Score: 0

Attack-Centric by Design: A Program-Structure Taxonomy of Smart Contract Vulnerabilities

Published: November 12, 2025 | arXiv ID: 2511.09051v1

By: Parsa Hedayatnia , Tina Tavakkoli , Hadi Amini and more

Potential Business Impact:

Finds hidden bugs in smart contracts.

Business Areas:
Penetration Testing Information Technology, Privacy and Security

Smart contracts concentrate high value assets and complex logic in small, immutable programs, where even minor bugs can cause major losses. Existing taxonomies and tools remain fragmented, organized around symptoms such as reentrancy rather than structural causes. This paper introduces an attack-centric, program-structure taxonomy that unifies Solidity vulnerabilities into eight root-cause families covering control flow, external calls, state integrity, arithmetic safety, environmental dependencies, access control, input validation, and cross-domain protocol assumptions. Each family is illustrated through concise Solidity examples, exploit mechanics, and mitigations, and linked to the detection signals observable by static, dynamic, and learning-based tools. We further cross-map legacy datasets (SmartBugs, SolidiFI) to this taxonomy to reveal label drift and coverage gaps. The taxonomy provides a consistent vocabulary and practical checklist that enable more interpretable detection, reproducible audits, and structured security education for both researchers and practitioners.

Country of Origin
🇮🇷 Iran

Page Count
42 pages

Category
Computer Science:
Cryptography and Security