Huang et al., 2021 - Google Patents
Hunting vulnerable smart contracts via graph embedding based bytecode matchingHuang et al., 2021
View PDF- Document ID
- 1194021393478563313
- Author
- Huang J
- Han S
- You W
- Shi W
- Liang B
- Wu J
- Wu Y
- Publication year
- Publication venue
- IEEE Transactions on Information Forensics and Security
External Links
Snippet
Smart contract vulnerabilities have attracted lots of concerns due to the resultant financial losses. Matching-based detection methods extrapolating known vulnerabilities to unknown have proven to be effective in other platforms. However, directly adopting the technique to …
- 238000000034 method 0 abstract description 28
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
- G06F11/3612—Software analysis for verifying properties of programs by runtime analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformations of program code
- G06F8/41—Compilation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Huang et al. | Hunting vulnerable smart contracts via graph embedding based bytecode matching | |
Chen et al. | Tokenscope: Automatically detecting inconsistent behaviors of cryptocurrency tokens in ethereum | |
Wang et al. | Detecting nondeterministic payment bugs in ethereum smart contracts | |
He et al. | {EOSAFE}: security analysis of {EOSIO} smart contracts | |
Liu et al. | S-gram: towards semantic-aware security auditing for ethereum smart contracts | |
Qian et al. | Smart contract vulnerability detection technique: A survey | |
Xue et al. | xfuzz: Machine learning guided cross-contract fuzzing | |
Cai et al. | Combine sliced joint graph with graph neural networks for smart contract vulnerability detection | |
Zhang et al. | BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation | |
Chen et al. | When chatgpt meets smart contract vulnerability detection: How far are we? | |
Padmanabhuni et al. | Auditing buffer overflow vulnerabilities using hybrid static–dynamic analysis | |
Le et al. | GuruWS: A hybrid platform for detecting malicious web shells and web application vulnerabilities | |
Huang et al. | Precise dynamic symbolic execution for nonuniform data access in smart contracts | |
Meng et al. | Assisting in auditing of buffer overflow vulnerabilities via machine learning | |
Liu et al. | Vulnerable Smart Contract Function Locating Based on Multi-Relational Nested Graph Convolutional Network | |
Li et al. | Eosioanalyzer: An effective static analysis vulnerability detection framework for eosio smart contracts | |
Li et al. | SmartFast: an accurate and robust formal analysis tool for Ethereum smart contracts | |
Pakshad et al. | A security vulnerability predictor based on source code metrics | |
Li et al. | VulHunter: Hunting Vulnerable Smart Contracts at EVM bytecode-level via Multiple Instance Learning | |
Fu et al. | Focus: Function clone identification on cross‐platform | |
Zhang et al. | Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts | |
Vidal et al. | Vulnerability detection techniques for smart contracts: A systematic literature review | |
Zhang et al. | BiAn: smart contract source code obfuscation | |
Qiu et al. | Vulnerability detection via multiple-graph-based code representation | |
Li et al. | COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart Contracts |