HGAT: smart contract vulnerability detection method based on hierarchical graph attention network
نویسندگان
چکیده
Abstract With the widespread use of blockchain, more and smart contracts are being deployed, their internal logic is getting sophisticated. Due to large false positive rate low detection accuracy most current methods, which heavily rely on already established criteria, certain additionally call for human secondary detection, resulting in efficiency. In this study, we propose HGAT, a hierarchical graph attention network-based model, order address aforementioned issues as well shortcomings contract vulnerability approaches. First, using Syntax Tree (AST) Control Flow Graph, functions abstracted into code graphs (CFG). Then abstract each node subgraph, extract features, utilize mechanism GAT, splice obtained vectors form features line statements these detect contracts. To create test data assess leverage open-source sample dataset. The findings experiment indicate that method can identify vulnerabilities quickly precisely than other techniques.
منابع مشابه
Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning
As the Internet becomes larger in scale, more complex in structure and more diversified in traffic, the number of crimes that utilize computer technologies is also increasing at a phenomenal rate. To react to the increasing number of computer crimes, the field of computer and network forensics has emerged. The general purpose of network forensics is to find malicious users or activities by gath...
متن کاملA Graph-Based Network-Vulnerability Analysis System
This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps,...
متن کاملMethod Based on GSCPN for Network Vulnerability Analysis
With the development of network security research, network attack modeling and analysis techniques have been paid more and more attention. A generalized stochastic colored Petri Net (GSCPN) Model is proposed. To each attack, a GSCPN model is constructed to describe the relation of components graphically. Algorithm to construct a composite attack and method for network vulnerability analysis are...
متن کاملAn Effective Method for Utility Preserving Social Network Graph Anonymization Based on Mathematical Modeling
In recent years, privacy concerns about social network graph data publishing has increased due to the widespread use of such data for research purposes. This paper addresses the problem of identity disclosure risk of a node assuming that the adversary identifies one of its immediate neighbors in the published data. The related anonymity level of a graph is formulated and a mathematical model is...
متن کاملVULNERABILITY ASSESSMENT OF WATER DISTRIBUTION NETWORKS: GRAPH THEORY METHOD
The main functional purpose of a water distribution network is to transport water from a source to several domestic and industrial units while at the same time satisfying various requirements on hydraulic response. All the water distribution networks perform two basic operations: firstly the water network needs to deliver adequate amounts of water to meet specific requirements, and secondly the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cloud Computing
سال: 2023
ISSN: ['2326-6538']
DOI: https://doi.org/10.1186/s13677-023-00459-x