POSTER: Multi-Block Fusion Mechanism for Multi-label Vulnerability Detection in Smart Contracts
Abstract
References
Recommendations
SCVHunter: Smart Contract Vulnerability Detection Based on Heterogeneous Graph Attention Network
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringSmart contracts are integral to blockchain's growth, but their vulnerabilities pose a significant threat. Traditional vulnerability detection methods rely heavily on expert-defined complex rules that are labor-intensive and dificult to adapt to the ...
Improving Smart Contract Security with Contrastive Learning-based Vulnerability Detection
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringCurrently, smart contract vulnerabilities (SCVs) have emerged as a major factor threatening the transaction security of blockchain. Existing state-of-the-art methods rely on deep learning to mitigate this threat. They treat each input contract as an ...
GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringSmart contracts are prone to various vulnerabilities, leading to substantial financial losses over time. Current analysis tools mainly target vulnerabilities with fixed control- or data-flow patterns, such as re-entrancy and integer overflow. However, a ...
Comments
Information & Contributors
Information
Published In

- Chair:
- Jianying Zhou,
- Co-chair:
- Tony Q. S. Quek,
- Program Chairs:
- Debin Gao,
- Alvaro Cardenas
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Poster
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 87Total Downloads
- Downloads (Last 12 months)87
- Downloads (Last 6 weeks)16
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in