2023
DOI: 10.1016/j.matpr.2021.04.125
|View full text |Cite
|
Sign up to set email alerts
|

Automation and smart materials in detecting smart contracts vulnerabilities in Blockchain using deep learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Recently, several works investigated using machine learning methods to analyze smart contracts [21,88,91,95,128,138,140,145,168,212,223,225,241]. Machine learning methods learn from data and build predictions.…”
Section: Machine Learning Methodsmentioning
confidence: 99%
“…Recently, several works investigated using machine learning methods to analyze smart contracts [21,88,91,95,128,138,140,145,168,212,223,225,241]. Machine learning methods learn from data and build predictions.…”
Section: Machine Learning Methodsmentioning
confidence: 99%
“…"Block reorganization can result in the original block being replaced in the blockchain when a miner produces a new block at the same block height as an existing block. This may result in a modification to the block number for a specific contract call or transaction [6]. d. The use of the delegatecall opcode, which enables a contract to execute code from another contract while preserving the context of the calling contract, is the reason behind the delegatecall vulnerability in smart contracts.…”
Section: Occurrence Of Vulnerabilitiesmentioning
confidence: 99%
“…Reentrancy vulnerability [10,15]: In which they can take on the control flow and modify your data that is not expected by the call function. There are numerous shapes this bug class might take.…”
Section: Fig 1 Ethereum Blockchain Networkmentioning
confidence: 99%
“…Lakshminarayana. K et al [15] experimented with basic classification methods, which are binary classification, multiclass classification, multi-label classification, and auto encoding techniques to detect smart contract vulnerabilities, which are reentrancy, DOS, and Tx.origin. The proposed paper also tries to improve detection results of the same vulnerabilities using a combination of two techniques, which are the contract snippets, n-gram features, and the XGBoost classification technique.…”
Section: Literature Workmentioning
confidence: 99%