Reentrancy vulnerability detection based on graph convolutional networks and expert patterns under subspace mapping

Longtao Guo, Huakun Huang, Lingjun Zhao, Peiliang Wang, Shan Jiang, Chunhua Su

Research output: Journal article publicationJournal articleAcademic researchpeer-review

2 Citations (Scopus)

Abstract

Smart contracts with automatic execution capability provide a vast development space for transactions in Blockchain. However, due to the vulnerabilities in smart contracts, Blockchain has suffered huge economic losses, which greatly undermines people's trust in Blockchain and smart contracts. In this paper, we explore a vulnerability detection method based on graph neural networks and combine both contract source code and opcode. The structure of the method consists of four modules, i.e., preprocessing, subspace mapping, feature extraction, and detection modules. In the feature mapping module, we use a multi-subspace mapping approach to explore the impact of different subspace mappings on the detection method. For reentrancy vulnerability, we conducted extensive experiments. The experiments prove that our method achieves 95% accuracy and 94% F1-Score on average.

Original languageEnglish
Article number103894
Pages (from-to)1-9
JournalComputers and Security
Volume142
DOIs
Publication statusPublished - Jul 2024

Keywords

  • Blockchain
  • Graph neural network
  • Smart contract
  • Subspace mapping
  • Vulnerability detection

ASJC Scopus subject areas

  • General Computer Science
  • Law

Fingerprint

Dive into the research topics of 'Reentrancy vulnerability detection based on graph convolutional networks and expert patterns under subspace mapping'. Together they form a unique fingerprint.

Cite this