Skip to content

Modeling and formally enforcing role-based access control policies for smart contracts

License

Notifications You must be signed in to change notification settings

KASTEL-CSSDA/SolidityAccessControlEnforcement

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

22 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Modeling and Enforcing Access Control Policies for Smart Contracts

Due to the immutable nature of the blockchain platform, data can not be changed after it is initially submitted. The same property holds true for smart contracts, which cannot be modified after their deployment. This allows for an easier tracing of malicious behaviour but comes with the need for high expenses upfront since the correctness of the smart contract needs to be verified before the initial deploy. One security aspect that needs to be verified as early as possible is access control. Due to the public nature of the blockchain, every address on the chain can access every public function and read all variables. However, changes to the state variables of a contract should, in many cases, be restricted to certain addresses instead of every possible blockchain user. In a banking application for example, the functions to deposit or withdraw money are publicly available while the access to a certain account should be limited to the registered account holder.

To check this property as soon as possible during the development process, we develop the AccessControlMetamodel for modelling the role-based access control requirements on an architectural level as well as deriving formal specifications from these requirements with the AccessControlGenerator. For this, we combine model-driven software development (MDSD) using the Eclipse Modeling Framework (EMF) with formal methods and verification. To do so, we focus on defining the information needed to model access control policies on an architectural level as well as how the resulting elements can be connected. Additionally, we define how these policies can be translated into formal specifications that enforce the access control policies using verification tools like solc-verify & Slither. This allows the developer to see violations and possible security risks very early in the development process.

In a further step, the results of Slither and solc-verify should be transferred back to the modeled system. For this purpose, the obtained analysis data of the tools Slither and solc-verify are combined with the SolidityRoleAdapter. A worklist algorithm is used to resolve the dependencies. Role annotations, which are also included in this data, are used to calculate whether accesses from roles to variables occur that were not previously intended and modeled in the system. In the following the found role-relations can be returned with the MissingRoleRelationAdder into a copy of the original system. In this way, the result of the analysis can be illustrated by directly comparing the old and the modified system. It becomes clear which additional access rights have been introduced by the code.

Project Structure

  • Examples: contains the concrete instances of the example use cases and scenarios
  • Metamodel: Ecore / EMF Project containing the created metamodel as well as the generated .edit & .editor
  • Projects: the folder with all applications and plugins

The Projects include:

Installation

Installing the Metamodel & Generator Project

To employ the metamodel and the generator, you can use the included Eclipse projects. In the following, we will explain how to install and use them:

  1. Download Eclipse IDE 2021-09 and install the Eclipse Modelling Tools

  2. Start Eclipse and create a new workspace (or choose an already existing one)

  3. Under "Help" > "Install New Software..." click "Add" and enter add the following to installation sites (each needs to be a single entry and the name can be arbitrary):

    1. https://updatesite.mdsd.tools/metamodel-modeling-foundations/nightly/
    2. http://download.eclipse.org/modeling/mdt/ocl/updates/releases
    3. https://download.eclipse.org/modeling/tmf/xtext/updates/composite/marketplace/
    4. https://kit-sdq.github.io/updatesite/release/commons
  4. Afterwards choose "--All Available Sites--" in the drop-down menu next to the "Add..." button and install the following packages:

    1. MDSD.tools Modeling Foundations
    2. OCL All-In-One SDK
    3. Xtend & Xtend IDE
    4. SDQ Commons

    If a security warning is shown, just click "Install anyway". For completeness, you can view a list of all installed software packages as well as their version for a running eclipse configuration here: Needed projects

  5. Restart Eclipse (you will be prompted to do so)

  6. If you close the welcoming screen, the "Model Explorer" View should be open. If not, you can open it under "Window" > "Show View" > "Model Explorer".

  7. Import the Projects from the "AccessControlGenerator" and "Metamodel" folder as follows:

  8. In the "Model Explorer", navigate to "AccessControlMetamodel" > "model" > "AccessControlMetamodel.ecore" > "AccessControlMetamodel" and either "AccessControlSystem or "SmartContractModel".

If there are over 200 errors in the edu.kit.kastel.sdq.soliditycodegenerator folder that state that a certain sequence cannot be resolved to a type (e.g. "Â cannot be resolved to a type."), you need to right-click on the folder > "Properties" > "Resource" (should already be selected) and change the "Text file encoding" from "Inherited from container" to "Other:" > "UTF-8". Now apply and close the properties window and after a re-build there should be no errors left.

Installing Solc (Solidity Compiler)

To use slither and our implemented printer on a Solidity smart contract we must use Solc, so we employ Linux. To setup all necessary tools and packages, you need to follow these steps:

  1. Install Python 3.6+ with pip (no further instructions are given since it is often pre-installed or the installation depends on the linux system you are using)
  2. Install CMake
  3. Install Boost
  4. Install z3
    $ curl --silent "https://api.github.com/repos/Z3Prover/z3/releases/latest" | grep browser_download_url | grep -E 'ubuntu' | cut -d '"' -f 4 | wget -qi - -O z3.zip
    $ sudo sh -c ' unzip -p z3.zip "*bin/z3" > /usr/local/bin/z3'
    $ sudo chmod a+x /usr/local/bin/z3
  5. Clone the solidity project using:
    $ git clone --recursive https://github.com/ethereum/solidity.git
    $ cd solidity
  6. Run the following:
    $ mkdir build
    $ cd build
    $ cmake .. && make

All can be found in the official instructions

Installing the Slither printer

  1. Install Slither using the following command:
    $ git clone https://github.com/crytic/slither.git
    $ cd slither
    $ python3 setup.py install
    If for some reason that does not work, you can see some alternatives in Slithers documentation
  2. Copy the "influence_and_calls_plugin" folder to the same folder where slither was installed
  3. Navigate inside the "influence_and_calls_plugin" folder and open a new terminal
  4. Enter the following command to install the custom printer:
    $ python3 setup.py develop
  5. If no errors occured during the installation, the printer is now successfully installed. To test it, you can enter the following command in any folder that contains the Solidity file Filename that you want to analyze:
    $ slither <Filename>.sol --print influence-and-calls

Installing Solc-Verify

To install and to use the tool solc-verify use the official instruction to build and install it.

Using the Generator and Analysis Tools

Looking at the Examples & Using the Generator

To look at the created examples or create your own examples, as well as run the generator on these examples, the following steps need to be followed:

  1. In your set-up Eclipse environment, Right-click on either the "AccessControlGenerator" or the "AccessControlMetamodel.editor" folder and "Run As" > "1 Eclipse application". Now, a new Eclipse window should open.
  2. There should be no project open in the ProjectExplorer view, so you can click "Import projects..." and follow the same steps beginning with step 6 from the previous installation. This time, choose the "Examples" folder and select the only available option "Examples".
  3. Now you have the different folders for each example and use cases available
  4. To create a new metamodel instance, you need to make a right-click on any object in the Project Explorer and choose "New" > "Other...". In the newly opened window, naviagte to "Example EMF Model Creation Wizards", where you can select either the "AccessControlSystem Model" or the "SmartContractModel Model". Press "Next".
  5. Now you can choose the filename and its location. Press "Next".
  6. Now you can choose the "Model Object" and the "XML Encoding". For the "Model Object" you need to choose either "Access Control System" or "Smart Contract". The Encoding does not need to be changed ("UTF-8"). Finish the creation.
  7. Now the newly created file is opened and new elements can be added with a right-click. Their properties can be looked at and changed in the "Properties" view.
  8. If you want to generate Solidity code based on the models, you need to select at least one ".smartcontractmodel" and one ".accesscontrolsystem" file and right-click. Now the generator can be started by selecting "Access Control Generator" > "Generate Smart Contract with Access Control". Now a soundness check is started before the generation. If that check finds any problems, it communicates them back to the developer. In any case, a new folder called "gen" is created. The generator puts the created smart contracts there or a .log file if the soundness check fails.

Using the SolidityRoleAdapter

The following instruction is taken from its README:

Combines the results of slither and solcverify in a new output file. Input files must be located in the data folder to be found by the adapter.

A 'RoleAnnotation.txt', a 'SolcVerifyResults.txt', and all available 'SlitherResults<< - classname>>.txt' files must be provided. They are found for example in the Example Augur in its gen and results folder.

To execute the Parsers, simply run the SolidityRoleAdapter ('as Java Aplication'). Parsed Values are written to the console for an overview, which can be disabled by setting PRINT_CONSOLE_INFO to false.

The result is written to the 'SolidityRoleAdapter - Results.txt' file. Furthermore a JSON file is generated ('SolidityRoleAdapter - Results.json') which should be transferred to the next step: Using it to add the missing role relations to the model.

Using the MissingRoleRelationAdder

For this you have to put all of the AccessControlSystem and SmartContractModel files of the used model into the main folder of the project. For Example: Augur.accesscontrolsystem, Market.smartcontractmodel, MarketManagement.smartcontractmodel

After referencing the main file in the field 'FILE_URI_ACS' and the smartcontractmodel in the field 'FILE_URI_SCM' you have to provide the file 'SolidityRoleAdapter - Results.json' in the data folder of the project as well.

After running the MissingRoleRelationadder ('as Java Aplication') a new file is created in the main directory of the project called like specified in the field 'FILE_URI_UPDATED_ACS', for example: Augur_modified.accesscontrolsystem.

In the nested running eclipse instance, where the plugin to show AccessControlSystems is loaded, you can now analyse this model and the differences to its original.

About

Modeling and formally enforcing role-based access control policies for smart contracts

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Contributors 3

  •  
  •  
  •