An interpretable model for large-scale smart contract vulnerability detection

被引:0
作者
Feng, Xia [1 ]
Liu, Haiyang [2 ]
Wang, Liangmin [3 ]
Zhu, Huijuan [2 ]
Sheng, Victor S. [4 ]
机构
[1] City Univ Macau, Macau 999078, Peoples R China
[2] Jiangsu Univ, Zhenjiang 212013, Peoples R China
[3] Southeast Univ, Nanjing 211189, Peoples R China
[4] Texas Tech Univ, Lubbock, TX 79409 USA
来源
BLOCKCHAIN-RESEARCH AND APPLICATIONS | 2024年 / 5卷 / 03期
基金
中国国家自然科学基金;
关键词
Blockchain; Vulnerability detection; Smart contract;
D O I
10.1016/j.bcra.2024.100209
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart contracts hold billions of dollars in digital currency, and their security vulnerabilities have drawn a lot of attention in recent years. Traditional methods for detecting smart contract vulnerabilities rely primarily on symbol execution, which makes them time-consuming with high false positive rates. Recently, deep learning approaches have alleviated these issues but still face several major limitations, such as lack of interpretability and susceptibility to evasion techniques. In this paper, we propose a feature selection method for uplifting modeling. The fundamental concept of this method is a feature selection algorithm, utilizing interpretation outcomes to select critical features, thereby reducing the scales of features. The learning process could be accelerated significantly because of the reduction of the feature size. The experiment shows that our proposed model performs well in six types of vulnerability detection. The accuracy of each type is higher than 93% and the average detection time of each smart contract is less than 1 ms. Notably, through our proposed feature selection algorithm, the training time of each type of vulnerability is reduced by nearly 80% compared with that of its original.
引用
收藏
页数:10
相关论文
共 33 条
[1]   Decentralizing construction AI applications using blockchain technology [J].
Adel, Kareem ;
Elhakeem, Ahmed ;
Marzouk, Mohamed .
EXPERT SYSTEMS WITH APPLICATIONS, 2022, 194
[2]   Knapsack graph-based privacy checking for smart environments [J].
Alom, Zulfikar ;
Singh, Bikash Chandra ;
Aung, Zeyar ;
Azim, Mohammad Abdul .
COMPUTERS & SECURITY, 2021, 105
[3]  
[Anonymous], 2017, An in-depth look at the parity multisig bug
[4]  
[Anonymous], 2022, Remix
[5]   A blockchain-based approach to smart cargo transportation using UHF RFID [J].
Baygin, Mehmet ;
Yaman, Orhan ;
Baygin, Nursena ;
Karakose, Mehmet .
EXPERT SYSTEMS WITH APPLICATIONS, 2022, 188
[6]  
Bogatyy Ivan., 2017, Implementing Ethereum Trading Front-Runs on the Bancor Exchange in Python
[7]  
Buterin V., 2014, CISC VIS NETW IND GL, V3
[8]   SMOTE: Synthetic minority over-sampling technique [J].
Chawla, Nitesh V. ;
Bowyer, Kevin W. ;
Hall, Lawrence O. ;
Kegelmeyer, W. Philip .
2002, American Association for Artificial Intelligence (16)
[9]   XGBoost: A Scalable Tree Boosting System [J].
Chen, Tianqi ;
Guestrin, Carlos .
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, :785-794
[10]  
Cournapeau D., 2023, scikit-learn