Author
Listed:
- Zhigang Xu
(Hubei University of Technology, China)
- Xingxing Chen
(Hubei University of Technology, China)
- Xinhua Dong
(Hubei University of Technology, China)
- Hongmu Han
(Hubei University of Technology, China)
- Zhongzhen Yan
(Hubei University of Technology, China)
- Kangze Ye
(Hubei University of Technology, China)
- Chaojun Li
(Hubei University of Technology, China)
- Zhiqiang Zheng
(Narcotics Control Bureau of Department of Public Security of Guangdong Province, China)
- Haitao Wang
(Narcotics Control Bureau of Department of Public Security of Guangdong Province, China)
- Jiaxi Zhang
(Narcotics Control Bureau of Department of Public Security of Guangdong Province, China)
Abstract
Efficient and convenient vulnerability detection for smart contracts is a key issue in the field of smart contracts. The earlier vulnerability detection for smart contracts mainly relies on static symbol analysis, which has high accuracy but low efficiency and is prone to path explosion. In this paper, the authors propose a static method for vulnerability detection based on deep learning. It first disassembles Ethereum smart contracts into opcode sequences and then converts the vulnerability detection problem into a natural language text classification problem. The word vector method is employed to map each opcode to a uniform vector space, and the opcode sequence matrix is trained by the TextCNN method to detect vulnerabilities. Furthermore, a code obfuscation method is given to enhance and balance the dataset, while three different opcode sequence generation methods are proposed to construct features. The experimental results verify that the average prediction accuracy of each smart contract exceeds 96%, and the average detection time is less than 0.1 s.
Suggested Citation
Zhigang Xu & Xingxing Chen & Xinhua Dong & Hongmu Han & Zhongzhen Yan & Kangze Ye & Chaojun Li & Zhiqiang Zheng & Haitao Wang & Jiaxi Zhang, 2023.
"An Efficient Code-Embedding-Based Vulnerability Detection Model for Ethereum Smart Contracts,"
International Journal of Data Warehousing and Mining (IJDWM), IGI Global, vol. 19(2), pages 1-23, January.
Handle:
RePEc:igg:jdwm00:v:19:y:2023:i:2:p:1-23
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jdwm00:v:19:y:2023:i:2:p:1-23. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.