Project Report On Smart Contract Vulnerability Detection
Project Report On Smart Contract Vulnerability Detection
PROJECT REPORT
on
SIGNATURE SIGNATURE
SIGNATURE
i
DECLARATION
(RA2111003030435) hereby declare that the work which is being presented in the
project report titled “Leveraging Smart Contract Code for Automated Vulnerability
Detection: A Deep Learning Approach” is the record of authentic work carried out by
fulfillment for the award of the degree “Bachelor of Technology in Computer Science
Modinagar, U.P.(INDIA).This work has not been submitted to any other University or
Signature:
Name:
Roll No.:
Date :
Signature:
Name:
Roll No.:
Date :
Signature:
Name:
Roll No.:
Date :
Signature:
Name:
Roll No.:
Date :
ii
ACKNOWLEDGEMENT
It gives us a great sense of pleasure to present the report of the B. Tech Project
undertaken during B. Tech. (VIII - Semester), Final Year. We owe special debt and
gratitude to Mr. Mayank Gupta (assistant professor)Project supervisor for his constant
support and guidance throughout the course of our work. His/her sincerity,
thoroughness and perseverance have been a constant source of inspiration for us. It is
only his cognizant efforts that our endeavors have seen light of the day.
We also take the opportunity to acknowledge the contribution of Dr. Jitendra Singh,
Project Coordinator, for his full support and assistance during the development of the
project.
We are equally grateful to Dr. Pushpendra Singh, Program Coordinator, and Dr.
Avneesh Vashistha, Head of the Department, Computer Science and Engineering, for
their thoughtful suggestions and motivating words, which greatly contributed to the
successful completion of our project.
We are also thankful to the teaching and non-teaching staff of our department, whose
direct and indirect support greatly enriched our academic experience and guided us
through our project work. Last but not the least; we acknowledge our parents, family,
and friends for their unwavering encouragement and moral support in the completion
of the project.
SOHAIL (RA2111003030436)
iii
ABSTRACT
dynamic analysis, machine learning (ML), and rule-based detection. Tools like
Slither, Mythril, and Oyente are integrated for in-depth code inspection. The
such as Remix, Truffle, and Hardhat, the tool offers real-time analysis with
iv
Ultimately, the system enhances the reliability of decentralized platforms by
v
TABLE OF CONTENTS
ACKNOWLEDGEMENTS iii
ABSTRACT iv
ABBREVIATIONS ix
LIST OF SYMBOLS xi
1.INTRODUCTION 1
background 1
problem statement of the model 4
objective and significance of project 2
2.LITERATURE SURVEY 6
Types of smart Contracts 8
Review Research papers 10
4.System Design 26
7. Conclusion 42
8 .Future Enhancements 46
9. References 51
10. Appendices 54
vi
LIST OF TABLES AND FIGURES
pie chart depicting the distribution of bullying and non bullying dataset 5
1.Research methodology 7
3.server-side working 7
vii
ABBREVIATIONS
AI - Artificial Intelligence
ETH - Ethereum
FN - False Negative
FP - False Positive
ML - Machine Learning
TP - True Positive
UI - User Interface
UX - User Experience
VM - Virtual Machine
viii
DAO - Decentralized Autonomous Organization
describe Ethereum)
ix
LIST OF SYMBOLS
x
D - Dataset or data input for machine learning model
Ⅻl
CHAPTER 1
INTRODUCTION
With the rapid rise of blockchain technology and decentralized applications (DApps),
smart contracts have emerged as a fundamental element driving innovation in various
industries. Smart contracts, essentially self-executing programs or protocols that run
on blockchain networks, enable the automation of transactions and agreements
between parties without the need for intermediaries. By ensuring transparency,
security, and immutability, smart contracts have become a preferred solution for
automating financial transactions, supply chain management, governance systems,
and various decentralized finance (DeFi) applications.
However, despite their many advantages, the widespread adoption of smart contracts
has also highlighted a significant issue: the security of these contracts. Smart contracts
are immutable once deployed, meaning that any errors or vulnerabilities in the code
cannot be easily corrected after deployment. As a result, vulnerabilities within smart
contracts can expose decentralized applications to a wide range of risks, including
financial loss, data breaches, and exploitation. These vulnerabilities, once discovered,
are often exploited by malicious actors, leading to devastating consequences for users
and developers alike.
The security of smart contracts is especially critical given the high stakes involved.
With billions of dollars invested in blockchain-based systems, the financial impact of
smart contract vulnerabilities can be catastrophic. High-profile attacks such as the
DAO hack in 2016, the Parity wallet exploit in 2017, and more recent vulnerabilities
that have exploited DeFi protocols have underscored the need for improved security
mechanisms to detect and mitigate vulnerabilities in smart contracts before they are
deployed on a live blockchain.
1
Blockchain networks like Ethereum, Binance Smart Chain, and Solana have become
the backbone of a rapidly expanding decentralized ecosystem, where smart contracts
serve as the essential building blocks for automating processes and facilitating
transactions without requiring trusted intermediaries.
While smart contracts provide significant benefits, their immutable and decentralized
nature creates unique challenges in terms of security. Once deployed on a blockchain,
the code is set in stone and cannot be changed. This means that any vulnerabilities
present in the smart contract code remain in the system until a fix is made at the
contract's source and redeployed, which itself can be difficult to coordinate on a
decentralized platform. Additionally, since blockchain operates in a trustless
environment, there is no centralized authority to oversee or review the smart contract's
functionality post-deployment. This poses a serious risk to users and developers who
rely on the contract to operate correctly.
Several vulnerabilities in smart contracts have been identified, and they represent
significant security risks to blockchain applications. Among the most common
vulnerabilities are:
2
● Integer Overflow/Underflow: Integer overflow and underflow vulnerabilities
arise when a contract’s numeric values exceed the maximum or minimum
limit of their data types. This can result in unexpected behavior, including the
unintended alteration of contract logic or asset manipulation.
● Gas Limit Issues: Every transaction on the Ethereum network requires gas, a
unit used to measure the computational work required to execute operations.
Gas limit issues arise when a contract consumes more gas than is available,
causing it to fail or behave unpredictably.
Given the nature of these vulnerabilities, it is clear that detecting and mitigating such
flaws before deployment is crucial to ensuring the security of blockchain-based
applications. Traditional software security testing methods are inadequate for smart
contracts, as they do not account for the decentralized and immutable characteristics
of blockchain systems. As such, there is a growing demand for specialized systems
that can automatically identify vulnerabilities in smart contracts and provide
actionable insights to developers.
3
Existing Solutions and Challenges
To address the vulnerabilities in smart contracts, several security auditing tools and
vulnerability detection systems have been developed. Some of the existing solutions
include static analyzers, which examine the contract’s code without executing it, and
dynamic analyzers, which run the contract in a simulated environment to identify
vulnerabilities at runtime. However, these solutions often suffer from limitations, such
as high false-positive rates, inability to detect novel or complex vulnerabilities, or the
need for manual intervention in the auditing process.
This research aims to address the critical security challenges associated with smart
contracts by developing a novel SCVDS that integrates multiple detection
methodologies, enhancing both the detection accuracy and the efficiency of
vulnerability identification. Through the combination of static analysis (which
analyzes the code's structure and logic), dynamic analysis (which simulates contract
execution), and machine learning-based techniques, this system will provide a
comprehensive solution for the secure deployment of smart contracts.
4
This document presents the architecture, design, and implementation details of the
proposed Smart Contract Vulnerability Detection System (SCVDS). It outlines the
various components of the system, including the static and dynamic analysis modules,
the machine learning framework, and the formal verification methods used to ensure
robustness. The document also presents the evaluation metrics used to assess the
effectiveness of the system, along with experimental results that demonstrate its
accuracy and efficiency in detecting common smart contract vulnerabilities.
5
CHAPTER 2
LITERATURE SURVEY
Wang et al. [3] proposed ContractFuzzer, a fuzzing tool designed to detect common
smart contract vulnerabilities. Similarly, Bhargavan et al. [4] highlighted the
importance of formal verification in smart contract development. MadMax,
introduced by Grech et al. [5], is another static analysis tool that focuses on out-of-gas
vulnerabilities.
Atzei et al. [6] provided a comprehensive survey of attack vectors in Ethereum smart
contracts, categorizing known vulnerabilities. Saad et al. [7] expanded on this by
exploring a wide range of smart contract weaknesses in blockchain systems.
To formally reason about EVM behavior, Hirai [8] defined its semantics for use in
theorem provers. Liu et al. [9] conducted a systematic review on how AI can aid in
smart contract security analysis. Wu et al. [10] proposed an efficient framework for
detecting vulnerabilities in smart contracts.
Torres et al. [11] presented Osiris, which identifies integer-related bugs using
symbolic execution. Best practices for Ethereum smart contract security were
compiled by Tikhomirov [12]. Sun et al. [13] reviewed various tools and techniques
for securing smart contracts.
6
Wahab et al. [17] surveyed detection tools and methods specifically for Ethereum
contracts. Abuadbba et al. [18] developed EthScope, a semantic-aware vulnerability
detection system. Parizi and Dehghantanha [19] empirically evaluated smart contract
programming languages and associated security weaknesses.
Brent et al. [20] proposed EthBMC, a bounded model checker that verifies EVM
bytecode properties. F. Xie et al. [21] presented SolV, which uses source code
embedding for vulnerability detection. T. Chen et al. [22] revealed economic
inefficiencies caused by under-optimized contracts.
A recent and comprehensive survey by De Baets et al. [23] categorized different smart
contract vulnerability detection strategies. Y. Sun et al. [24] introduced GPTScan, a
model that uses GPT in conjunction with program analysis to detect logic flaws.
HyMo, proposed by Khodadadi and Tahmoresnezhad [25], is a multi-modal hybrid
model for smart contract vulnerability detection that integrates deep learning and
symbolic techniques.
1. Deep Learning Models: Leveraging neural networks trained on large datasets
of smart contract vulnerabilities has improved the accuracy and scalability of
vulnerability detection systems. These models can detect both known and
novel vulnerabilities with greater precision than traditional methods.
2. Hybrid Approaches: Combining static and dynamic analysis has proven to be
an effective way to enhance vulnerability detection. Static analysis can quickly
identify potential issues, while dynamic analysis can catch runtime
vulnerabilities that static analysis might miss.
3. Automated Patch Generation: Research is also underway to create systems that
not only detect vulnerabilities but also automatically suggest or generate
patches for the identified issues. This advancement could greatly speed up the
7
process of securing smart contracts and reduce human intervention.
8
CHAPTER 3
One of the most critical limitations of existing tools is their tendency to produce
inaccurate results:
False Positives: Many static analysis tools incorrectly flag benign code as malicious
or vulnerable, leading developers to spend time and resources on unnecessary
debugging.
9
False Negatives: Conversely, real threats may go undetected, leaving smart contracts
exposed to exploitation. This is especially problematic for zero-day vulnerabilities
and complex logic-based attacks.
The root cause often lies in the over-reliance on rule-based systems and symbolic
execution, which lack adaptability to emerging threats or evolving contract logic. The
absence of learning mechanisms prevents these tools from improving their detection
accuracy over time.
Most current tools analyze smart contracts only at the development or pre-deployment
stage. While this approach can identify certain vulnerabilities before going live, it
does not address threats that arise during execution.
These issues render such tools impractical for modern large-scale, high-throughput
blockchain environments.
10
A majority of existing vulnerability detection tools are tailored specifically for
Ethereum and its Solidity-based contracts. However, with the rise of alternative
platforms such as Binance Smart Chain (BSC), Solana, Polkadot, and Cardano, a
broader scope is essential.
Platform dependency: Tools optimized for Ethereum may not function effectively on
other chains due to differences in virtual machines, programming languages,
consensus mechanisms, and architecture.
Fragmented ecosystem: Developers building cross-chain applications often lack a
unified security solution, increasing the likelihood of inconsistencies and
vulnerabilities.
Even when vulnerabilities are correctly identified, the utility of security tools is often
limited by:
Complex technical reports: Many tools produce verbose, low-level outputs that
require in-depth security expertise to interpret.
Lack of remediation guidance: Developers are often left without actionable steps to
fix vulnerabilities, slowing down the patching process.
No automation: The absence of automated patch suggestions or refactoring
recommendations makes vulnerability mitigation a manual, error-prone task.
Performs static code analysis to detect known vulnerabilities and logic flaws before
deployment.
11
Employs dynamic runtime monitoring to track contract behavior and detect anomalies
or suspicious transactions in real time.
Capable of identifying patterns that rule-based systems miss, and can evolve to
recognize emerging attack vectors.
Ensures consistent security coverage across Ethereum, BSC, Solana, and other
leading ecosystems.
Provides clear, structured reports with vulnerability summaries, severity levels, and
recommended fixes.
12
To address the critical challenges in existing smart contract security mechanisms, we
designed not only to detect known vulnerabilities but also to identify novel or
Leverages tools like Mythril, Slither, and Oyente for symbolic execution and control
flow analysis.
Enhanced with custom pattern-matching rules for identifying vulnerabilities such as:
Reentrancy attacks
Integer overflows/underflows
Timestamp dependence
Monitors runtime states such as gas usage, transaction flow, and function triggers.
13
3. Deep Learning-Based Threat Detection
Continuously retrains with real-world data using transfer learning and reinforcement
signals from developer feedback.
Integrates with live transaction monitoring to issue alerts during real-time execution.
Integrates on-chain event listeners and webhooks for live contract activity tracking.
Cross-Platform Compatibility
○ Ethereum (EVM)
14
● Compatible with smart contract languages:
● IDE Plugins (for Remix, Truffle, Hardhat) offer inline alerts and contextual
suggestions during smart contract development.
● Visual representation of control flow graphs (CFG) and data flow paths for
enhanced comprehension.
Functional Requirements
Analyze source and bytecode of smart contracts written in Solidity, Vyper, and Rust.
Apply static and dynamic techniques to detect critical vulnerability types (e.g.,
reentrancy, access control flaws, unhandled exceptions).
15
2. AI-Based Threat Detection
Utilize neural models trained on CVE databases, GitHub repositories, and known
malicious smart contract behaviors.
Non-Functional Requirements
● Performance
16
Must scan a smart contract in under 5 seconds.
● Reliability
● Security
● Usability
● Scalability
● Maintainability
System Architecture
High-Level Components:
17
Manages job queues, user sessions, request routing
System Workflow
18
CHAPTER 4
SYSTEM DESIGN
The SCVD system employs a combination of static and dynamic analysis tools to
detect vulnerabilities:
19
● Slither: A static analysis tool that detects common Solidity vulnerabilities by
analyzing the contract's source code.
● Mythril: Utilizes symbolic execution to analyze smart contracts for security
vulnerabilities, such as reentrancy and integer overflows.
● Echidna: A property-based testing tool for Ethereum smart contracts, useful
for fuzz testing and detecting edge-case vulnerabilities.
Blockchain Technologies
The SCVD system interacts with various blockchain networks to analyze smart
contracts:
20
Backend Technologies
The backend of the SCVD system is responsible for processing analysis requests and
managing data:
figure 1.2: data flow diagrams for the MANDO- HGT neural network[27]
21
The SCVD system processes smart contracts through the following stages:
22
CHAPTER 5
CODE AND OUTPUT
5.1 Introduction
● Files:
23
○ src/test/Reentrancy.sol
● Description:
Reentrancy attacks occur when a contract makes an external call to another
untrusted contract before updating its state. The untrusted contract can then
make recursive calls back into the original function, potentially leading to
unexpected behaviors or draining funds. A notable example is the 2016 DAO
hack, where attackers exploited a reentrancy vulnerability to siphon off
approximately $50 million worth of Ether.
Vulnerable Function:
solidity
CopyEdit
function withdrawFunds(uint256 _weiToWithdraw) public {
require(balances[msg.sender] >= _weiToWithdraw);
(bool send, ) = msg.sender.call{value: _weiToWithdraw}("");
require(send, "send failed");
if (balances[msg.sender] >= _weiToWithdraw) {
balances[msg.sender] -= _weiToWithdraw;
}
}
● In this function, Ether is sent to the user before updating their balance,
allowing a malicious contract to re-enter the withdrawFunds function and
withdraw funds multiple times before the balance is updated.
● Exploit Strategy:
An attacker deploys a malicious contract with a fallback function that calls
withdrawFunds recursively. By doing so, the attacker can drain the contract's
funds before the balance is updated.
Test Output:
bash
CopyEdit
[PASS] testAttack() (gas: 121000)
Logs:
24
Attacker balance before: 0
Attacker balance after: 10 ether
● Mitigation:
● Files:
○ src/test/Oracle-stale.sol
● Description:
Smart contracts often rely on external data sources, known as oracles, to fetch
real-world information like asset prices. If these oracles are manipulated or
provide outdated data, attackers can exploit the contract's logic. For instance,
by feeding a manipulated price, an attacker can borrow more assets than they
should be entitled to, leading to potential insolvency of the protocol.
Vulnerable Function:
solidity
CopyEdit
(, int256 answer, , , ) = priceFeed.latestRoundData();
● This function fetches the latest price data without validating its freshness or
correctness.
● Exploit Strategy:
An attacker manipulates the oracle to provide outdated or incorrect prices.
The contract, relying on this data, makes flawed decisions, such as allowing
undercollateralized loans.
Test Output:
bash
CopyEdit
[PASS] testUnSafePrice() (gas: 50000)
25
Logs:
price: -100000000
● Mitigation:
Implement checks to ensure the data is recent and within expected ranges.
● Files:
○ src/test/ReadOnlyReentrancy.sol
● Description:
Read-only reentrancy is a subtle vulnerability where view functions, which
are not supposed to alter the state, can be exploited. If a view function relies
on external calls, and those external contracts can re-enter the original
contract, it can lead to inconsistent state reads and flawed logic execution.
● Exploit Strategy:
An attacker crafts a contract that, when called by a view function, re-enters
the original contract, causing it to read inconsistent or outdated data, leading to
incorrect outcomes.
Test Output:
bash
CopyEdit
[PASS] testReadOnlyReentrancy() (gas: 75000)
Logs:
Manipulated view function returned incorrect balance.
● Mitigation:
26
Implement reentrancy guards even in view functions if they rely on external data.
● Files:
○ src/test/Privatedata.sol
● Description:
In Solidity, declaring a variable as private restricts access within the contract.
However, this does not prevent external parties from reading the data directly
from the blockchain, as all on-chain data is publicly accessible. Storing
sensitive information like passwords or private keys on-chain, even in private
variables, poses a significant security risk.
● Exploit Strategy:
An attacker reads the contract's storage slots directly to extract sensitive
information stored in private variables.
Test Output:
bash
CopyEdit
[PASS] testPrivateDataExposure() (gas: 30000)
Logs:
Retrieved private variable: 0xdeadbeef
● Mitigation:
If necessary, encrypt data before storing and manage decryption keys securely
off-chain.
5.4 Summary
27
● Always follow best practices like the Checks-Effects-Interactions pattern.
● Be cautious when relying on external data sources; always validate and
aggregate data.
● Understand that private in Solidity does not equate to true data privacy.
● Regularly audit and test contracts to identify and fix vulnerabilities before
deployment.
28
6 Tables and Figures
Detected
Static Analysis 85% 50 Reentrancy,
Integer
Overflow
90% 120 Gas Limit,
Unauthorized
Analysis
Access
Machine 88% 200 Unknown
Patterns,
Learning Anomalies
Formal 95% 300 Logical Bugs,
Compliance
Verification
Issues
table 6.1 : Analysis of the accuracy all various analysis done on smart contracts
29
figure 6.2: graphical representation of all the analysis on data
Others 10%
table 6.2: showing the data of the pie chart in tabular format
30
figure 6.3: pie chart representation of all the types of issues in smart contracts
31
figure 6.4: basic level working of blockchain transaction[26]
32
CHAPTER 7
CONCLUSION
33
logic error that occurs only under a certain condition or a state-dependent
vulnerability can be uncovered through dynamic testing.
● Machine learning brings adaptability and future-readiness to SCVD. By
training on historical vulnerability datasets and known exploit patterns, the
system can generalize and predict potential zero-day threats that deviate from
traditional known issues. It adds an intelligent layer to the detection process,
improving both the accuracy and scope of vulnerability identification.
● Formal verification offers mathematical proof of correctness by verifying the
logical properties of smart contracts. This ensures that contracts behave
exactly as intended under all circumstances. It’s especially useful for critical
applications where failure is unacceptable, such as algorithmic stablecoins,
cross-chain bridges, and large DeFi protocols.
By synergizing these methods, SCVD forms a robust and automated framework for
smart contract auditing. One of its most notable benefits is the ability to provide
real-time, actionable feedback to developers during the coding phase. This proactive
approach contrasts sharply with traditional methods that rely heavily on manual code
reviews and post-deployment bug bounty programs. Manual auditing, while
important, is not scalable and is prone to oversight—especially as contracts grow
more complex and interactions between multiple smart contracts become more
intricate.
However, despite its impressive capabilities, SCVD is not without challenges. The
most prominent among them is the rapid evolution of attack vectors. As the DeFi
landscape matures, so do the tactics and sophistication of adversaries. New forms of
attacks, such as flash loan manipulation, cross-chain bridge exploits, and governance
attacks, often bypass existing detection heuristics. Therefore, SCVD must evolve
through adaptive learning models, frequent updates, and incorporation of real-time
34
threat intelligence.
Another challenge lies in achieving high detection precision without excessive false
positives or negatives. False positives can overwhelm developers with unnecessary
warnings, while false negatives can leave critical vulnerabilities unnoticed. Balancing
this tradeoff remains a core area for ongoing research and optimization.
35
From a broader perspective, the deployment of SCVD contributes significantly to the
overall ecosystem stability. With smart contracts now being used in financial
services, healthcare, logistics, gaming, and governance, a single vulnerability can
cause ripple effects across industries. By providing a robust and scalable security
audit framework, SCVD ensures that the blockchain revolution can proceed with the
confidence of its users.
36
CHAPTER 8
FUTURE ENHANCEMENTS
Challenges
One of the most common drawbacks in existing smart contract security tools is the
generation of excessive false positives. These occur when a tool incorrectly identifies
harmless or benign code patterns as potential threats. Such inaccuracies result in
unnecessary manual validation, consuming time and developer effort. Refining
artificial intelligence and machine learning algorithms is essential to reduce false
positives. This includes developing more context-aware models, integrating code
semantics into analysis, and leveraging ensemble methods to better differentiate
between actual vulnerabilities and innocuous code segments.
2. Scalability Issues
37
exploit patterns to bypass security protocols. Static detection techniques may fail to
catch zero-day vulnerabilities or emerging attack types, making regular updates
essential. Tools must incorporate dynamic learning capabilities and be retrained with
updated vulnerability datasets, security advisories, and real-world exploit samples to
ensure resilience against evolving threats. Keeping pace with these changes requires
ongoing collaboration between security researchers, developers, and academia.
4. Cross-Platform Compatibility
Most smart contract detection tools are tailored for Ethereum and Solidity-based
contracts. However, the blockchain ecosystem is no longer confined to a single
platform. Networks like Binance Smart Chain (BSC), Polkadot, Avalanche, and
Cardano introduce distinct execution environments, consensus mechanisms, and
programming languages such as Vyper, Rust, and Plutus. The lack of universal
compatibility limits the usability of current tools. Therefore, future systems must
incorporate modular architecture capable of parsing and analyzing contracts across
platforms, along with accommodating variations in gas optimization, storage access,
and protocol-specific attack surfaces.
Security tools often operate in isolation from the rest of the development lifecycle.
Many developers face friction when integrating static analysis or vulnerability
detection into their regular coding workflows. Lack of plugins for integrated
development environments (IDEs), minimal CI/CD integration, and complex setup
procedures act as barriers to adoption. Enhancing developer experience through
seamless integration, automation scripts, visual feedback, and real-time analysis can
38
increase adoption rates and promote secure-by-design coding habits.
Future Directions
While AI models can accurately detect flaws, they often function as black boxes with
limited interpretability. Future tools should focus on generating human-readable
explanations, vulnerability classifications, and source-level annotations to help
developers understand why a code segment is deemed insecure. Explainable AI (XAI)
can improve developer trust and facilitate debugging, especially for novice developers
or during audits.
39
Decentralization can itself be a tool for enhancing security. Future systems should
explore the integration of community-driven audits, bug bounty platforms, and
decentralized vulnerability registries where ethical hackers and researchers
collaboratively identify and report vulnerabilities. Blockchain-based reputation and
incentive mechanisms can be used to reward accurate vulnerability disclosures and
crowdsource real-time threat intelligence.
Technological solutions alone are not enough; developer awareness plays a pivotal
role in preventing vulnerabilities. Future enhancements should include training
modules, interactive tutorials, and real-time feedback mechanisms integrated with
SCVD tools to educate users about security issues and best practices. Gamified
learning environments and capture-the-flag (CTF) challenges on vulnerable contracts
can further enhance user skills.
Conclusion of Chapter
Smart contract vulnerability detection remains a rapidly evolving field with high
significance in the modern decentralized landscape. While SCVD and similar systems
40
mark a tremendous leap forward in automated security, a range of technical, social,
and organizational challenges still remain. The future lies in building intelligent,
adaptive, explainable, and developer-friendly solutions that not only detect issues
but help prevent and correct them proactively.
41
CHAPTER 9
REFERENCES
[2] L. Luu, D.-H. Chu, H. Olickel, P. Saxena, and A. Hobor, “Making smart
contracts smarter,” in Proc. 23rd ACM SIGSAC Conf. on Computer and
Communications Security (CCS), 2016, pp. 254–269.
[8] Y. Hirai, “Defining the Ethereum Virtual Machine for interactive theorem
provers,” arXiv preprint arXiv:1604.06660, 2016.
[9] H. Liu, Q. He, and X. Liu, “AI-based security analysis of smart contracts:
42
A systematic literature review,” IEEE Access, vol. 9, pp. 146227–146244,
2021.
[11] C. Torres, J. Schütte, and R. State, “Osiris: Hunting for integer bugs in
Ethereum smart contracts,” in Proc. 34th Annual Computer Security
Applications Conference (ACSAC), 2018, pp. 664–676.
[15] Y. Fu, Y. Zhang, H. Wu, Y. Hu, and Y. Wang, "Smart Contract Vulnerability Detection
Using Graph Neural Network," IEEE Access, vol. 10, pp. 96062–96074, 2022. DOI:
10.1109/ACCESS.2022.3206586
[16] X. Wang, Z. Jiang, J. Zhang, and Z. Su, "Reentrant vulnerability detection in smart
contracts using graph neural networks," Computers & Security, vol. 120, p. 102783, 2022.
43
Blockchains: An Empirical Evaluation of Security Vulnerabilities," in Proc. 4th Int.
Conf. on Collaboration and Internet Computing (CIC), 2018, pp. 1–8.
[21] F. Xie, M. Sun, S. Chen, and Q. Shen, "SolV: Smart Contract Vulnerability Detection
Based on Source Code Embedding," in Proc. 44th Int. Conf. on Software Engineering
(ICSE), 2022, pp. 478–489.
[22] T. Chen, Y. Xia, X. Luo, and X. Zhang, "Under-optimized Smart Contracts Devour
Your Money," in Proc. IEEE 24th Int. Conf. on Software Analysis, Evolution and
Reengineering (SANER), 2017, pp. 442–446.
[24] Y. Sun, D. Wu, Y. Xue, H. Liu, H. Wang, Z. Xu, X. Xie, and Y. Liu, “GPTScan:
Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program
Analysis,” arXiv preprint arXiv:2308.03314, 2023.
[26] Y. Liu, Y. Wang, and J. Zhang, "Smart Contract Vulnerability Detection Based on
Multi-Scale Encoders," Electronics, vol. 13, no. 3, p. 489, 2024.
[27]Y. Fu, Y. Zhang, H. Wu, Y. Hu, and Y. Wang, “Smart Contract Vulnerability Detection
Using Graph Neural Network,” IEEE Access, vol. 10, pp. 96062–96074, 2022
44
CHAPTER 10
APPENDIX
appendix 1: plagiarism report of the research paper with plagirism of less than 10%
45
appendix 2.1: research paper submission proof to the journal
46