Journal of South China University of Technology(Natural Science Edition) ›› 2023, Vol. 51 ›› Issue (5): 36-44.doi: 10.12141/j.issn.1000-565X.220167
Special Issue: 2023年计算机科学与技术
• Computer Science & Technology • Previous Articles Next Articles
LU Lu LAI Jinxiong
Received:
2022-03-30
Online:
2023-05-25
Published:
2022-11-15
Contact:
陆璐(1971-),男,博士,教授,主要从事计算机视觉和软件质量保障研究。
E-mail:lul@scut.edu.cn
About author:
陆璐(1971-),男,博士,教授,主要从事计算机视觉和软件质量保障研究。
Supported by:
CLC Number:
LU Lu, LAI Jinxiong. Smart Contract Vulnerability Detection Method Based on Capsule Network and Attention Mechanism[J]. Journal of South China University of Technology(Natural Science Edition), 2023, 51(5): 36-44.
Table 1
Comparison of precision, recall, F1 score and accuracy among eight methods"
实验方法 | rp | rr | F1 | ra |
---|---|---|---|---|
Mythril | 1.000 0 | 0.561 6 | 0.719 2 | 0.896 0 |
SmartCheck | 1.000 0 | 0.428 6 | 0.600 0 | 0.852 4 |
Oyente | 1.000 0 | 0.458 0 | 0.628 3 | 0.886 3 |
Securify | 1.000 0 | 0.567 8 | 0.724 3 | 0.915 6 |
SmartEmbed | 0.831 4 | 0.652 3 | 0.731 0 | 0.814 6 |
TMP | 0.881 5 | 0.923 5 | 0.902 1 | 0.935 6 |
AWD-LSTM | 0.901 4 | 0.910 3 | 0.905 8 | 0.910 0 |
CapsNet-Att | 0.954 2 | 0.935 6 | 0.944 8 | 0.971 5 |
1 | DHILLON V, METCALF D, HOOPER M .The DAO hacked[M]∥ Blockchain enabled applications.Berkeley:Apress,2017:67-78. |
2 | DANNEN C .Introducing Ethereum and solidity[M].Berkeley:Apress,2017:69-88. |
3 | LUU L, CHU D H, OLICKEL H,et al .Making smart contracts smarter[C]∥ Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.Vienna:ACM,2016:254-269. |
4 | JIANG B, LIU Y, CHAN W K .ContractFuzzer:fuzzing smart contracts for vulnerability detection[C]∥ Proceedings of 2018 the 33rd IEEE/ACM International Conference on Automated Software Engineering.Montpellier:IEEE,2018:259-269. |
5 | KALRA S, GOEL S, DHAWAN M,et al .ZEUS:analyzing safety of smart contracts[C]∥ Proceedings of 2018 Network and Distributed Systems Security Symposium.San Diego:Internet Society,2018:1-12. |
6 | LATTNER C, ADVE V .LLVM:A compilation framework for lifelong program analysis and transformation[C]∥ Proceedings of 2004 International Symposium on Code Generation and Optimization.San Jose:IEEE,2004:1-12. |
7 | GURFINKEL A, KAHSAI T, NAVAS J A .SeaHorn:a framework for verifying C programs (competition contribution)[C]∥ Proceedings of the 21st International Conference on Tools and Algorithms for the Construction and Analysis of Systems.London:Springer,2015:447-450. |
8 | ZHUANG Y, LIU Z, QIAN P,et al .Smart contract vulnerability detection using graph neural network[C]∥ Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence.Yokohama:International Joint Conferences on Artificial Intelligence,2020:3283-3290. |
9 | LIU Z, QIAN P, WANG X,et al .Combining graph neural networks with expert knowledge for smart contract vulnera bility detection[J].IEEE Transactions on Knowledge & Data Engineering,2021,35(2):1296-1310. |
10 | 沈晨凯 .基于深度学习的智能合约漏洞检测方法研究[D].武汉:武汉大学,2021. |
11 | WANG W, SONG J, XU G,et al .ContractWard:automated vulnerability detection models for Ethereum smart contracts[J].IEEE Transactions on Network Science and Engineering,2020,8(2):1133-1144. |
12 | TANN W J W, HAN X J, GUPTA S S,et al .Towards safer smart contracts:a sequence learning approach to detecting security threats[EB/OL]. (2018-11-16)[2022-03-30].. |
13 | SABOUR S, FROSST N, HINTON G E .Dynamic routing between capsules[C]∥ Proceedings of the 31st International Conference on Neural Information Processing Systems.Long Beach:ACM,2017:3859-3869. |
14 | SHAW P, USZKOREIT J, VASWANI A .Self-attention with relative position representations[C]∥ Proceedings of 2018 Conference of the North American Chapter of the Association for Computational Linguistics:Human Language Technologies.New Orleans:Association for Computational Linguistics,2018:464-468. |
15 | ZHAO W, YE J, YANG M,et al .Investigating capsule networks with dynamic routing for text classification[C]∥ Proceedings of 2018 Conference on Empirical Methods in Natural Language Processing.Brussels:Association for Computational Linguistics,2018:3110-3119. |
16 | DURIEUX T, FERREIRA J F, ABREU R,et al .Empirical review of automated analysis tools on 47587 Ethereum smart contracts[C]∥ Proceedings of the 42nd International Conference on Software Engineering.Seoul:Association for Computing Machinery,2020:530-541. |
17 | CHEN J, XIA X,LO D,et al .Defining smart contract defects on Ethereum[J].IEEE Transactions on Software Engineering,2022,48(1):327-345. |
18 | MUELLER B .Mythril:a reversing and bug hunting framework for the Ethereum blockchain[EB/OL].(2017-11-08)[2022-03-30].. |
19 | TIKHOMIROV S, VOSKRESENSKAYA E, IVANITSKIY I,et al .SmartCheck:static analysis of Ethereum smart contracts[C]∥ Proceedings of 2018 IEEE/ACM the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain.Gothenburg:IEEE,2018:9-16. |
20 | TSANKOV P, DAN A, DRACHSLER-COHEN D,et al .Securify:practical security analysis of smart contracts[C]∥ Proceedings of 2018 ACM SIGSAC Conference on Computer and Communications Security.Toronto:ACM,2018:67-82. |
21 | GAO Z, JAYASUNDARA V, JIANG L,et al .SmartEmbed:a tool for clone and bug detection in smart contracts through structural code embedding[C]∥ Proceedings of 2019 IEEE International Conference on Software Maintenance and Evolution.Cleveland:IEEE,2019:394-397. |
22 | GOGINENI A K, SWAYAMJYOTI S, SAHOO D,et al .Multi-class classification of vulnerabilities in smart contracts using AWD-LSTM,with pre-trained encoder inspired from natural language processing[J].IOP SciNotes,2020,1(3):035002/1-6. |
[1] | HU Yongjian, ZHUO Sichao, LIU Beibei, WANG Yufei, LI Jicheng. Improvement of Cross-Dataset Performance of Face Forgery Detection Based on Multi-Scale Spatiotemporal Features and Tampering Probabilities [J]. Journal of South China University of Technology(Natural Science Edition), 2024, 52(6): 110-119. |
[2] | ZHOU Lang, FAN Kun, QU Hua, et al. Forest Fire Recognition by Improved EfficientNet-E Model Based on ECA Attention Mechanism [J]. Journal of South China University of Technology(Natural Science Edition), 2024, 52(2): 42-49. |
[3] | QIANG Ruiru, ZHAO Xiaoqiang. A Small Sample Rolling Bearing Fault Diagnosis Method Based on Gramian Angular Difference Field and Generative Adversarial Network [J]. Journal of South China University of Technology(Natural Science Edition), 2024, 52(10): 64-75. |
[4] | YANG Chunling, CHEN Wenjun, LIU Jiahui. Feature-Space Optimization-Inspired and Multi-Hypothesis Cross-Attention Reconstruction Neural Network for Video Compressive Sensing [J]. Journal of South China University of Technology(Natural Science Edition), 2024, 52(10): 9-21. |
[5] | TIAN Sheng, SONG Lin, ZHAO Kailong. Point Cloud Classification Based on Offset Attention Mechanism and Multi-Feature Fusion [J]. Journal of South China University of Technology(Natural Science Edition), 2024, 52(1): 100-109. |
[6] | LI Jiachun, LI Bowen, LIN Weiwei. AdfNet: An Adaptive Deep Forgery Detection Network Based on Diverse Features [J]. Journal of South China University of Technology(Natural Science Edition), 2023, 51(9): 82-89. |
[7] | LI Haiyan, YIN Haolin, LI Peng, et al.. Image Inpainting Algorithm Based on Dense Feature Reasoning and Mix Loss Function [J]. Journal of South China University of Technology(Natural Science Edition), 2023, 51(9): 99-109. |
[8] | GUO Enqiang, FU Xinsha. Dropped Object Detection Method Based on Feature Similarity Learning [J]. Journal of South China University of Technology(Natural Science Edition), 2023, 51(6): 30-41. |
[9] | LIU Yupeng, ZHANG Lei. Cognitive Diagnosis Model Integrating Forgetting and Importance of Knowledge Points [J]. Journal of South China University of Technology(Natural Science Edition), 2023, 51(5): 54-62. |
[10] | ZHAO Rongchao, WU Baili, CHEN Zhuyun, et al. Graph Neural Network for Fault Diagnosis with Multi-Scale Time-Spatial Information Fusion Mechanism [J]. Journal of South China University of Technology(Natural Science Edition), 2023, 51(12): 42-52. |
[11] | WO Yan, LIANG Jiyun, HAN Guoqiang. A cross-modal face retrieval method based on metric learning [J]. Journal of South China University of Technology(Natural Science Edition), 2022, 50(6): 1-9. |
[12] | HUANG Min QI Haitao JIANG Chunlin. Coupled Collaborative Filtering Model Based on Attention Mechanism [J]. Journal of South China University of Technology(Natural Science Edition), 2021, 49(7): 59-65. |
[13] | LIU Huiting, LI Yinjie, GUO Lingling, et al. Tightly Coupled Recommendation Algorithm Based on Heterogeneous Information Networks [J]. Journal of South China University of Technology (Natural Science Edition), 2021, 49(7): 66-75. |
[14] | IKA Novita Dewi, CAI Xiaoling, et al. Drug-Drug Interaction Extraction Model Combining Category Keywords with Attention Mechanism [J]. Journal of South China University of Technology (Natural Science Edition), 2021, 49(1): 10-17. |
[15] | LIU Huiting, JI Qiang, LIU Huimin, et al. Joint Deep Recommendation Model Based on Double-Layer Attention Mechanism [J]. Journal of South China University of Technology (Natural Science Edition), 2020, 48(6): 97-105. |
Viewed | ||||||||||||||||||||||||||||||||||||||||||||||||||
Full text 340
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||
Abstract 507
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||