The rapid advancement of blockchain technology has precipitated the widespread adoption of Ethereum and smart contracts across a variety of sectors. However, this has also given rise to numerous fraudulent activities, with many speculators embedding Ponzi schemes within smart contracts, resulting in significant financial losses for investors. Currently, there is a lack of effective methods for identifying and analyzing such new types of fraudulent activities. This paper categorizes these scams into four structural types and explores the intrinsic characteristics of Ponzi scheme contract source code from a program analysis perspective. The Mythril tool is employed to conduct static and dynamic analyses of representative cases, thereby revealing their vulnerabilities and operational mechanisms. Furthermore, this paper employs shell scripts and command patterns to conduct batch detection of open-source smart contract code, thereby unveiling the common characteristics of Ponzi scheme smart contracts.
翻译:区块链技术的快速发展促使以太坊及智能合约在各行业得到广泛应用。然而,这也催生了大量欺诈活动,许多投机者将庞氏骗局嵌入智能合约中,导致投资者蒙受重大经济损失。目前,针对此类新型欺诈活动的识别与分析方法尚显不足。本文将这些骗局划分为四种结构类型,并从程序分析角度探讨了庞氏骗局合约源代码的内在特征。研究采用Mythril工具对典型案例进行静态与动态分析,从而揭示其漏洞与运作机制。此外,本文通过shell脚本与命令模式对开源智能合约代码进行批量检测,进而揭露庞氏骗局智能合约的普遍特征。