Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Enginee 2022
DOI: 10.1145/3540250.3558927
|View full text |Cite
|
Sign up to set email alerts
|

MANDO-GURU: vulnerability detection for smart contract source code by heterogeneous graph embeddings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 17 publications
0
1
0
Order By: Relevance
“…This tool primarily focuses on detecting two types of vulnerabilities: reentrancy vulnerabilities and timestamp dependencies. MANDO-GURU [126]: MANDO-GURU, introduced in 2022, is an intelligent smart contract vulnerability detection tool based on a heterogeneous graph attention neural network. It is designed to detect vulnerabilities in both coarse-grained contract-level and fine-grained line-level smart contracts.…”
Section: Open Source 411 Solidity Source Codementioning
confidence: 99%
“…This tool primarily focuses on detecting two types of vulnerabilities: reentrancy vulnerabilities and timestamp dependencies. MANDO-GURU [126]: MANDO-GURU, introduced in 2022, is an intelligent smart contract vulnerability detection tool based on a heterogeneous graph attention neural network. It is designed to detect vulnerabilities in both coarse-grained contract-level and fine-grained line-level smart contracts.…”
Section: Open Source 411 Solidity Source Codementioning
confidence: 99%
“…MANDO‐GURU, proposed by Nguyen et al. [34], represents the source code as a heterogeneous graph where nodes represent program elements and edges represent their relationships. Then, it uses embedding technology to transform the graph into vector representations and uses these vectors to train a classifier to detect vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…They learn by updating node representations using adjacent nodes, and variations like Recurrent Graph Neural Networks (RGNNs, or GRNNs) and Gated Graph Neural Networks (GGNN) add residual connections. Works using Graph Neural Networks (GNNs) and their variants include [5], [6], [19], [27]- [29], [32], [33], [41], [56], [59], [61], [61]. Graph Attention Networks (GATs) [35] are used by [16], [18], which include an attention mechanism to evaluate the importance of neighbouring nodes to one another.…”
Section: Related Work a Deep Learning For Vulnerability Discoverymentioning
confidence: 99%