SCGformer: Smart contract vulnerability detection based on control flow graph and transformer

被引:0
|
作者
Gong, KeXin [1 ]
Song, Xiangmei [1 ]
Wang, Na [1 ]
Wang, Chunyang [1 ]
Zhu, Huijuan [1 ]
机构
[1] School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China
来源
IET Blockchain | 2023年 / 3卷 / 04期
基金
中国国家自然科学基金;
关键词
Blockchain - Codes (symbols) - Ethereum - Flow graphs - Graphic methods - Network security;
D O I
10.1049/blc2.12046
中图分类号
学科分类号
摘要
The security of smart contract has always been one of the significant problems in blockchain. As shown in previous studies, vulnerabilities in smart contracts can lead to unpredictable losses. With the rapid growth of the number of smart contracts, more and more data driven detection technologies based on machine learning have been proposed. However, some state-of-the-art approaches mainly rely on the source code of smart contract. These methods are limited by the openness of the source code and the version of the programming language. To address this problem, we propose a novel vulnerability detection method based on transformer by constructing the control flow graph (CFG) of smart contracts operation codes (opcodes), which shields the difference of various versions of program language. Extensive experiments are conducted to evaluate the effectiveness of the proposed method on the authors' own collected dataset. The experimental results show that the proposed method achieves 94.36% accuracy in vulnerability detection, which performs better than other state-of-the-art methods. © 2023 The Authors. IET Blockchain published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology.
引用
收藏
页码:213 / 221
相关论文
共 50 条
  • [1] GRATDet: Smart Contract Vulnerability Detector Based on Graph Representation and Transformer
    Gong, Peng
    Yang, Wenzhong
    Wang, Liejun
    Wei, Fuyuan
    HaiLaTi, KeZiErBieKe
    Liao, Yuanyuan
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 76 (02): : 1439 - 1462
  • [2] Smart Contract Vulnerability Detection Using Graph Neural Networks
    Zhuang, Yuan
    Liu, Zhenguang
    Qian, Peng
    Liu, Qi
    Wang, Xiang
    He, Qinming
    [J]. PROCEEDINGS OF THE TWENTY-NINTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2020, : 3283 - 3290
  • [3] Peculiar: Smart Contract Vulnerability Detection Based on Crucial Data Flow Graph and Pre-training Techniques
    Wu, Hongjun
    Zhang, Zhuo
    Wang, Shangwen
    Lei, Yan
    Lin, Bo
    Qin, Yihao
    Zhang, Haoyu
    Mao, Xiaoguang
    [J]. 2021 IEEE 32ND INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2021), 2021, : 378 - 389
  • [4] Smart contract vulnerability detection based on semantic graph and residual graph convolutional networks with edge attention
    Chen, Da
    Feng, Lin
    Fan, Yuqi
    Shang, Siyuan
    Wei, Zhenchun
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2023, 202
  • [5] Smart Contract Vulnerability Detection Method Based on Feature Graph and Multiple Attention Mechanisms
    He, Zhenxiang
    Zhao, Zhenyu
    Chen, Ke
    Liu, Yanlin
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 79 (02): : 3023 - 3045
  • [6] HGAT: smart contract vulnerability detection method based on hierarchical graph attention network
    Chuang Ma
    Shuaiwu Liu
    Guangxia Xu
    [J]. Journal of Cloud Computing, 12
  • [7] A Novel Smart Contract Vulnerability Detection Method Based on Information Graph and Ensemble Learning
    Zhang, Lejun
    Wang, Jinlong
    Wang, Weizheng
    Jin, Zilong
    Zhao, Chunhui
    Cai, Zhennao
    Chen, Huiling
    [J]. SENSORS, 2022, 22 (09)
  • [8] HGAT: smart contract vulnerability detection method based on hierarchical graph attention network
    Ma, Chuang
    Liu, Shuaiwu
    Xu, Guangxia
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [9] Combine sliced joint graph with graph neural networks for smart contract vulnerability detection?
    Cai, Jie
    Li, Bin
    Zhang, Jiale
    Sun, Xiaobing
    Chen, Bing
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2023, 195
  • [10] A Graph Neural Network-Based Smart Contract Vulnerability Detection Method with Artificial Rule
    Wei, Ziyue
    Zheng, Weining
    Su, Xiaohong
    Tao, Wenxin
    Wang, Tiantian
    [J]. ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING, ICANN 2023, PT IV, 2023, 14257 : 241 - 252