SANER 2025
Tue 4 - Fri 7 March 2025 Montréal, Québec, Canada
Fri 7 Mar 2025 16:15 - 16:30 at L-1710 - Software Security Chair(s): Sabbir M. Saleh

The non-fungible tokens (NFTs) market has evolved over the past decade, with NFTs serving as unique digital identifiers on a blockchain that certify ownership and authenticity. The trading attributes of NFTs have drawn many users and investors. However, their high value also attracts attackers who exploit vulnerabilities in NFT smart contracts for illegal profits, thereby harming the NFT ecosystem. One notable vulnerability in NFT smart contracts is sleepminting, which allows attackers to illegally transfer others’ tokens. Although some research has been conducted on sleepminting, these studies are predominantly qualitative analyses or based on historical transaction data. There is a lack of understanding from the contract code perspective, which is crucial for identifying such issues and preventing attacks before they occur.

To address this gap, in this paper, we categorize the sleepminting issue and find four distinct types of sleepminting in NFT smart contracts. Each type is accompanied by a comprehensive definition and illustrative code examples to provide a clear understanding of how these vulnerabilities manifest within the contract code. Furthermore, to help detect the defined defects before the sleepminting problem occurrence, we propose a tool named WakeMint, which is built on a symbolic execution framework. WakeMint is designed to be compatible with both high and low versions of Solidity, ensuring broad applicability across various smart contracts. The tool also employs a pruning strategy to shorten the detection period. Additionally, WakeMint gathers some key information, such as the owner of an NFT and emissions of events related to the transfer of the NFT’s ownership during symbolic execution. Then, it analyzes the features of the transfer function based on this information so that it can judge the existence of sleepminting. We ran WakeMint on 11,161 real-world NFT smart contracts and evaluated the results. We found 115 instances of sleepminting issues in total, and the accuracy of our tool is 87.8%.

Fri 7 Mar

Displayed time zone: Eastern Time (US & Canada) change

15:30 - 17:00
Software SecurityEarly Research Achievement (ERA) Track / Research Papers at L-1710
Chair(s): Sabbir M. Saleh University of Western Ontario
15:30
15m
Talk
Characterizing Logs in Vulnerability Reports: In-Depth Analysis and Security ImplicationsBest Paper Award
Research Papers
Yao Shu Wuhan University, Lianyu Zheng Wuhan University, Jinfu Chen Wuhan University, Jifeng Xuan Wuhan University
15:45
15m
Talk
Conan: Uncover Consensus Issues in Distributed Databases Using Fuzzing-driven Fault Injection
Research Papers
Haojia Huang Sun Yat-Sen Universty, Pengfei Chen Sun Yat-sen University, Guangba  Yu Sun Yat-sen University, Haiyu Huang Sun Yat-sen University, Jia Chang Huawei, Jun Li Huawei, Jian Han Huawei
16:00
15m
Talk
Dissecting APKs from Google Play: Trends, Insights and Security Implications
Research Papers
Pedro Jesús Ruiz Jiménez University of Luxembourg, Jordan Samhi University of Luxembourg, Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Jacques Klein University of Luxembourg
16:15
15m
Talk
WakeMint: Detecting Sleepminting Vulnerabilities in NFT Smart Contracts
Research Papers
Lei Xiao Sun Yat-sen University, Shuo Yang Sun Yat-sen University, Wen Chen Energy Development Research Institute, China Southern Power Grid Company Limited, Zibin Zheng Sun Yat-sen University
16:30
7m
Talk
On Categorizing Open Source Software Security Vulnerability Reporting Mechanisms on GitHub
Early Research Achievement (ERA) Track
Sushawapak Kancharoendee , Thanat Phichitphanphong , Chanikarn Jongyingyos Mahidol University, Brittany Reid Nara Institute of Science and Technology, Raula Gaikovina Kula Osaka University, Morakot Choetkiertikul Mahidol University, Thailand, Chaiyong Rakhitwetsagul Mahidol University, Thailand, Thanwadee Sunetnanta Mahidol University