Vulnerability Detection and Classification of Ethereum Smart Contracts Using Deep Learning

Author:

Bani-Hani Raed M.1ORCID,Shatnawi Ahmed S.2ORCID,Al-Yahya Lana1

Affiliation:

1. Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid 22110, Jordan

2. Department of Software Engineering, Jordan University of Science and Technology, Irbid 22110, Jordan

Abstract

Smart contracts are programs that reside and execute on a blockchain, like any transaction. They are automatically executed when preprogrammed terms and conditions are met. Although the smart contract (SC) must be presented in the blockchain for the integrity of data and transactions stored within it, it is highly exposed to several vulnerabilities attackers exploit to access the data. In this paper, classification and detection of vulnerabilities targeting smart contracts are performed using deep learning algorithms over two datasets containing 12,253 smart contracts. These contracts are converted into RGB and Grayscale images and then inserted into Residual Network (ResNet50), Visual Geometry Group-19 (VGG19), Dense Convolutional Network (DenseNet201), k-nearest Neighbors (KNN), and Random Forest (RF) algorithms for binary and multi-label classification. A comprehensive analysis is conducted to detect and classify vulnerabilities using different performance metrics. The performance of these algorithms was outstanding, accurately classifying vulnerabilities with high F1 scores and accuracy rates. For binary classification, RF emerged in RGB images as the best algorithm based on the highest F1 score of 86.66% and accuracy of 86.66%. Moving on to multi-label classification, VGG19 stood out in RGB images as the standout algorithm, achieving an impressive accuracy of 89.14% and an F1 score of 85.87%. To the best of our knowledge, and according to the available literature, this study is the first to investigate binary classification of vulnerabilities targeting Ethereum smart contracts, and the experimental results of the proposed methodology for multi-label vulnerability classification outperform existing literature.

Publisher

MDPI AG

Reference60 articles.

1. Attacks and countermeasures on blockchains: A survey from layering perspective;Wen;Comput. Netw.,2021

2. A survey of secure internet of things in relation to blockchain;Alizadeh;J. Internet Serv. Inf. Secur. (JISIS),2020

3. The convergence of IoT and distributed ledger technologies (DLT): Opportunities, challenges, and solutions;Farahani;J. Netw. Comput. Appl.,2021

4. A survey on the adoption of blockchain in iot: Challenges and solutions;Uddin;Blockchain Res. Appl.,2021

5. Survey on blockchain based smart contracts: Applications, opportunities and challenges;Hewa;J. Netw. Comput. Appl.,2021

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3