首页 | 本学科首页   官方微博 | 高级检索  
     

基于双通道的智能合约漏洞检测方法
引用本文:李鑫,杜景林,陈子文,王坤. 基于双通道的智能合约漏洞检测方法[J]. 科学技术与工程, 2023, 23(34): 14651-14659
作者姓名:李鑫  杜景林  陈子文  王坤
作者单位:南京信息工程大学
基金项目:国家自然科学基金(41575155)
摘    要:智能合约因漏洞而造成巨大的经济损失受到了广泛关注。针对现有的智能合约漏洞检测方法检测精度不高的问题,结合动态卷积神经网络(dynamic convolution neural network,DCNN)、双向门控递归单元(bidirectional gate recurrent unit,Bi GRU)、图传递神经网络(message passing neural network,MPNN)、注意力机制提出了基于双通道的漏洞检测方法DBTA(DCNN-BiGRU-MPNN-Attention)。首先利用Word2vec词嵌入技术和图归一化方法对数据进行预处理,将获得的词向量表示传入改进DCNN-BiGRU,并引入了R-Drop(regularized dropout for neural networks)正则化方法提高模型泛化能力。将图归一化表示传入图传递神经网络,通过两个通道分别提取序列特征和图特征,然后结合自注意力机制和交叉注意力机制捕捉不同特征间的相关性,从而突出关键特征对漏洞检测的重要性。最后通过全连接层得到输出向量,利用sigmoid函数输出结果。通过消融实验和对比实验表明...

关 键 词:区块链  智能合约  深度学习  漏洞检测
收稿时间:2023-01-01
修稿时间:2023-09-14

Smart Contract Vulnerability Detection Method based on Dual Channel
Li Xin,Du Jinglin,Chen Ziwen,Wang Kun. Smart Contract Vulnerability Detection Method based on Dual Channel[J]. Science Technology and Engineering, 2023, 23(34): 14651-14659
Authors:Li Xin  Du Jinglin  Chen Ziwen  Wang Kun
Affiliation:Nanjing University Of Information Science &technology
Abstract:The significant economic losses caused by vulnerabilities in smart contracts have attracted widespread attention. In order to address the issue of low detection accuracy in existing smart contract vulnerability detection methods, a dual-channel vulnerability detection method called DBTA was proposed, which combined Dynamic Convolutional Neural Network (DCNN), Bidirectional Gated Recurrent Unit (BiGRU), Message Passing Neural Network (MPNN), and attention mechanism. Firstly, the data was preprocessed using Word2vec word embedding technology and graph normalization methods. The obtained word vector representations were fed into the improved DCNN-BiGRU, and the R-Drop regularization method was introduced to enhance the model''s generalization ability. The graph normalization representations were fed into the message passing neural network, and the two channels extract sequence and graph features respectively. Then, self-attention mechanism and cross-attention mechanism were combined to capture the correlation between different features, highlighting the importance of key features in vulnerability detection. Finally, the output vector was obtained through fully connected layers, and the sigmoid function was used to output the results. Through ablation experiments and comparative experiments, the proposed method demonstrates high accuracy in detecting two different types of smart contract vulnerabilities.
Keywords:Blockchain   Smart contracts   Deep learning   Vulnerability detection
点击此处可从《科学技术与工程》浏览原始摘要信息
点击此处可从《科学技术与工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号