Affiliation:
1. Department of Electrical and Computer Engineering, Cleveland State University, Cleveland, OH 44115, USA
2. School of Reliability and Systems Engineering, Beihang University, Beijing 100191, China
3. School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China
Abstract
Stemming vulnerabilities out of a smart contract prior to its deployment is essential to ensure the security of decentralized applications. As such, numerous tools and machine-learning-based methods have been proposed to help detect vulnerabilities in smart contracts. Furthermore, various ways of encoding the smart contracts for analysis have also been proposed. However, the impact of these input methods has not been systematically studied, which is the primary goal of this paper. In this preliminary study, we experimented with four common types of input, including Word2Vec, FastText, Bag-of-Words (BoW), and Term Frequency–Inverse Document Frequency (TF-IDF). To focus on the comparison of these input types, we used the same deep-learning model, i.e., convolutional neural networks, in all experiments. Using a public dataset, we compared the vulnerability detection performance of the four input types both in the binary classification scenarios and the multiclass classification scenario. Our findings show that TF-IDF is the best overall input type among the four. TF-IDF has excellent detection performance in all scenarios: (1) it has the best F1 score and accuracy in binary classifications for all vulnerability types except for the delegate vulnerability where TF-IDF comes in a close second, and (2) it comes in a very close second behind BoW (within 0.8%) in the multiclass classification.
Funder
Beijing Natural Science Foundation
Reference33 articles.
1. Zhao, W. (2021). From Traditional Fault Tolerance to Blockchain, John Wiley & Sons.
2. Dhillon, V., Metcalf, D., Hooper, M., Dhillon, V., Metcalf, D., and Hooper, M. (2017). Blockchain Enabled Applications: Understand the Blockchain Ecosystem and How to Make it Work for You, Springer.
3. Understanding a revolutionary and flawed grand experiment in blockchain: The DAO attack;Mehar;J. Cases Inf. Technol. (JCIT),2019
4. Devlin, J., Chang, M.W., Lee, K., and Toutanova, K. (2018). Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv.
5. Systematic review of security vulnerabilities in Ethereum blockchain smart contract;Kushwaha;IEEE Access,2022
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献