SCGformer: Smart contract vulnerability detection based on control flow graph and transformer
نویسندگان
چکیده
Abstract The security of smart contract has always been one the significant problems in blockchain. As shown previous studies, vulnerabilities contracts can lead to unpredictable losses. With rapid growth number contracts, more and data driven detection technologies based on machine learning have proposed. However, some state‐of‐the‐art approaches mainly rely source code contract. These methods are limited by openness version programming language. To address this problem, we propose a novel vulnerability method transformer constructing control flow graph (CFG) operation codes (opcodes), which shields difference various versions program Extensive experiments conducted evaluate effectiveness proposed authors' own collected dataset. experimental results show that achieves 94.36% accuracy detection, performs better than other methods.
منابع مشابه
Flexible Power Electronic Transformer for Power Flow Control Applications
This paper proposes a Flexible Power Electronic Transformer (FPET) for the application in the micro-grids. The low frequency transformer is usually used at the Point of Common Coupling (PCC) to connect the low voltage grid and utility network to each other. The conventional 50Hz transformer results in enhanced low voltage-grid power management system during grid-connected operation. In this pap...
متن کاملOverload Control in Smart Transformer-Fed Grid
Renewable energy resources and new loads—such as electric vehicles—challenge grid management. Among several scenarios, the smart transformer represents a solution for simultaneously managing lowand medium-voltage grids, providing ancillary services to the distribution grid. However, unlike conventional transformers, the smart transformer has a very limited overload capability, because the junct...
متن کاملEpileptic seizure detection based on The Limited Penetrable visibility graph algorithm and graph properties
Introduction: Epileptic seizure detection is a key step for both researchers and epilepsy specialists for epilepsy assessment due to the non-stationariness and chaos in the electroencephalogram (EEG) signals. Current research is directed toward the development of an efficient method for epilepsy or seizure detection based the limited penetrable visibility graph (LPVG) algorith...
متن کاملSmart Contract-Based Access Control for the Internet of Things
This paper investigates a critical access control issue in the Internet of Things (IoT). In particular, we propose a smart contract-based framework, which consists of multiple access control contracts (ACCs), one judge contract (JC) and one register contract (RC), to achieve distributed and trustworthy access control for IoT systems. Each ACC provides one access control method for a subject-obj...
متن کاملControl-Flow-Graph-Based Aspect Mining
Aspect mining tries to identify crosscutting concerns in existing systems and thus supports the adaption to an aspect-oriented design. This paper describes an automatic static aspect mining approach, where the control flow graphs of a program are investigated for recurring execution patterns based on different constraints, such as the requirement that the patterns have to exist in different cal...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IET blockchain
سال: 2023
ISSN: ['2634-1573']
DOI: https://doi.org/10.1049/blc2.12046