Mining Characteristics of Vulnerable Smart Contracts across Lifecycle Stages

IET Blockchain Pub Date : 2025-07-07 DOI:10.1049/blc2.70016
Hongli Peng, Wenkai Li, Xiaoqi Li
{"title":"Mining Characteristics of Vulnerable Smart Contracts across Lifecycle Stages","authors":"Hongli Peng,&nbsp;Wenkai Li,&nbsp;Xiaoqi Li","doi":"10.1049/blc2.70016","DOIUrl":null,"url":null,"abstract":"<p>Smart contracts are the cornerstone of decentralized applications and financial protocols, extending digital currency transactions but also introducing serious security challenges that cause substantial economic losses. Existing solutions primarily target code-level vulnerabilities, which constitute only a portion of all security incidents. Though prior research conducts static analysis across contract lifecycles, they lack the characteristic analysis of vulnerabilities in each stage and the distinction between the vulnerabilities. This paper presents the first empirical study on the security of smart contracts throughout their lifecycle, including deployment and execution, upgrade, and destruction stages. We propose two feature categories: transaction features (contract lifespan and four dynamic features: transaction numbers, transaction amounts, neighbour numbers, and the number of old and new neighbours) and ego network properties (temporal network density and local clustering coefficient). These seven features capture behavioural patterns across dimensions, including activity duration, transaction frequency, financial liquidity, interaction breadth, dynamic interaction changes, and structural properties of the transaction network. Finally, five machine learning models—logistic regression, random forest, support vector machine, decision tree, and K-nearest neighbours—are used to identify vulnerabilities at different stages. Results show that vulnerable contracts exhibit distinct transaction features and ego network properties at different lifecycle stages.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"5 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.70016","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Blockchain","FirstCategoryId":"1085","ListUrlMain":"https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/blc2.70016","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Smart contracts are the cornerstone of decentralized applications and financial protocols, extending digital currency transactions but also introducing serious security challenges that cause substantial economic losses. Existing solutions primarily target code-level vulnerabilities, which constitute only a portion of all security incidents. Though prior research conducts static analysis across contract lifecycles, they lack the characteristic analysis of vulnerabilities in each stage and the distinction between the vulnerabilities. This paper presents the first empirical study on the security of smart contracts throughout their lifecycle, including deployment and execution, upgrade, and destruction stages. We propose two feature categories: transaction features (contract lifespan and four dynamic features: transaction numbers, transaction amounts, neighbour numbers, and the number of old and new neighbours) and ego network properties (temporal network density and local clustering coefficient). These seven features capture behavioural patterns across dimensions, including activity duration, transaction frequency, financial liquidity, interaction breadth, dynamic interaction changes, and structural properties of the transaction network. Finally, five machine learning models—logistic regression, random forest, support vector machine, decision tree, and K-nearest neighbours—are used to identify vulnerabilities at different stages. Results show that vulnerable contracts exhibit distinct transaction features and ego network properties at different lifecycle stages.

Abstract Image

Abstract Image

Abstract Image

跨生命周期阶段易受攻击智能合约的挖掘特征
智能合约是去中心化应用和金融协议的基石,它扩展了数字货币交易,但也带来了严重的安全挑战,造成了巨大的经济损失。现有的解决方案主要针对代码级漏洞,这些漏洞仅构成所有安全事件的一部分。以往的研究虽然跨合约生命周期进行静态分析,但缺乏对各个阶段漏洞的特征分析和漏洞之间的区分。本文首次对智能合约整个生命周期的安全性进行了实证研究,包括部署和执行、升级和销毁阶段。我们提出了两个特征类别:交易特征(合约寿命和四个动态特征:交易数量、交易金额、邻居数量和新旧邻居数量)和自我网络属性(时间网络密度和局部聚类系数)。这七个特征捕获了跨维度的行为模式,包括活动持续时间、交易频率、金融流动性、交互广度、动态交互变化和交易网络的结构属性。最后,采用逻辑回归、随机森林、支持向量机、决策树和k近邻五种机器学习模型来识别不同阶段的漏洞。结果表明,脆弱合约在不同生命周期阶段表现出不同的交易特征和自我网络特性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
1.80
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信