Security and Privacy
DOI Pre-print
11:25
25m
Talk
SoK: A Taxonomic Analysis of DeFi Rug Pulls - Types, Dataset, and Tool Assessment
Research Papers
Dianxiang Sun Nanyang Technological University, Wei Ma , Liming Nie , Yang Liu Nanyang Technological University
DOI
11:50
25m
Talk
Recurring Vulnerability Detection: How Far Are We?
Research Papers
Yiheng Cao Fudan University, Susheng Wu Fudan University, Ruisi Wang Fudan University, Bihuan Chen Fudan University, Yiheng Huang Fudan University, Chenhao Lu Fudan University, Zhuotong Zhou Fudan University, Xin Peng Fudan University
DOI

Information for Participants
Thu 26 Jun 2025 11:00 - 12:15 at Cosmos 3A - Security 2 Chair(s): Jacques Klein
Info for room Cosmos 3A:

Cosmos 3A is the first room in the Cosmos 3 wing.

When facing the main Cosmos Hall, access to the Cosmos 3 wing is on the left, close to the stairs. The area is accessed through a large door with the number “3”, which will stay open during the event.

:
:
:
: