DeepFusion: Smart Contract Vulnerability Detection Via Deep Learning and Data Fusion

被引:0
|
作者
Chu, Hanting [1 ]
Zhang, Pengcheng [1 ]
Dong, Hai [2 ]
Xiao, Yan [3 ]
Ji, Shunhui [1 ]
机构
[1] Hohai Univ, Coll Comp Sci & Software Engn, Nanjing 211100, Peoples R China
[2] RMIT Univ, Sch Comp Technol, Melbourne, Vic 3000, Australia
[3] NUS Univ, Sch Comp, Singapore 119077, Singapore
基金
中国国家自然科学基金;
关键词
Smart contracts; Data mining; Security; Codes; Predictive models; Syntactics; Computer languages; Arithmetic; Accuracy; Training; Abstraction syntax tree (AST); data fusion; program slicing; smart contract; vulnerability detection; ATTACKS;
D O I
10.1109/TR.2024.3480010
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Given that smart contracts execute transactions worth hundreds of millions of dollars daily, the issue of smart contract security has attracted considerable attention over the past few years. Traditional methods for detecting vulnerabilities heavily rely on manually developed rules and features, leading to the problems of low accuracy, high false positives, and poor scalability. Although deep learning-inspired approaches were designed to alleviate the problem, most of them rely on monothetic features, which may result in information incompetence during the learning process. Furthermore, the lack of available labeled vulnerability datasets is also a major limitation. To address these issues, we collect and construct a dataset of five labeled smart contract vulnerabilities, and propose DeepFusion, a vulnerability detection method that fuses code representation information, including program slice information and abstraction syntax tree (AST) structured information. First, we develop automated tools to extract contract vulnerability slicing information from source code, and extract structured information from source code-converted AST. Second, code features and global structured features are fused into the data. Finally, the fused data are input into the Bidirectional Long Short-Term Memory+ Attention (BiLSTM+ATT) model for smart contract vulnerability detection. The BiLSTM model can capture long-term dependencies in both directions and is more suitable for processing serialized information generated by DeepFusion, while the attention mechanism can highlight the characteristic information of vulnerabilities. We conducted experiments via collecting a real smart contract dataset. The experimental results show that our method significantly outperforms the existing methods in detecting the vulnerabilities of reentrancy, timestamp dependence, integer overflow and underflow, Use tx.origin for authentication, and Unprotected Self-destruct Instruction by 6.36%, 6.42%, 16.5%, 21.29%, and 25.05%, respectively. To the best of our knowledge, the latter two vulnerabilities are the first to be detected using deep learning methods.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] A Universal and Efficient Multi-Modal Smart Contract Vulnerability Detection Framework for Big Data
    Lian, Wenjuan
    Bao, Zikang
    Zhang, Xinze
    Jia, Bin
    Zhang, Yang
    IEEE TRANSACTIONS ON BIG DATA, 2025, 11 (01) : 190 - 207
  • [42] Ponzi Scheme Detection in Smart Contract via Transaction Semantic Representation Learning
    Cai, Jie
    Li, Bin
    Zhang, Jiale
    Sun, Xiaobing
    IEEE TRANSACTIONS ON RELIABILITY, 2024, 73 (02) : 1117 - 1131
  • [43] Contractsentry: a static analysis tool for smart contract vulnerability detection
    Wang, Shiji
    Zhao, Xiangfu
    AUTOMATED SOFTWARE ENGINEERING, 2025, 32 (01)
  • [44] Smart Contract Vulnerability Detection Based on Symbolic Execution Technology
    Liu, Yiping
    Xu, Jie
    Cui, Baojiang
    CYBER SECURITY, CNCERT 2021, 2022, 1506 : 193 - 207
  • [45] Smart Contract Vulnerability Detection Using Graph Neural Networks
    Zhuang, Yuan
    Liu, Zhenguang
    Qian, Peng
    Liu, Qi
    Wang, Xiang
    He, Qinming
    PROCEEDINGS OF THE TWENTY-NINTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2020, : 3283 - 3290
  • [46] Smart contract vulnerability detection based on a bytecode critical path
    Yin, Guisheng
    Gao, Le
    Zhuang, Yuan
    Li, Jun
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2022, 43 (02): : 255 - 261
  • [47] Smart Contract Timestamp Vulnerability Detection Based on Code Homogeneity
    Wang, Weizhi
    Xia, Lei
    Zhang, Zhuo
    Meng, Xiankai
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2024, E107D (10) : 1362 - 1366
  • [48] QuadraCode AI: Smart Contract Vulnerability Detection with Multimodal Representation
    Upadhya, Jiblal
    Upadhyay, Kritagya
    Sainju, Arpan
    Poudel, Samir
    Hasan, Md Nahid
    Poudel, Khem
    Ranganathan, Jaishree
    2024 33RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, ICCCN 2024, 2024,
  • [49] SoK: A Unified Data Model for Smart Contract Vulnerability Taxonomies
    Ruggiero, Claudia
    Mazzini, Pietro
    Coppa, Emilio
    Lenti, Simone
    Bonomi, Silvia
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [50] Towards Auto Contract Generation and Ensemble-based Smart Contract Vulnerability Detection
    Puducherry, K. Lakshminarayana
    Puducherry, K. Sathiyamurthy
    INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING SYSTEMS, 2022, 13 (09) : 747 - 757