Recognition: unknown
GenDetect: Generalizing Reactive Detection for Resilience Against Imitative DeFi Attack Cascade
Pith reviewed 2026-05-07 12:21 UTC · model grok-4.3
The pith
GenDetect generalizes reactive detection rules from one DeFi attack instance to catch imitative cascades, reporting 98% accuracy, 1% false positive rate, 3% false negative rate, and 56 newly discovered attacks.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
GenDetect achieves ACC 98%, FPR 1%, FNR 3% and discovers 56 previously unrevealed attacks from the past three years.
Load-bearing premise
That high-fidelity semantic classification of function signatures from open-source code plus contract labels will reliably isolate attack intent and generalize across noisy, evasive traces without requiring per-attack manual tuning.
read the original abstract
As blockchain ecosystems grow, financially motivated attackers increasingly exploit decentralized finance (DeFi) protocols, causing frequent and severe losses. Unlike conventional cyberattacks, DeFi exploits propagate rapidly due to the transparent and composable nature of smart contracts. We identify a critical pattern, Imitative Attack Cascade: an initial successful exploit is quickly followed by mimicking transactions that reuse attack logic with minor modifications or parameter changes. Our empirical analysis shows that over 69% of DeFi attacks exhibit strong behavioral similarity to earlier incidents, often within hours or days of the initial attack. This exposes a fundamental limitation in current reactive detection. Initial attacks are typically flagged via heuristic alerts (Tornado Cash traces, anomalous nonce usage, exploiter labels), but turning these signals into detection rules requires manual validation and handcrafted trace analysis -- a labor-intensive, slow process that leaves follow-up attacks to spread. Our goal is to ensure that once an attack has been observed, even a single instance, it can be rapidly abstracted into an actionable, generalizable detection rule. We decompose the problem into two challenges: (I) abstracting the semantics of diverse, obscure function signatures, and (II) matching transaction logic in noisy, evasive traces. We leverage two insights: (i) the open-source nature of most DeFi protocols enables high-fidelity semantic classification of function signatures; (ii) contract labels isolate essential logic by filtering irrelevant calls and classifying attack intent. Building on these, we develop GenDetect, which achieves ACC 98%, FPR 1%, FNR 3% and discovers 56 previously unrevealed attacks from the past three years. Source code and dataset: https://github.com/NobodyIsAnonymous/GenDetect_ICSE2026
Editorial analysis
A structured set of objections, weighed in public.
Axiom & Free-Parameter Ledger
axioms (2)
- domain assumption The open-source nature of most DeFi protocols enables high-fidelity semantic classification of function signatures
- domain assumption Contract labels isolate essential logic by filtering irrelevant calls and classifying attack intent
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.