Detecting Smart Contract Vulnerabilities with Combined Binary and Multiclass Classification

Author:

Mezina Anzhelika1ORCID,Ometov Aleksandr2ORCID

Affiliation:

1. Department of Telecommunications, Faculty of Electrical Engineering and Communications, Brno University of Technology, Technicka 12, 616 00 Brno, Czech Republic

2. Electrical Engineering Unit, Faculty of Information Technology and Communication Sciences, Tampere University, 33720 Tampere, Finland

Abstract

The development of Distributed Ledger Technology (DLT) is pushing toward automating decentralized data exchange processes. One of the key components of this evolutionary step is facilitating smart contracts that, in turn, come with several additional vulnerabilities. Despite the existing tools for analyzing smart contracts, keeping these systems running and preserving performance while maintaining a decent level of security in a constantly increasing number of contracts becomes challenging. Machine Learning (ML) methods could be utilized for analyzing and detecting vulnerabilities in DLTs. This work proposes a new ML-based two-phase approach for the detection and classification of vulnerabilities in smart contracts. Firstly, the system’s operation is set up to filter the valid contracts. Secondly, it focuses on detecting a vulnerability type, if any. In contrast to existing approaches in this field of research, our algorithm is more focused on vulnerable contracts, which allows to save time and computing resources in the production environment. According to the results, it is possible to detect vulnerability types with an accuracy of 0.9921, F1 score of 0.9902, precision of 0.9883, and recall of 0.9921 within reasonable execution time, which could be suitable for integrating existing DLTs.

Funder

ane and Aatos Erkko Foundation through the CONVERGENCE of Humans and Machines project

Finnish Foundation for Technology Promotion

Publisher

MDPI AG

Subject

Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Software

Reference28 articles.

1. Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract;Kushwaha;IEEE Access,2022

2. Deep Learning-based Malicious Smart Contract Detection Scheme for Internet of Things Environment;Gupta;Comput. Electr. Eng.,2022

3. Tann, W.J.W., Han, X.J., Gupta, S.S., and Ong, Y.S. (2018). Towards Safer Smart Contracts: A Sequence Learning Approach to Detecting Security Threats. arXiv.

4. Understanding a Revolutionary and Flawed Grand Experiment in Blockchain: The DAO Attack;Mehar;J. Cases Inf. Technol. (JCIT),2019

5. (2023, January 25). Parity Technologies. A Postmortem on the Parity Multi-Sig Library Self-Destruct. Parity Technologies. Available online: https://parity.io/blog/a-postmortem-on-the-parity-multi-sig-library-self-destruct/.

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3