GenDetect: Generalizing Reactive Detection for Resilience Against Imitative DeFi Attack Cascade
Bowen Cai, Weiheng Bai, Youshui Lu, Haoran Xu, Yuannan Yang + 2 more
TLDR
GenDetect rapidly generalizes reactive detection rules to stop imitative DeFi attack cascades, achieving 98% accuracy and finding 56 new attacks.
Key contributions
- Identifies "Imitative Attack Cascade" where 69%+ DeFi exploits mimic prior attacks rapidly.
- Proposes GenDetect, a system to rapidly abstract observed attacks into generalizable detection rules.
- Leverages open-source DeFi protocols and contract labels for semantic abstraction and logic matching.
- Achieves 98% accuracy, 1% FPR, 3% FNR, and discovers 56 previously unknown DeFi attacks.
Why it matters
DeFi exploits propagate rapidly via imitative attacks, causing severe losses as current detection is too slow. GenDetect offers a novel solution to quickly generalize detection rules from a single observed attack. This significantly enhances resilience against fast-spreading DeFi exploits by automating detection.
Original Abstract
As blockchain ecosystems grow, financially motivated attackers increasingly exploit decentralized finance (DeFi) protocols, causing frequent and severe losses. Unlike conventional cyberattacks, DeFi exploits propagate rapidly due to the transparent and composable nature of smart contracts. We identify a critical pattern, Imitative Attack Cascade: an initial successful exploit is quickly followed by mimicking transactions that reuse attack logic with minor modifications or parameter changes. Our empirical analysis shows that over 69% of DeFi attacks exhibit strong behavioral similarity to earlier incidents, often within hours or days of the initial attack. This exposes a fundamental limitation in current reactive detection. Initial attacks are typically flagged via heuristic alerts (Tornado Cash traces, anomalous nonce usage, exploiter labels), but turning these signals into detection rules requires manual validation and handcrafted trace analysis -- a labor-intensive, slow process that leaves follow-up attacks to spread. Our goal is to ensure that once an attack has been observed, even a single instance, it can be rapidly abstracted into an actionable, generalizable detection rule. We decompose the problem into two challenges: (I) abstracting the semantics of diverse, obscure function signatures, and (II) matching transaction logic in noisy, evasive traces. We leverage two insights: (i) the open-source nature of most DeFi protocols enables high-fidelity semantic classification of function signatures; (ii) contract labels isolate essential logic by filtering irrelevant calls and classifying attack intent. Building on these, we develop GenDetect, which achieves ACC 98%, FPR 1%, FNR 3% and discovers 56 previously unrevealed attacks from the past three years. Source code and dataset: https://github.com/NobodyIsAnonymous/GenDetect_ICSE2026
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.