ChainSniper: A Machine Learning Approach for Auditing Cross-Chain Smart Contracts

被引:1
作者
Tuan-Dung Tran [1 ]
Kiet Anh Vo [1 ]
Phan The Duy [1 ]
Nguyen Tan Cam [1 ]
Van-Hau Pham [1 ]
机构
[1] Vietnam Natl Univ, Univ Informat Technol, Ho Chi Minh City, Vietnam
来源
PROCEEDINGS OF THE 2024 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION TECHNOLOGY, ICIIT 2024 | 2024年
关键词
Cross-chain; Smart Contract; Vulnerability; Machine Learning;
D O I
10.1145/3654522.3654577
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart contracts are autonomous programs stored on blockchain networks that self-execute agreed terms in a transparent and accurate manner. Within cross-chain platforms, smart contracts facilitate interaction and exchange of data between diverse blockchains. However, the presence of vulnerabilities in smart contracts renders them susceptible to exploitation, jeopardizing security. Considerable research has focused on identifying and detecting such vulnerabilities, though existing approaches have yet to achieve comprehensive coverage. This paper presents ChainSniper, a sidechain-based framework integrating machine learning to automatically appraise vulnerabilities in cross-chain smart contracts. A comprehensive dataset, denoted "CrossChainSentinel", was compiled comprising 300 manually labeled code snippets. This dataset was leveraged to train machine learning models discerning vulnerable versus secure smart contracts. Experimental findings demonstrate the viability of machine learning methodologies for enhancing smart contract auditing within decentralized applications spanning multiple networks. Notable detection precision was achieved, substantiating ChainSniper's potential to strengthen security analysis through an automated and expansive evaluation of smart contract code.
引用
收藏
页码:223 / 230
页数:8
相关论文
共 32 条
[1]   A Survey of Attacks on Ethereum Smart Contracts (SoK) [J].
Atzei, Nicola ;
Bartoletti, Massimo ;
Cimoli, Tiziana .
PRINCIPLES OF SECURITY AND TRUST (POST 2017), 2017, 10204 :164-186
[2]   An Introduction to Machine Learning [J].
Badillo, Solveig ;
Banfai, Balazs ;
Birzele, Fabian ;
Davydov, Iakov I. ;
Hutchinson, Lucy ;
Kam-Thong, Tony ;
Siebourg-Polster, Juliane ;
Steiert, Bernhard ;
Zhang, Jitao David .
CLINICAL PHARMACOLOGY & THERAPEUTICS, 2020, 107 (04) :871-885
[3]   Smart Contract Vulnerability Detection Based on Deep Learning and Multimodal Decision Fusion [J].
Deng, Weichu ;
Wei, Huanchun ;
Huang, Teng ;
Cao, Cong ;
Peng, Yun ;
Hu, Xuan .
SENSORS, 2023, 23 (16)
[4]  
Miraz MH, 2019, Arxiv, DOI [arXiv:1902.04471, DOI 10.33166/AETIC.2019.01.005]
[5]  
Han P., 2023, Distrib. Ledger Technol., Res. Pract, V2, P1
[6]  
Hardjono T, 2021, Arxiv, DOI arXiv:2102.03933
[7]  
Haugum Terje, 2022, EASE 2022: The International Conference on Evaluation and Assessment in Software Engineering 2022, P347, DOI 10.1145/3530019.3531345
[8]   Smart Contract Vulnerability Analysis and Security Audit [J].
He, Daojing ;
Deng, Zhi ;
Zhang, Yuxing ;
Chan, Sammy ;
Cheng, Yao ;
Guizani, Nadra .
IEEE NETWORK, 2020, 34 (05) :276-282
[9]   Practical AgentChain: A compatible cross-chain exchange system [J].
Hei, Yiming ;
Li, Dawei ;
Zhang, Chi ;
Liu, Jianwei ;
Liu, Yizhong ;
Wu, Qianhong .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 130 :207-218
[10]  
Huang THD, 2018, Arxiv, DOI arXiv:1807.01868