2023
DOI: 10.1155/2023/9212269
|View full text |Cite
|
Sign up to set email alerts
|

A Smart Contract Vulnerability Detection Model Based on Syntactic and Semantic Fusion Learning

Abstract: As a trusted decentralized application, smart contracts manage a large number of digital assets on the blockchain. Vulnerability detection of smart contracts is an important part of ensuring the security of digital assets. At present, many researchers extract features of smart contract source code for vulnerability detection based on deep learning methods. However, the current research mainly focuses on the single representation form of the source code, which cannot fully obtain the rich semantic and structura… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 32 publications
(34 reference statements)
0
1
0
Order By: Relevance
“…Smart contract source code analysis through semantic and syntactic methods has been carried out by [36] using a data set (5,000 smart contracts) produced from a study [37]. This source code analysis involves several combinations of techniques, such as control flow graph (CFG), vectorization, and feature extraction (TextCNN).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Smart contract source code analysis through semantic and syntactic methods has been carried out by [36] using a data set (5,000 smart contracts) produced from a study [37]. This source code analysis involves several combinations of techniques, such as control flow graph (CFG), vectorization, and feature extraction (TextCNN).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Thus, understanding Solidity concepts help to design secured and economical SCs. Hence, our research does not restrict vulnerability to unsecured access to Ether transfer statements (i.e., unprotected Ether withdrawal [15]), costly gas patterns [16], deprecated instructions (useful to identify vulnerabilities in old deployed SCs [17]), mathematical discrepancies [18], misusing SC's program variables [19] and Blockchain variables [20], resulting in miners' violations. But, we include any other coding flaw as minor as ignoring return values or devastating like reentrancy if it highlights a wicked intent.…”
Section: Introductionmentioning
confidence: 99%