Blockchain presents a chance to address the security and privacy issues of the Internet of Things; however, blockchain itself has certain security issues. How to accurately identify smart contract vulnerabilities is one of the key issues at hand. Most existing methods require large-scale data support to avoid overfitting; machine learning (ML) models trained on small-scale vulnerability data are often difficult to produce satisfactory results in smart contract vulnerability prediction. However, in the real world, collecting contractual vulnerability data requires huge human and time costs. To alleviate these problems, this paper proposed an ensemble learning (EL)-based contract vulnerability prediction method, which is based on seven different neural networks using contract vulnerability data for contract-level vulnerability detection. Seven neural network (NN) models were first pretrained using an information graph (IG) consisting of source datasets, which then were integrated into an ensemble model called Smart Contract Vulnerability Detection method based on Information Graph and Ensemble Learning (SCVDIE). The effectiveness of the SCVDIE model was verified using a target dataset composed of IG, and then its performances were compared with static tools and seven independent data-driven methods. The verification and comparison results show that the proposed SCVDIE method has higher accuracy and robustness than other data-driven methods in the target task of predicting smart contract vulnerabilities.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9105394PMC
http://dx.doi.org/10.3390/s22093581DOI Listing

Publication Analysis

Top Keywords

smart contract
20
contract vulnerability
20
vulnerability detection
12
method based
12
ensemble learning
12
vulnerability data
12
vulnerability
8
detection method
8
based graph
8
graph ensemble
8

Similar Publications

Tri-Prism Origami Enabled Soft Modular Actuator for Reconfigurable Robots.

Soft Robot

January 2025

Shanghai Key Laboratory of Intelligent Manufacturing and Robotics, School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China.

Soft actuators hold great potential for applications in surgical operations, robotic manipulation, and prosthetic devices. However, they are limited by their structures, materials, and actuation methods, resulting in disadvantages in output force and dynamic response. This article introduces a soft pneumatic actuator capable of bending based on triangular prism origami.

View Article and Find Full Text PDF

Background And Objectives: Safety and efficacy of IV onasemnogene abeparvovec has been demonstrated for patients with spinal muscular atrophy (SMA) weighing <8.5 kg. SMART was the first clinical trial to evaluate onasemnogene abeparvovec for participants weighing 8.

View Article and Find Full Text PDF

Interest in supporting Federated Learning (FL) using blockchains has grown significantly in recent years. However, restricting access to the trained models only to actively participating nodes remains a challenge even today. To address this concern, we propose a methodology that incentivizes model parameter sharing in an FL setup under Local Differential Privacy (LDP).

View Article and Find Full Text PDF

Secure IoT data dissemination with blockchain and transfer learning techniques.

Sci Rep

January 2025

Torrens University Australia, Fortitude Valley, QLD 4006, Leaders Institute, 76 Park Road, Woolloongabba, QLD 4102, Brisbane, Queensland, Australia.

Article Synopsis
  • Streaming IoT data is crucial for building trust in sustainable IoT solutions, but current systems often face issues with reliability, security, and transparency due to their centralized structures.
  • The research introduces TraVel, a framework that uses blockchain and transfer learning to improve the security of IoT data management, utilizing decentralized IPFS for data storage and a private Ethereum blockchain for enhanced data integrity.
  • TraVel implements self-executing smart contracts for access control and uses an adversarial domain adaptation model to filter out malicious data, ensuring only validated data is stored, with successful performance shown in simulations.
View Article and Find Full Text PDF

With the rapid development of the Internet of Things (IoT), the scope of personal data sharing has significantly increased, enhancing convenience in daily life and optimizing resource management. However, this also poses challenges related to data privacy breaches and holdership threats. Typically, blockchain technology and cloud storage provide effective solutions.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!