Affiliation:
1. Department of Telecommunications, Faculty of Electrical Engineering and Communications, Brno University of Technology, Technicka 12, 616 00 Brno, Czech Republic
2. Electrical Engineering Unit, Faculty of Information Technology and Communication Sciences, Tampere University, 33720 Tampere, Finland
Abstract
The development of Distributed Ledger Technology (DLT) is pushing toward automating decentralized data exchange processes. One of the key components of this evolutionary step is facilitating smart contracts that, in turn, come with several additional vulnerabilities. Despite the existing tools for analyzing smart contracts, keeping these systems running and preserving performance while maintaining a decent level of security in a constantly increasing number of contracts becomes challenging. Machine Learning (ML) methods could be utilized for analyzing and detecting vulnerabilities in DLTs. This work proposes a new ML-based two-phase approach for the detection and classification of vulnerabilities in smart contracts. Firstly, the system’s operation is set up to filter the valid contracts. Secondly, it focuses on detecting a vulnerability type, if any. In contrast to existing approaches in this field of research, our algorithm is more focused on vulnerable contracts, which allows to save time and computing resources in the production environment. According to the results, it is possible to detect vulnerability types with an accuracy of 0.9921, F1 score of 0.9902, precision of 0.9883, and recall of 0.9921 within reasonable execution time, which could be suitable for integrating existing DLTs.
Funder
ane and Aatos Erkko Foundation through the CONVERGENCE of Humans and Machines project
Finnish Foundation for Technology Promotion
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Software
Reference28 articles.
1. Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract;Kushwaha;IEEE Access,2022
2. Deep Learning-based Malicious Smart Contract Detection Scheme for Internet of Things Environment;Gupta;Comput. Electr. Eng.,2022
3. Tann, W.J.W., Han, X.J., Gupta, S.S., and Ong, Y.S. (2018). Towards Safer Smart Contracts: A Sequence Learning Approach to Detecting Security Threats. arXiv.
4. Understanding a Revolutionary and Flawed Grand Experiment in Blockchain: The DAO Attack;Mehar;J. Cases Inf. Technol. (JCIT),2019
5. (2023, January 25). Parity Technologies. A Postmortem on the Parity Multi-Sig Library Self-Destruct. Parity Technologies. Available online: https://parity.io/blog/a-postmortem-on-the-parity-multi-sig-library-self-destruct/.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献