2022
DOI: 10.3390/electronics11193260
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Label Vulnerability Detection of Smart Contracts Based on Bi-LSTM and Attention Mechanism

Abstract: Smart contracts are decentralized applications running on blockchain platforms and have been widely used in a variety of scenarios in recent years. However, frequent smart contract security incidents have focused more and more attention on their security and reliability, and smart contract vulnerability detection has become an urgent problem in blockchain security. Most of the existing methods rely on fixed rules defined by experts, which have the disadvantages of single detection type, poor scalability, and h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 41 publications
0
4
0
Order By: Relevance
“…Random forest and support vector machines have been applied to smart contract vulnerability detection [19][20][21]. Recent works like [22][23][24] have expanded the scope by focusing on multiple types of vulnerabilities, offering a more comprehensive vulnerability detection mechanism.…”
Section: Machine Learning Methodsmentioning
confidence: 99%
“…Random forest and support vector machines have been applied to smart contract vulnerability detection [19][20][21]. Recent works like [22][23][24] have expanded the scope by focusing on multiple types of vulnerabilities, offering a more comprehensive vulnerability detection mechanism.…”
Section: Machine Learning Methodsmentioning
confidence: 99%
“…In [31], the authors detect multi-label vulnerabilities such as timestamp, reentrancy, TOD, integer underflow, and overflow using the Bi-LSTM with an accuracy of 88.12%. The author collects 5450 smart contracts from the etherscan website and detects multiple vulnerabilities in the smart contract such as integer underflow, integer overflow, reentrance, timestamp, and transaction order dependency.…”
Section: Literature Reviewmentioning
confidence: 99%
“…For example "0x00" value and its mnemonics value is STOP. The values that have the value of the mnemonic in Ethereum yellow paper are replaced [31], [53].…”
Section: B Data Preparationmentioning
confidence: 99%
“…In essence, Ethereum is a distributed (also decentralized) ledger that uses blockchain as its basic support technology, like Bitcoin. It supports the execution and invocation environments of SCs through a Turing-complete machine that is called the Ethereum Virtual Machine [5,7].…”
Section: Ethereummentioning
confidence: 99%