pith. machine review for the scientific record. sign in

arxiv: 2604.26094 · v1 · submitted 2026-04-28 · 💻 cs.CR · cs.SE

Recognition: unknown

GenDetect: Generalizing Reactive Detection for Resilience Against Imitative DeFi Attack Cascade

Authors on Pith no claims yet

Pith reviewed 2026-05-07 12:21 UTC · model grok-4.3

classification 💻 cs.CR cs.SE
keywords attackdefiattacksdetectiongendetectinitiallogicanalysis
0
0 comments X

The pith

GenDetect generalizes reactive detection rules from one DeFi attack instance to catch imitative cascades, reporting 98% accuracy, 1% false positive rate, 3% false negative rate, and 56 newly discovered attacks.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

DeFi attacks on blockchains often succeed once and then get copied by other attackers who reuse the same logic with small tweaks. The paper notes that over 69 percent of such attacks show strong similarity to earlier ones. Traditional detection starts with alerts like unusual token flows or known bad addresses, but turning those alerts into working rules still needs people to manually inspect transaction traces, which takes too long. GenDetect tries to automate the step after the first attack is seen. It uses two observations: most DeFi code is public, so function names and logic can be understood automatically, and existing contract labels can strip away noise to keep only the parts that matter for the attack. The system then builds a general pattern that matches both the original attack and its variations. On historical data it reports high accuracy numbers and claims to have found dozens of attacks that were previously missed.

Core claim

GenDetect achieves ACC 98%, FPR 1%, FNR 3% and discovers 56 previously unrevealed attacks from the past three years.

Load-bearing premise

That high-fidelity semantic classification of function signatures from open-source code plus contract labels will reliably isolate attack intent and generalize across noisy, evasive traces without requiring per-attack manual tuning.

read the original abstract

As blockchain ecosystems grow, financially motivated attackers increasingly exploit decentralized finance (DeFi) protocols, causing frequent and severe losses. Unlike conventional cyberattacks, DeFi exploits propagate rapidly due to the transparent and composable nature of smart contracts. We identify a critical pattern, Imitative Attack Cascade: an initial successful exploit is quickly followed by mimicking transactions that reuse attack logic with minor modifications or parameter changes. Our empirical analysis shows that over 69% of DeFi attacks exhibit strong behavioral similarity to earlier incidents, often within hours or days of the initial attack. This exposes a fundamental limitation in current reactive detection. Initial attacks are typically flagged via heuristic alerts (Tornado Cash traces, anomalous nonce usage, exploiter labels), but turning these signals into detection rules requires manual validation and handcrafted trace analysis -- a labor-intensive, slow process that leaves follow-up attacks to spread. Our goal is to ensure that once an attack has been observed, even a single instance, it can be rapidly abstracted into an actionable, generalizable detection rule. We decompose the problem into two challenges: (I) abstracting the semantics of diverse, obscure function signatures, and (II) matching transaction logic in noisy, evasive traces. We leverage two insights: (i) the open-source nature of most DeFi protocols enables high-fidelity semantic classification of function signatures; (ii) contract labels isolate essential logic by filtering irrelevant calls and classifying attack intent. Building on these, we develop GenDetect, which achieves ACC 98%, FPR 1%, FNR 3% and discovers 56 previously unrevealed attacks from the past three years. Source code and dataset: https://github.com/NobodyIsAnonymous/GenDetect_ICSE2026

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Axiom & Free-Parameter Ledger

0 free parameters · 2 axioms · 0 invented entities

The approach depends on two domain assumptions about DeFi code and labeling; no free parameters or invented entities are mentioned in the abstract.

axioms (2)
  • domain assumption The open-source nature of most DeFi protocols enables high-fidelity semantic classification of function signatures
    Listed as insight (i) in the abstract
  • domain assumption Contract labels isolate essential logic by filtering irrelevant calls and classifying attack intent
    Listed as insight (ii) in the abstract

pith-pipeline@v0.9.0 · 5638 in / 1308 out tokens · 81271 ms · 2026-05-07T12:21:53.277197+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.