Vulnerability Detection in Smart Contracts Using Deep Learning

Saroj Gopali, Z. Khan, Bipin Chhetri, Bimal Karki, A. Namin
{"title":"Vulnerability Detection in Smart Contracts Using Deep Learning","authors":"Saroj Gopali, Z. Khan, Bipin Chhetri, Bimal Karki, A. Namin","doi":"10.1109/COMPSAC54236.2022.00197","DOIUrl":null,"url":null,"abstract":"Various decentralized applications have deployed millions of smart contracts (SCs) on the Blockchain networks. SCs enable programmable transactions involving the transfer of monetary assets between peers on a Blockchain network without any need to a central authority. However, similar to any software program, SCs may contain security issues. Software se-curity engineers and researchers have already uncovered several Ethereum BlockChain and SC vulnerabilities. Still, researchers continuously discover many more security flaws in deployed SCs. Indeed, the popularity of SCs attracts adversaries to launch new attack vectors. Thus, efficient vulnerability detection is necessary. This paper lists broad known vulnerabilities in SCs and classifies them based on the multi-class categories such as Suicidal, Prodigal, Greedy, and Normal SCs. The paper adopts artificial recurrent neural network architecture such as Long Short-Term Memory (LSTM) and Temporal Convolutional Network (TCN) used in deep learning to identify and then classify vulnerable Scs.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPSAC54236.2022.00197","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Various decentralized applications have deployed millions of smart contracts (SCs) on the Blockchain networks. SCs enable programmable transactions involving the transfer of monetary assets between peers on a Blockchain network without any need to a central authority. However, similar to any software program, SCs may contain security issues. Software se-curity engineers and researchers have already uncovered several Ethereum BlockChain and SC vulnerabilities. Still, researchers continuously discover many more security flaws in deployed SCs. Indeed, the popularity of SCs attracts adversaries to launch new attack vectors. Thus, efficient vulnerability detection is necessary. This paper lists broad known vulnerabilities in SCs and classifies them based on the multi-class categories such as Suicidal, Prodigal, Greedy, and Normal SCs. The paper adopts artificial recurrent neural network architecture such as Long Short-Term Memory (LSTM) and Temporal Convolutional Network (TCN) used in deep learning to identify and then classify vulnerable Scs.
基于深度学习的智能合约漏洞检测
各种分散的应用程序已经在区块链网络上部署了数百万个智能合约(sc)。SCs实现了可编程交易,涉及在区块链网络上的对等点之间转移货币资产,而无需中央机构。然而,与任何软件程序一样,SCs可能包含安全问题。软件安全工程师和研究人员已经发现了几个以太坊区块链和SC漏洞。尽管如此,研究人员不断发现部署的超级计算机存在更多的安全漏洞。事实上,sc的普及吸引了对手发起新的攻击媒介。因此,需要进行有效的漏洞检测。本文列出了SCs中广泛已知的漏洞,并根据多类分类(如自杀性、浪子性、贪婪性和正常SCs)对其进行了分类。本文采用深度学习中使用的长短期记忆(LSTM)和颞卷积网络(TCN)等人工递归神经网络架构对脆弱Scs进行识别和分类。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信