Smart contract vulnerability detection method based on Bi-modal cross-attention mechanism

被引:0
作者
Chen, Jinfu [1 ,2 ]
Hu, Xinyi [1 ,2 ]
Cai, Saihua [1 ,2 ]
Min, Xirun [1 ,2 ]
机构
[1] School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang
[2] Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace, Jiangsu University, Zhenjiang
来源
Tongxin Xuebao/Journal on Communications | 2025年 / 46卷 / 06期
基金
中国国家自然科学基金;
关键词
Bi-modal; cross-attention; deep learning; smart contract; vulnerability detection;
D O I
10.11959/j.issn.1000-436x.2025107
中图分类号
学科分类号
摘要
To address the problem that existing deep learning methods for smart contract vulnerability detection rely on single-modal feature extraction and insufficient contextual information capture, leading to relatively low detection accuracy, a smart contract vulnerability detection method based on the Bi-modal cross-attention mechanism was proposed. A specific attention mechanism was designed that simultaneously analyzed both contract source code and bytecode, achieving bidirectional mapping and complementary enhancement between high-level semantic features in source code and low-level execution flows in bytecode, thereby enriching feature representation. Residual connections were introduced to effectively preserve and transmit original feature information, mitigating the vanishing gradient problem in deep network training. Extensive testing on public datasets demonstrates that the proposed method improves detection accuracy by more than 2% compared to baselines. Ablation experiments confirm that cross-modal feature fusion and the design of the attention mechanism work in synergy with each other, significantly improving the detection performance. © 2025 Editorial Board of Journal on Communications. All rights reserved.
引用
收藏
页码:218 / 232
页数:14
相关论文
共 30 条
[1]  
CHEN S J, MI H N, PING J, Et al., A blockchain consensus mechanism that uses proof of solution to optimize energy dispatch and trading, Nature Energy, 7, pp. 495-502, (2022)
[2]  
GAI K K, ZHANG Y, QIU M K, Et al., Blockchain-enabled service optimizations in supply chain digital twin, IEEE Transactions on Services Computing, 16, 3, pp. 1673-1685, (2023)
[3]  
GAI K K, WU Y L, ZHU L H, Et al., Privacy-preserving energy trading using consortium blockchain in smart grid, IEEE Transactions on Industrial Informatics, 15, 6, pp. 3548-3558, (2019)
[4]  
ZICHICHI M, CONTU M, FERRETTI S, Et al., LikeStarter: a smart-contract based social DAO for crowdfunding, Proceedings of the IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 313-318, (2019)
[5]  
TIKHOMIROV S, VOSKRESENSKAYA E, IVANITSKIY I, Et al., SmartCheck: static analysis of ethereum smart contracts, Proceedings of the 2018 IEEE/ACM 1st International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), pp. 9-16, (2018)
[6]  
LUU L, CHU D H, OLICKEL H, Et al., Making smart contracts smarter, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 254-269, (2016)
[7]  
TSANKOV P, DAN A, DRACHSLER-COHEN D, Et al., Securify: practical security analysis of smart contracts, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 67-82, (2018)
[8]  
FEIST J, GRIECO G, GROCE A., Slither: a static analysis framework for smart contracts, Proceedings of the 2019 IEEE/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), pp. 8-15, (2019)
[9]  
JIANG B, LIU Y, CHAN W K., ContractFuzzer: fuzzing smart contracts for vulnerability detection, Proceedings of the 2018 33rd IEEE/ ACM International Conference on Automated Software Engineering (ASE), pp. 259-269, (2018)
[10]  
SHARMA N, SHARMA S., A survey of Mythril, a smart contract security analysis tool for EVM bytecode, Indian Journal of Natural Products and Resources, 13, 75, pp. 39-41, (2022)