{"title":"A Comprehensive Survey of Smart Contracts Vulnerability Detection Tools: Techniques and Methodologies","authors":"Niosha Hejazi, Arash Habibi Lashkari","doi":"10.1016/j.jnca.2025.104142","DOIUrl":null,"url":null,"abstract":"<div><div>The widespread use of blockchain technology has highlighted smart contracts as crucial components in digital transactions. However, their susceptibility to vulnerabilities poses significant challenges to security and dependability. This survey presents a comprehensive evaluation of 256 smart contracts analysis tools, categorized by methodologies such as fuzzing, machine learning, symbolic execution, and formal verification. Through theoretical and practical assessments, this paper offers insights into the current landscape of smart contracts vulnerability detection tools. Additionally, the paper systematically evaluates selected tools based on real-world datasets. The results show that while many tools perform well, they do not fully cover all vulnerability types accurately, highlighting the need for improved integration of detection methodologies. The findings aim to bridge gaps in existing methods, guiding future improvements for enhancing the security of blockchain applications.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"237 ","pages":"Article 104142"},"PeriodicalIF":7.7000,"publicationDate":"2025-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Network and Computer Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1084804525000396","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
The widespread use of blockchain technology has highlighted smart contracts as crucial components in digital transactions. However, their susceptibility to vulnerabilities poses significant challenges to security and dependability. This survey presents a comprehensive evaluation of 256 smart contracts analysis tools, categorized by methodologies such as fuzzing, machine learning, symbolic execution, and formal verification. Through theoretical and practical assessments, this paper offers insights into the current landscape of smart contracts vulnerability detection tools. Additionally, the paper systematically evaluates selected tools based on real-world datasets. The results show that while many tools perform well, they do not fully cover all vulnerability types accurately, highlighting the need for improved integration of detection methodologies. The findings aim to bridge gaps in existing methods, guiding future improvements for enhancing the security of blockchain applications.
期刊介绍:
The Journal of Network and Computer Applications welcomes research contributions, surveys, and notes in all areas relating to computer networks and applications thereof. Sample topics include new design techniques, interesting or novel applications, components or standards; computer networks with tools such as WWW; emerging standards for internet protocols; Wireless networks; Mobile Computing; emerging computing models such as cloud computing, grid computing; applications of networked systems for remote collaboration and telemedicine, etc. The journal is abstracted and indexed in Scopus, Engineering Index, Web of Science, Science Citation Index Expanded and INSPEC.