Extended Abstract of Combine Sliced Joint Graph with Graph Neural Networks for Smart Contract Vulnerability Detection

被引:0
|
作者
Cai, Jie [1 ]
Li, Bin [1 ]
Zhang, Jiale [1 ]
Sun, Xiaobing [1 ]
Chen, Bing [2 ]
机构
[1] Yangzhou Univ, Sch Informat Engn, Yangzhou, Jiangsu, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Peoples R China
关键词
Smart Contract; Vulnerability Detection; Code Representation; Graph Neural Network;
D O I
10.1109/SANER56733.2023.00101
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Existing smart contract vulnerability detection efforts heavily rely on fixed rules defined by experts, which are inefficient and inflexible. To overcome the limitations of existing vulnerability detection approaches, we propose a GNN based approach. First, we construct a graph representation for a smart contract function with syntactic and semantic features by combining abstract syntax tree (AST), control flow graph (CFG), and program dependency graph (PDG). To further strengthen the presentation ability of our approach, we perform program slicing to normalize the graph and eliminate the redundant information unrelated to vulnerabilities. Then, we use a Bidirectional Gated Graph Neural-Network model with hybrid attention pooling to identify potential vulnerabilities in smart contract functions. Experiment results show that our approach can achieve 89.2% precision and 92.9% recall in smart contract vulnerability detection on our dataset and reveal the effectiveness and efficiency of our approach.
引用
收藏
页码:851 / 852
页数:2
相关论文
共 50 条
  • [1] Combine sliced joint graph with graph neural networks for smart contract vulnerability detection?
    Cai, Jie
    Li, Bin
    Zhang, Jiale
    Sun, Xiaobing
    Chen, Bing
    JOURNAL OF SYSTEMS AND SOFTWARE, 2023, 195
  • [2] Smart Contract Vulnerability Detection Using Graph Neural Networks
    Zhuang, Yuan
    Liu, Zhenguang
    Qian, Peng
    Liu, Qi
    Wang, Xiang
    He, Qinming
    PROCEEDINGS OF THE TWENTY-NINTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2020, : 3283 - 3290
  • [3] Combining Graph Neural Networks With Expert Knowledge for Smart Contract Vulnerability Detection
    Liu, Zhenguang
    Qian, Peng
    Wang, Xiaoyang
    Zhuang, Yuan
    Qiu, Lin
    Wang, Xun
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (02) : 1296 - 1310
  • [4] ContractGNN: Ethereum Smart Contract Vulnerability Detection Based on Vulnerability Sub-Graphs and Graph Neural Networks
    Wang, Yichen
    Zhao, Xiangfu
    He, Long
    Zhen, Zixian
    Chen, Haiyue
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (06): : 6382 - 6395
  • [5] Smart contract vulnerability detection based on semantic graph and residual graph convolutional networks with edge attention
    Chen, Da
    Feng, Lin
    Fan, Yuqi
    Shang, Siyuan
    Wei, Zhenchun
    JOURNAL OF SYSTEMS AND SOFTWARE, 2023, 202
  • [6] Smart Contract Vulnerability Detection Based on Multi Graph Convolutional Neural Networks with Self-attention
    Li, Jiale
    Yu, Xiao
    Yu, Jie
    Sun, Haoxin
    Sun, Mengdi
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT III, ICIC 2024, 2024, 14864 : 319 - 330
  • [7] Semantic-aware Graph Neural Network for Smart Contract Bytecode Vulnerability Detection
    Zhao B.
    Shangguan C.
    Peng X.
    An Y.
    Tong J.
    Yuan A.
    Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2022, 54 (02): : 49 - 55
  • [8] A Graph Neural Network-Based Smart Contract Vulnerability Detection Method with Artificial Rule
    Wei, Ziyue
    Zheng, Weining
    Su, Xiaohong
    Tao, Wenxin
    Wang, Tiantian
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING, ICANN 2023, PT IV, 2023, 14257 : 241 - 252
  • [9] SCG-Detector: A Smart Contract Vulnerability Detection Method Based on Graph Attention Networks
    Gu, Xi-Guo
    Wang, Zhi-Wei
    Chen, Xiang
    He, Qi-Fan
    Cui, Zhan-Qi
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2024, 52 (12): : 4101 - 4112
  • [10] Smart Contract Vulnerability Detection Based on Code Graph Embedding Approach
    Zhai, Yiwen
    Yang, Jia
    Zhang, Mingwu
    FRONTIERS IN CYBER SECURITY, FCS 2024, PT I, 2024, 2315 : 317 - 332