Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Smart Contract Vulnerability Detection based on Multi-scale Encoders

Version 1 : Received: 29 December 2023 / Approved: 29 December 2023 / Online: 3 January 2024 (08:25:24 CET)

A peer-reviewed article of this Preprint also exists.

Guo, J.; Lu, L.; Li, J. Smart Contract Vulnerability Detection Based on Multi-Scale Encoders. Electronics 2024, 13, 489. Guo, J.; Lu, L.; Li, J. Smart Contract Vulnerability Detection Based on Multi-Scale Encoders. Electronics 2024, 13, 489.

Abstract

Vulnerabilities in smart contracts may trigger serious security events, and the detection of smart contract vulnerabilities has become a significant problem. In this paper, by using the multi-scale cascade encoder architecture as the backbone, we propose a novel Multi-scale Encoder Vulnerability Detection (MEVD) approach to detect well-known high-risk vulnerabilities in smart contracts. Firstly, we use the gating mechanism to design a unique Surface Feature Encoder (SFE) to enrich the semantic information of code features. Then, by combining a Base Transformer Encoder (BTE) and a Detail CNN Encoder (DCE), we introduce a dual-branch encoder to capture the global structure and local detail features of the smart contract code, respectively. Finally, to focus the model's attention on vulnerability-related characteristics, we employ the Deep Residual Shrinkage Network (DRSN). Experimental results on three types of high-risk vulnerability datasets demonstrate performance compared to state-of-the-art methods, and our method achieves an average detection accuracy of 90%.

Keywords

Smart contract; deep learning; Multi-scale; vulnerability detection

Subject

Computer Science and Mathematics, Software

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.