Vulnerability detection techniques for smart contracts: A systematic literature review

FR Vidal, N Ivaki, N Laranjeiro - Journal of Systems and Software, 2024 - Elsevier
The number of applications supported by blockchain smart contracts has been greatly
increasing in recent years, with smart contracts now being used across several domains …

An analytical review of the source code models for exploit analysis

E Fedorchenko, E Novikova, A Fedorchenko… - Information, 2023 - mdpi.com
Currently, enhancing the efficiency of vulnerability detection and assessment remains
relevant. We investigate a new approach for the detection of vulnerabilities that can be used …

Cobra: Interaction-aware bytecode-level vulnerability detector for smart contracts

W Li, X Li, Z Li, Y Zhang - Proceedings of the 39th IEEE/ACM …, 2024 - dl.acm.org
The detection of vulnerabilities in smart contracts remains a significant challenge. While
numerous tools are available for analyzing smart contracts in source code, only about 1.79 …

Smart contracts auditing and multi-classification using machine learning algorithms: an efficient vulnerability detection in ethereum blockchain

S El Haddouti, M Khaldoune, M Ayache… - Computing, 2024 - Springer
Abstract The adoption of Smart Contracts has revolutionized industries like DeFi and supply
chain management, streamlining processes and enhancing transparency. However …

[HTML][HTML] Unveiling Smart Contracts Vulnerabilities: Toward Profiling Smart Contracts Vulnerabilities using Enhanced Genetic Algorithm and Generating Benchmark …

S HajiHosseinKhani, AH Lashkari, AM Oskui - Blockchain: Research and …, 2024 - Elsevier
With the advent of blockchain networks, there has been a transition from traditional contracts
to Smart Contracts (SCs), which are crucial for maintaining trust within these networks …

Bi-thresholds-based unknown vulnerability detection in smart contracts using multi-classification model

P Li, G Wang, G Zhai, W Gu, X Li, X Liu… - Computers and Electrical …, 2024 - Elsevier
Ethereum's development has established a trusted environment for executing smart
contracts. However, smart contracts often involve significant financial transfers and become …

A vulnerability detection framework with enhanced graph feature learning

J Cheng, Y Chen, Y Cao, H Wang - Journal of Systems and Software, 2024 - Elsevier
Vulnerability detection in smart contracts is critical to secure blockchain systems. Existing
methods represent the bytecode as a graph structure and leverage graph neural networks to …

Smart Contract Design Pattern for Processing Logically Coherent Transaction Types

T Górski - Applied Sciences, 2024 - mdpi.com
Recent research shows that the source code of smart contracts is often cloned. The
processing of related types of transactions in blockchain networks results in the …

Empirical Study of Move Smart Contract Security: Introducing MoveScan for Enhanced Analysis

S Song, J Chen, T Chen, X Luo, T Li, W Yang… - Proceedings of the 33rd …, 2024 - dl.acm.org
Move, a programming language for smart contracts, stands out for its focus on security.
However, the practical security efficacy of Move contracts remains an open question. This …

Towards a Sound Construction of EVM Bytecode Control-Flow Graphs

V Arceri, SM Merenda, G Dolcetti, L Negrini… - Proceedings of the 26th …, 2024 - dl.acm.org
Ethereum enables the creation and execution of decentralized applications through smart
contracts, that are compiled to Ethereum Virtual Machine (EVM) bytecode. Once deployed in …