
Research Article
Smart Contract Vulnerability Detection Based on Dual Attention Graph Convolutional Network
@INPROCEEDINGS{10.1007/978-3-030-92638-0_20, author={Yuqi Fan and Siyuan Shang and Xu Ding}, title={Smart Contract Vulnerability Detection Based on Dual Attention Graph Convolutional Network}, proceedings={Collaborative Computing: Networking, Applications and Worksharing. 17th EAI International Conference, CollaborateCom 2021, Virtual Event, October 16-18, 2021, Proceedings, Part II}, proceedings_a={COLLABORATECOM PART 2}, year={2022}, month={1}, keywords={Smart contract Vulnerability detection Deep learning Graph convolution Dual attention}, doi={10.1007/978-3-030-92638-0_20} }
- Yuqi Fan
Siyuan Shang
Xu Ding
Year: 2022
Smart Contract Vulnerability Detection Based on Dual Attention Graph Convolutional Network
COLLABORATECOM PART 2
Springer
DOI: 10.1007/978-3-030-92638-0_20
Abstract
Smart contracts on blockchains have received increasing attention due to the decentralized, transparent, and immutable characteristics of blockchain. However, smart contracts are prone to security problems caused by critical vulnerabilities, which can lead to huge economic losses. Therefore, it is urgent to provide strong and robust security assurance for smart contracts. Most existing studies on smart contract vulnerability detection methods take heavy reliance on experts-defined rules, which are extremely time-consuming and labor-demanding. Moreover, the manually-set rules are limited to specific tasks and subject to errors. Although some studies explore the use of deep learning methods, they fail to represent both semantics and structural information. In this paper, we propose a novel model, Dual Attention Graph Convolutional Network (DA-GCN), to detect vulnerabilities in smart contracts on blockchains. Both control flow graph and opcode sequence extracted from smart contract bytecodes are fed into the feature extractor based on graph convolutional network and self-attention mechanism. Model DA-GCN then uses control flow level attention to focus on the more important nodes in the control flow graph and suppress useless information. Finally, a multi layer perceptron is used to identify whether the smart contract is vulnerable. Experimental results on the real-world smart contract data set containing two vulnerabilities of reentrancy and timestamp dependency demonstrate that our proposed model DA-GCN can effectively improve the performance of smart contract vulnerability detection.