[go: up one dir, main page]

Ye et al., 2024 - Google Patents

Detecting Unknown Threats in Smart Contracts With Domain Adaptation

Ye et al., 2024

Document ID
7031772859292111438
Author
Ye W
Yang L
Duan L
Li C
Ni W
Publication year
Publication venue
2024 IEEE International Conference on Software Services Engineering (SSE)

External Links

Snippet

Unknown smart contract vulnerabilities objectively exist in addition to common vulnerabilities, and their potential risks cannot be ignored. Therefore, it is crucial to enhance the model's ability to detect these unknown threats. Detection models are typically trained for …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • G06N5/025Extracting rules from data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformations of program code
    • G06F8/41Compilation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models

Similar Documents

Publication Publication Date Title
Le et al. Deepcva: Automated commit-level vulnerability assessment with deep multi-task learning
Tann et al. Towards safer smart contracts: A sequence learning approach to detecting security threats
Saccente et al. Project achilles: A prototype tool for static method-level vulnerability detection of java source code using a recurrent neural network
Jeon et al. AutoVAS: An automated vulnerability analysis system with a deep learning approach
Zhou et al. Vulnerability analysis of smart contract for blockchain-based IoT applications: A machine learning approach
Narayana et al. Automation and smart materials in detecting smart contracts vulnerabilities in blockchain using deep learning
Shakya et al. Smartmixmodel: machine learning-based vulnerability detection of solidity smart contracts
Wu et al. Code vulnerability detection based on deep sequence and graph models: A survey
Partenza et al. Automatic identification of vulnerable code: Investigations with an ast-based neural network
Wei et al. Toward identifying APT malware through API system calls
Sotgiu et al. Explainability-based debugging of machine learning for vulnerability discovery
Tang et al. Sevuldet: A semantics-enhanced learnable vulnerability detector
Mao et al. Explainable software vulnerability detection based on attention-based bidirectional recurrent neural networks
Gopali et al. Vulnerability detection in smart contracts using deep learning
Jain et al. An integrated deep learning model for Ethereum smart contract vulnerability detection
Duan et al. A new smart contract anomaly detection method by fusing opcode and source code features for blockchain services
EP4435649A1 (en) Apparatus and method for automatically analyzing malicious event log
Xu et al. Vulnerability Detection of Ethereum Smart Contract Based on SolBERT-BiGRU-Attention Hybrid Neural Model.
Pujar et al. Analyzing source code vulnerabilities in the D2A dataset with ML ensembles and C-BERT
KR102692350B1 (en) Malicious event log automatic analysis device and method
Imgrund et al. Broken promises: measuring confounding effects in learning-based vulnerability discovery
Liu et al. DL4SC: a novel deep learning-based vulnerability detection framework for smart contracts
Bu et al. Triplet-trained graph transformer with control flow graph for few-shot malware classification
He et al. Enhancing smart contract security: Leveraging pre‐trained language models for advanced vulnerability detection
Lodha et al. SQL injection and its detection using machine learning algorithms and BERT