DeepFusion: Smart Contract Vulnerability Detection Via Deep Learning and Data Fusion

被引:0
|
作者
Chu, Hanting [1 ]
Zhang, Pengcheng [1 ]
Dong, Hai [2 ]
Xiao, Yan [3 ]
Ji, Shunhui [1 ]
机构
[1] Hohai Univ, Coll Comp Sci & Software Engn, Nanjing 211100, Peoples R China
[2] RMIT Univ, Sch Comp Technol, Melbourne, Vic 3000, Australia
[3] NUS Univ, Sch Comp, Singapore 119077, Singapore
基金
中国国家自然科学基金;
关键词
Smart contracts; Data mining; Security; Codes; Predictive models; Syntactics; Computer languages; Arithmetic; Accuracy; Training; Abstraction syntax tree (AST); data fusion; program slicing; smart contract; vulnerability detection; ATTACKS;
D O I
10.1109/TR.2024.3480010
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Given that smart contracts execute transactions worth hundreds of millions of dollars daily, the issue of smart contract security has attracted considerable attention over the past few years. Traditional methods for detecting vulnerabilities heavily rely on manually developed rules and features, leading to the problems of low accuracy, high false positives, and poor scalability. Although deep learning-inspired approaches were designed to alleviate the problem, most of them rely on monothetic features, which may result in information incompetence during the learning process. Furthermore, the lack of available labeled vulnerability datasets is also a major limitation. To address these issues, we collect and construct a dataset of five labeled smart contract vulnerabilities, and propose DeepFusion, a vulnerability detection method that fuses code representation information, including program slice information and abstraction syntax tree (AST) structured information. First, we develop automated tools to extract contract vulnerability slicing information from source code, and extract structured information from source code-converted AST. Second, code features and global structured features are fused into the data. Finally, the fused data are input into the Bidirectional Long Short-Term Memory+ Attention (BiLSTM+ATT) model for smart contract vulnerability detection. The BiLSTM model can capture long-term dependencies in both directions and is more suitable for processing serialized information generated by DeepFusion, while the attention mechanism can highlight the characteristic information of vulnerabilities. We conducted experiments via collecting a real smart contract dataset. The experimental results show that our method significantly outperforms the existing methods in detecting the vulnerabilities of reentrancy, timestamp dependence, integer overflow and underflow, Use tx.origin for authentication, and Unprotected Self-destruct Instruction by 6.36%, 6.42%, 16.5%, 21.29%, and 25.05%, respectively. To the best of our knowledge, the latter two vulnerabilities are the first to be detected using deep learning methods.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] A Multimodal Deep Learning Approach for Efficient Vulnerability Detection in Smart Contracts
    Le Cong Trinh
    Vu Trung Kien
    Trinh Minh Hoang
    Nguyen Huu Quyen
    Nghi Hoang Khoa
    Phan The Duy
    Van-Hau Pham
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 3421 - 3426
  • [32] Deep learning-based methodology for vulnerability detection in smart contracts
    Wang, Zhibo
    Guoming, Liu
    Xu, Hongzhen
    You, Shengyu
    Ma, Han
    Wang, Hongling
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [33] Vulnerability Detection and Classification of Ethereum Smart Contracts Using Deep Learning
    Bani-Hani, Raed M.
    Shatnawi, Ahmed S.
    Al-Yahya, Lana
    FUTURE INTERNET, 2024, 16 (09)
  • [34] Small sample smart contract vulnerability detection method based on multi-layer feature fusion
    Fan, Jinlin
    He, Yaqiong
    Wu, Huaiguang
    COMPLEX & INTELLIGENT SYSTEMS, 2025, 11 (04)
  • [35] Smart contract vulnerability detection combined with multi-objective detection
    Zhang, Lejun
    Wang, Jinlong
    Wang, Weizheng
    Jin, Zilong
    Su, Yansen
    Chen, Huiling
    COMPUTER NETWORKS, 2022, 217
  • [36] Optimizing smart contract vulnerability detection via multi-modality code and entropy embedding
    Yuan, Dawei
    Wang, Xiaohui
    Li, Yao
    Zhang, Tao
    JOURNAL OF SYSTEMS AND SOFTWARE, 2023, 202
  • [37] Park: Accelerating Smart Contract Vulnerability Detection via Parallel-Fork Symbolic Execution
    Zheng, Peilin
    Zheng, Zibin
    Luo, Xiapu
    PROCEEDINGS OF THE 31ST ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2022, 2022, : 740 - 751
  • [38] Vulnerability Detection with Deep Learning
    Wu, Fang
    Wang, Jigang
    Liu, Jiqiang
    Wang, Wei
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 1298 - 1302
  • [39] SCVD-SA: A Smart Contract Vulnerability Detection Method based on Hybrid Deep Learning Model and Self-attention Mechanism
    Wang, Dongjie
    Chen, Jinfu
    Cai, Saihua
    Feng, Qiaowei
    Chen, Yuhao
    Hu, Xinyi
    2024 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING-COMPANION, SANER-C 2024, 2024, : 207 - 214
  • [40] A new scheme of vulnerability analysis in smart contract with machine learning
    Xing, Cipai
    Chen, Zhuorong
    Chen, Lexin
    Guo, Xiaojie
    Zheng, Zibin
    Li, Jin
    WIRELESS NETWORKS, 2024, 30 (07) : 6325 - 6334