Vulnerability detection techniques for smart contracts: A systematic literature review
The number of applications supported by blockchain smart contracts has been greatly
increasing in recent years, with smart contracts now being used across several domains …
increasing in recent years, with smart contracts now being used across several domains …
An analytical review of the source code models for exploit analysis
Currently, enhancing the efficiency of vulnerability detection and assessment remains
relevant. We investigate a new approach for the detection of vulnerabilities that can be used …
relevant. We investigate a new approach for the detection of vulnerabilities that can be used …
Cobra: Interaction-aware bytecode-level vulnerability detector for smart contracts
The detection of vulnerabilities in smart contracts remains a significant challenge. While
numerous tools are available for analyzing smart contracts in source code, only about 1.79 …
numerous tools are available for analyzing smart contracts in source code, only about 1.79 …
Smart contracts auditing and multi-classification using machine learning algorithms: an efficient vulnerability detection in ethereum blockchain
Abstract The adoption of Smart Contracts has revolutionized industries like DeFi and supply
chain management, streamlining processes and enhancing transparency. However …
chain management, streamlining processes and enhancing transparency. However …
[HTML][HTML] Unveiling Smart Contracts Vulnerabilities: Toward Profiling Smart Contracts Vulnerabilities using Enhanced Genetic Algorithm and Generating Benchmark …
S HajiHosseinKhani, AH Lashkari, AM Oskui - Blockchain: Research and …, 2024 - Elsevier
With the advent of blockchain networks, there has been a transition from traditional contracts
to Smart Contracts (SCs), which are crucial for maintaining trust within these networks …
to Smart Contracts (SCs), which are crucial for maintaining trust within these networks …
Bi-thresholds-based unknown vulnerability detection in smart contracts using multi-classification model
P Li, G Wang, G Zhai, W Gu, X Li, X Liu… - Computers and Electrical …, 2024 - Elsevier
Ethereum's development has established a trusted environment for executing smart
contracts. However, smart contracts often involve significant financial transfers and become …
contracts. However, smart contracts often involve significant financial transfers and become …
A vulnerability detection framework with enhanced graph feature learning
Vulnerability detection in smart contracts is critical to secure blockchain systems. Existing
methods represent the bytecode as a graph structure and leverage graph neural networks to …
methods represent the bytecode as a graph structure and leverage graph neural networks to …
Smart Contract Design Pattern for Processing Logically Coherent Transaction Types
T Górski - Applied Sciences, 2024 - mdpi.com
Recent research shows that the source code of smart contracts is often cloned. The
processing of related types of transactions in blockchain networks results in the …
processing of related types of transactions in blockchain networks results in the …
Empirical Study of Move Smart Contract Security: Introducing MoveScan for Enhanced Analysis
Move, a programming language for smart contracts, stands out for its focus on security.
However, the practical security efficacy of Move contracts remains an open question. This …
However, the practical security efficacy of Move contracts remains an open question. This …
Towards a Sound Construction of EVM Bytecode Control-Flow Graphs
Ethereum enables the creation and execution of decentralized applications through smart
contracts, that are compiled to Ethereum Virtual Machine (EVM) bytecode. Once deployed in …
contracts, that are compiled to Ethereum Virtual Machine (EVM) bytecode. Once deployed in …