The Bait on the Chain: Honeypots for Ethereum Security
Quodbach, Arthur
Promotor(s) :
Donnet, Benoît
;
Jacquot, Vincent
Date of defense : 30-Jun-2025/1-Jul-2025 • Permalink : http://hdl.handle.net/2268.2/23366
Details
| Title : | The Bait on the Chain: Honeypots for Ethereum Security |
| Translated title : | [fr] L'appât sur la chaîne : les honeypots pour la sécurité d'Ethereum |
| Author : | Quodbach, Arthur
|
| Date of defense : | 30-Jun-2025/1-Jul-2025 |
| Advisor(s) : | Donnet, Benoît
Jacquot, Vincent
|
| Committee's member(s) : | Leduc, Guy
Mathy, Laurent
|
| Language : | English |
| Number of pages : | 59 |
| Keywords : | [en] Ethereum [en] Honeypot |
| Discipline(s) : | Engineering, computing & technology > Computer science |
| Institution(s) : | Université de Liège, Liège, Belgique |
| Degree: | Master : ingénieur civil en informatique, à finalité spécialisée en "computer systems security" |
| Faculty: | Master thesis of the Faculté des Sciences appliquées |
Abstract
[en] Blockchain technology is one of the most significant innovations of the 21st century, providing
security and decentralization for many sectors such as finance, healthcare, and supply chain.
One of its most famous applications is the Ethereum blockchain, which introduced smart con-
tracts, self-executing code that allow the application of the terms of an agreement without the
need for intermediaries. However, the growth of Decentralized Finance (DeFi) has also brought
security challenges, as smart contracts are immutable once deployed and potentially vulnerable.
The objective of this thesis is to evaluate the effectiveness of Ethereum smart contract hon-
eypots. These contracts are designed to attract malicious users and collect information about
their behavior. This thesis aims to compare different honeypot designs, analyze attacker behav-
ior, and analyze the potential links between honeypot attackers and other malicious activities.
To achieve these objectives, an innovative smart contract honeypot was designed and de-
ployed along with other existing ones on the Ethereum blockchain. Additionally, a custom fund
flow analysis tool was developed to track the flow of assets starting from attacker addresses,
providing insights for analysis.
The results of this study revealed an address that accumulated approximately 400 ETH
through Freeway token transactions, which are accused of being a Ponzi scheme scam.
In conclusion, this thesis shows that honeypots can be an effective tool for studying attacker
behavior and contributing to the improvement of smart contract security.
File(s)
Document(s)
Cite this master thesis
The University of Liège does not guarantee the scientific quality of these students' works or the accuracy of all the information they contain.

Master Thesis Online


The Bait on the Chain.pdf