QuadraCode AI: Smart Contract Vulnerability Detection with Multimodal Representation

被引:2
作者
Upadhya, Jiblal [2 ]
Upadhyay, Kritagya [1 ]
Sainju, Arpan [1 ]
Poudel, Samir [1 ]
Hasan, Md Nahid [2 ]
Poudel, Khem [1 ]
Ranganathan, Jaishree [1 ]
机构
[1] Middle Tennessee State Univ, Dept Comp Sci, Murfreesboro, TN 37132 USA
[2] Middle Tennessee State Univ, Dept Computat & Data Sci, Murfreesboro, TN 37132 USA
来源
2024 33RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, ICCCN 2024 | 2024年
关键词
Smart Contract; Multimodality; QuadraCode AI; Security; Concatenation; Cross Attention; Blockchain; Deep Learning;
D O I
10.1109/ICCCN61486.2024.10637655
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, Smart Contracts have gained in popularity, facilitating billions of US Dollars in daily transactions. However, the recent increase in smart contract vulnerabilities threatens to undermine trust in the technology. The study aims to detect and address potential vulnerabilities in smart contracts in blockchain technology through a comprehensive analysis of four principal modalities: Solidity source code, byte-code, opcode, and intermediate representations. This proactive identification of vulnerabilities can contribute to bolstering the security and dependability of blockchain-based systems. In this paper, we propose a novel multimodal Transformer architecture named QuadraCode AI, utilizing these four distinct modalities. Unlike traditional unimodal analysis, multimodal analysis can provide a more holistic understanding of both the semantic and syntactical contexts of smart contracts to identify underlying vulnerabilities. By employing advanced data fusion techniques such as cross-attention and concatenations across 12 different multimodal frameworks, our approach enhances the detection capabilities beyond traditional unimodal approach. Notably, the framework that integrates opcode with bytecode achieves an impressive average F score of 86%, demonstrating the effectiveness of our method.
引用
收藏
页数:9
相关论文
共 34 条
[1]  
A Etherscan, 2021, Etherscan-the ethereum blockchain explorer
[2]  
Arganaraz Mauro, 2020, 9 S LANG APPL TECHN, V83, P1
[3]   A Survey of Attacks on Ethereum Smart Contracts (SoK) [J].
Atzei, Nicola ;
Bartoletti, Massimo ;
Cimoli, Tiziana .
PRINCIPLES OF SECURITY AND TRUST (POST 2017), 2017, 10204 :164-186
[4]  
Bartoletti Massimo, 2017, Financial Cryptography and Data Security. FC 2017 International Workshops WAHC, BITCOIN, VOTING, WTSC, and TA. Revised Selected Papers: LNCS 10323, P494, DOI 10.1007/978-3-319-70278-0_31
[5]  
Buterin, 2013, ETHEREUM WHITE PAPER
[6]  
Dabao Wang, 2021, SBC '21: Proceedings of the Ninth International Workshop on Security in Blockchain and Cloud Computing, P23, DOI 10.1145/3457977.3460301
[7]   Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab [J].
Delmolino, Kevin ;
Arnett, Mitchell ;
Kosba, Ahmed ;
Miller, Andrew ;
Shi, Elaine .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2016, 9604 :79-94
[8]   Smart Contract Vulnerability Detection Based on Deep Learning and Multimodal Decision Fusion [J].
Deng, Weichu ;
Wei, Huanchun ;
Huang, Teng ;
Cao, Cong ;
Peng, Yun ;
Hu, Xuan .
SENSORS, 2023, 23 (16)
[9]  
Devlin J, 2019, Arxiv, DOI [arXiv:1810.04805, DOI 10.48550/ARXIV.1810.04805]
[10]  
Dhillon Vikram, 2017, The dao hacked. blockchain enabled applications: Understand the blockchain Ecosystem and How to Make it work for you, P67