Smart contracts vulnerabilities detection using ensemble architecture of graphical attention model distillation and inference network
Smart contracts vulnerabilities detection using ensemble architecture of graphical attention model distillation and inference network
Preethi1, Mohammed Mujeer Ulla2, Ashwitha Anni1, Pavithra Narasimha Murthy3, Sapna Renukaradhya1
1
Department of Information Technology, Manipal Institute of Technology Bengaluru, Manipal Academy of Higher Education,
Manipal, India
2
School of Computer Science and Engineering & IS, Presidency University, Bengaluru, India
3
Department of Computer Science and Engineering, Manipal Institute of Technology Bengaluru, Manipal Academy of Higher Education,
Manipal, India
Corresponding Author:
Sapna Renukaradhya
Department of Information Technology, Manipal Institute of Technology Bengaluru
Manipal Academy of Higher Education
Manipal, India
Email: [email protected]
1. INTRODUCTION
The inception of smart contracts can be attributed to Nick Szabo [1]. The utilization of electronic
methods improves the reliability and efficiency of contract negotiations. Smart contracts enable the efficient
execution of secure transactions without the involvement of intermediaries. The proposed concept has received
limited attention since its inception, and the absence of a reliable execution environment poses challenges to
its implementation in practical applications. The blockchain technology, which was introduced in 2009, has
attracted considerable attention from industry experts because of its close association with bitcoin as a
foundational component. The term "blockchain" denotes a distributed ledger that exhibits key features such as
decentralization, immutability, and operates in a distributed manner. The aforementioned attributes of
blockchain technology highlight its capacity to enable diverse applications, including asset securitization, food
security, insurance, supply chain financing, and other domains unrelated to virtual currency [2].
Security concerns often arise due to the existence of vulnerabilities in smart contracts. In the given
scenario, it is typical to encounter multiple vulnerabilities including reentrancy, access control weaknesses,
integer overflows, unchecked function call return values, denial of service, delegate calls, short address attacks,
competitive conditions/illegal pre transactions, transaction order dependencies, timestamp dependencies, and
numerous others [3]. There are currently several automatic detection methods being developed to tackle the
significant challenges that arise from vulnerabilities in smart contracts. The objectives of vulnerability
detection and analysis are accomplished by employing automated technologies for vulnerability detection.
These technologies facilitate the rapid detection of security vulnerabilities in contracts. The categorization of
these vulnerabilities was conducted by the researchers using multiple criteria, including severity, root cause,
solidity, security, privacy, performance, ethereum virtual machine (EVM) byte code, and blockchain
features [4].
There are two primary classifications of methods employed for identifying vulnerabilities in smart
contracts: deep learning-based vulnerability detection methods and traditional method-based vulnerability
detection methods. The utilization of expert rules is essential for identifying vulnerabilities in conventional
approaches. The guidelines presented in this article are backed by automated vulnerability detection
technologies and are derived from empirical knowledge. The popularity of deep learning algorithms has
experienced a significant increase in recent years [5]. The prevalence of automated vulnerability detection
techniques that integrate symbolic execution with non-symbolic execution approaches is attributed to their
exceptional accuracy in identifying well-known vulnerabilities. The utilization of symbolic execution tools in
order to simulate symbolic paths necessitates a significant allocation of time resources. The main challenge is
to conduct a comprehensive analysis of all possible pathways covered by a contract. Therefore, these
technologies are deemed inappropriate for batch vulnerability detection. Non-symbolic execution techniques,
such as slither and smart check, rely extensively on predefined detection criteria. It is crucial to acknowledge
that there exists a limitation concerning extended simulation durations when dealing with symbolic pathways
[6]. The aforementioned circumstances may lead to the possibility of drawing inaccurate and unfavorable
conclusions.
The quality of the datasets utilized significantly impacts the performance of deep learning models.
The task of incorporating dependable expert information poses a considerable challenge, primarily because of
the inherent denseness associated with these models. Moreover, a notable portion of their methodologies
demonstrate intricacy. Deep learning algorithms have demonstrated a significant level of accuracy in
identifying vulnerabilities, outperforming previous static analysis methods [7]. This task can be achieved
without the need for explicitly specifying the detection algorithms that depend on training datasets. Achieving
consistent execution durations in deep learning techniques involves the computation of the product between
input values generated from the smart contract and the obtained weight values.
Convolutional neural networks (CNNs) have consistently demonstrated a notable degree of accuracy
in the detection of malware and vulnerable software codes [8]. CNNs have been widely utilized in deep learning
models, primarily for image recognition tasks rather than code analysis. The assessment of semantics and
context in smart contracts faces challenges that delay accuracy, leading to a significant occurrence of false
positives and false negatives [9]. The utilization of deep learning and machine learning techniques has
significantly enhanced the effectiveness and precision in identifying vulnerabilities within ethernet smart
contracts (ESC). The scarcity of real-world cases showcasing vulnerabilities in ethereum smart contracts poses
challenges for security firms in gathering a sufficient number of instances within a specified timeframe. In
order to effectively address challenges associated with identifying vulnerabilities in smart contracts, it is crucial
to prioritize research on small-sample learning techniques. The primary goal of this study is to facilitate
advancement and accelerate the exploration of solutions within the selected domain [10].
As blockchain technology continues to evolve, smart contracts emerge as a transformative force across
various sectors due to their capacity for ensuring trustworthiness, transparency, and automated execution of
agreements. Nevertheless, the irrevocable nature of smart contracts once they are deployed to the blockchain
heightens the importance of preemptive vulnerability detection. Conventional methods for detecting
vulnerabilities, such as manual inspections and static code analysis, are increasingly inadequate due to their
limitations in handling complex patterns and extensive datasets. The advent of deep learning, with its
exceptional ability to discern complex patterns within vast amounts of data, a new era of potential in identifying
and mitigating potential security vulnerabilities in smart contracts. This research endeavors to leverage deep
learning to fortify the security of smart contracts, aiming to enhance the detection process's efficiency and
scalability, thereby reinforcing the foundational trust that blockchain technology promises.
− Advanced graphical learning module: The proposed graphical attention model distillation and inference
network (GAMDI-Net) introduces an innovative learning module that converts smart contract code into
graphical representations. This module employs attention mechanism networks to effectively translate
both semantic and bytecode information into graphical formats, offering an enhanced understanding of
Smart contracts vulnerabilities detection using ensemble architecture of graphical attention … (Preethi)
726 ISSN: 2252-8938
the underlying structures and relationships within smart contracts, which is a significant advancement
over traditional linear representations.
− Dual-modality model distillation: The model distillation approach is introduced, utilizing a network that
processes dual-modality inputs during training. This method refines the learning process by distilling
complex information into more accessible forms, thereby improving the network's ability to predict
vulnerabilities by synthesizing semantic and control flow insights from both source code and bytecode.
− Mutual modality learning mechanism: The research develops a mutual modality learning mechanism that
incorporates transfer and mutual loss to facilitate collaborative learning between different network
modalities during training. This collaborative approach is pivotal in enhancing the model's capability to
infer missing code embeddings and to improve the accuracy of vulnerability detection in smart contracts.
− Innovative inference for vulnerability detection: At the inference stage, the study leverages the distilled
model network to predict code embeddings not present in the bytecode. This predictive capacity is
essential for increasing the accuracy and reliability of vulnerability detection in smart contracts,
presenting a substantial contribution to the field of smart contract security.
2. RELATED WORK
The field has witnessed significant advancements that have enabled the efficient utilization of deep
neural networks. As a result, the detection of vulnerabilities in smart contracts has been greatly improved,
leading to enhanced efficiency. The positive outcomes derived from the implementation of this practice are
illustrated in [11]. Control flow graphs are a commonly used technique in software engineering to visually
represent the structure and flow of source code, as exemplified in [12]. The approach described employs long
short-term memory (LSTM)-based networks to sequentially parse the source code. The main goal of a
sequential model is to analyze the operational code of ethereum [13]. However, these approaches either solely
consider the source code or operation code as a text sequence, disregarding semantic blocks, or they fail to take
into account crucial aspects of the data flow. Hence, these methodologies produce outcomes as a result of their
incapacity to precisely capture the semantic framework.
The speaker verification checker (SVChecker) technique consists of three main stages: code fragment
extraction, application of a deep learning model, and the development of a specialized checker for solidity
smart contract source code that is not relevant [14]. The methodology outlined here converts the process of
detecting vulnerabilities in ethereum smart contracts into a text classification task. The Peculiar [15] system
employs pre-training techniques to transform the solidity source code of the ESC into a non-Euclidean graph
problem. The utilization of comprehensive data flow graphs improves the detection of vulnerabilities in ESC.
The primary dataflow graph displays significant differences compared to the conventional dataflow graphs
typically used in modern methodologies.
The development of sequence chart studio (SCStudio) [16] encompassed the establishment of a
centralized platform with the objective of enhancing the efficiency of workflows associated with smart contract
production. The main goal of this project is to improve the accessibility of secure smart contract development
for programmers. The core principle of this approach involves the incorporation of pattern-based learning and
security verification via testing, leading to a proficient solution. The proposed methodology provides real-time
recommendations for prioritizing the implementation of security upgrades based on their respective levels of
importance. The methodology outlined in [17] comprises three distinct phases, the initial phase in the
construction of transactions intended for transmission to an agent smart contract involves the generation of
fuzzing input. The main purpose of these transactions is to initiate attacks, while also gathering and recording
runtime information in the execution log. The next step in the process is to perform preprocessing on the
contract in order to improve its detectability. During the contract upload procedure, the source code [18] is
subjected to a preprocessing step. The primary objectives of this step encompass two aspects: firstly, the
extraction of a candidate pool for fuzzing, and secondly, the identification of any dependencies present in the
code. The verification of vulnerabilities is the concluding stage in the process. The primary goal of execution
log analysis [19] is to evaluate the vulnerability status of a contract.
The software package consists of a graph extraction method and a highly efficient vulnerability
detection tool [20], the next step in the process of extracting a graph involves creating the graph after
vulnerability patterns have been extracted. The first step in the development of vulnerability security-centric
graph (SCGraph) libraries involves the utilization of the approximation graph matching approach. The
vulnerability detection procedure utilizes a methodology to choose sample SCGraphs from the dataset. The
following procedure involves calculating the similarity between the SCGraphs produced by the identification-
requiring contracts. One essential step that should be given priority is the assessment of the contract's
vulnerabilities [21]. The utilization of machine learning techniques [22] in conjunction with ContractWard is
highly recommended for the purpose of detecting vulnerabilities in smart contracts. The first step of the method
involves extracting bigram attributes from simplified smart contract operation codes. The model development
process integrates two sampling strategies and employs a hybrid approach that incorporates the utilization of
five distinct machine learning algorithms. Currently, the testing phase of the ContractWard system involves
the execution of 49,502 real-world smart contracts on the ethereum platform, which is further being reviewed.
According to Ma et al. [23], conventional methods are commonly utilized to detect vulnerabilities in
smart contracts. The selection of methodologies is primarily determined by either static analysis or dynamic
execution approaches. Unfortunately, their reliance is heavily dependent on various patterns that have been
identified by experts. The presence of human error is an inherent aspect in the manual configuration of patterns.
Furthermore, the accurate representation of intricate patterns can present a considerable challenge. The
utilization of multiple rigid patterns without sufficient refinement increases the likelihood of encountering false
positives and false negatives. Furthermore, proficient adversaries possess the capability to effortlessly bypass
pattern checking techniques [24]. Furthermore, the exponential growth of smart contracts presents significant
difficulties in identifying patterns, even within a restricted community of specialists. One potential approach
to consider is to formally solicit each expert to provide labels for a preselected set of contracts. The training
process of a model involves a subsequent procedure that includes the collection and utilization of contracts that
have been annotated by multiple experts. The proposed methodology showcases autonomous capability in the
detection and precise identification of particular vulnerabilities within a contract [25].
3. PROPOSED METHODOLOGY
This section of the study consists of three major parts, namely ‘A learning module that is represented
graphically’, this is used to transform the code of smart contracts to semantic and byte code into graphical
representations of control flow by the use of attention method networks, the next phase consists of ‘model
distillation’ along with a network having double modality denoted as F as well as for one-modality given as W
and lastly a ‘modality learning mechanism that is mutual’, this includes transfer and mutual loss during training.
During the training phase, collaboration of the network is learnt, while at inference, the network of model
distillation denoted U is used for prediction of code embeddings that are absent in the byte code, this therefore
increases the accuracy of detection. It is seen that the model distillation F is operational only in the training
stage. Figure 1 shows the embedding on the graphical layer. Figure 2 shows the bidirectional encoder
representations from transformers (BERT) model and graph network.
Figure 1. Embedding on the graphical layer Figure 2. BERT model and graph network
Smart contracts vulnerabilities detection using ensemble architecture of graphical attention … (Preethi)
728 ISSN: 2252-8938
as ∂ and vector of weight for an individual multilayer perceptron (MLP) layer is given as e → . after traversal
of edges, the resulting graph shows ϑ belongs to V h by using hidden phases for every node inside the graph.
In the (3), the product of elements is shown using ⊙ and activation function is given as β. Q n is the matrix
shown and the vector bias is shown as fn with subscript n belongs to {1,2} so that it is a network attribute that
can be trained. The count of nodes is represented by Z and MLP is given by T.
l→′
m =(∑n∈Rm αmn Aln )γ (1)
′ ′
β = ∑Zm=1 γ(Tgate (Q1 l→ →
m + f1 )) ⊙ T(Q1 lm + f2 ) (3)
For the (4), the functions are represented by R, the loss is shown as φ for modality of byte code, to
broaden the link of cross modality between the byte code as well as the source code. An average method of
pooling is used to show the input embedded graph. The idea of source code lw f
x in F as byte code for lw is taken
into consideration. The major focus of this condition is the depiction of global text in similar modalities that
are paired to the other. A transfer window is used as a layer for W as the capacity of re-developing the
Smart contracts vulnerabilities detection using ensemble architecture of graphical attention … (Preethi)
730 ISSN: 2252-8938
intermediate depiction for features of byte as well as source code. The loss of transfer in a model is built to
cross F and W which are two modalities.
μβ = ∑Rm=1 ||lw w
x (fm ) − lw (fm )||
2
(5)
unexamined branches. As efficient in showing various branches, this technique is ineffective for branches with
high complexity as well as strict constraints.
4. PERFORMANCE EVALUATION
The ESC is utilized for conducting a performance analysis. This analysis involves comparing the
proposed mechanism with existing methods and evaluating various vulnerabilities, including code injection,
timestamp dependence, and reentrancy. The outcomes are presented in the form of tables and graphs.
4.2. Re-entrancy
The re-entrancy vulnerability is evaluated with performance metrics of various methods as measured
by Accuracy, Precision, Recall, and F1 score. Starting from Vanilla-RNN, which shows an accuracy of 49.64%
and an F1 score of 50.71%, which depict lowest performance. LSTM and GRU show incremental
improvements in all metrics, with GRU achieving a better recall value of 71.3% and F1 score of 60.87%,
indicating its stronger capability in identifying true positives compared to Vanilla-RNN and LSTM. A
significant rise in performance is observed with GCN, which achieves an accuracy of 77.85% and an F1 score
Smart contracts vulnerabilities detection using ensemble architecture of graphical attention … (Preethi)
732 ISSN: 2252-8938
of 74.15%. This suggests a much better balance between precision and recall, and aN overall predictive
performance. Evolutionary strategies (ES) show further improvement, with a high accuracy of 89.74% and an
F1 score of 85.76%. persistent scatterer (PS) stands out with the highest values in all categories, with an
accuracy of 96.57% and an F1 score of 97.87%, suggesting it is highly effective in precision, recall, and overall
classification tasks. Upon conclusion PS performs better in comparison with the state-of-art techniques.
Table 2 shows the re-entrancy metric evaluation. Figure 4 shows the re-entrancy vulnerability evaluation for
different metrics.
Smart contracts vulnerabilities detection using ensemble architecture of graphical attention … (Preethi)
734 ISSN: 2252-8938
5. CONCLUSION
In conclusion, the proliferation of blockchain technology and the integral significance of smart
contracts within its ecosystem have underscored the imperative requirement for robust vulnerability detection
mechanism. The proposed methodology, characterized by the GAMDI-Net, marks a significant advancement
in smart contract vulnerability detection. The comprehensive framework integrates a graphical learning
module, dual-modality model distillation, and a mutual modality learning mechanism to address the
complexities of smart contract code and its inherent vulnerabilities. Empirical evaluations, as demonstrated in
the performance analysis against the ESC dataset, validate the efficiency of GAMDI-Net in surpassing state-
of-art methods. The methodology not only delivers higher accuracy in pinpointing vulnerabilities such as re-
entrancy, timestamp dependency, and code injection but also establishes a new benchmark for future research
in blockchain security. By fostering a deeper understanding of smart contract vulnerabilities and providing a
robust mechanism for their detection, GAMDI-Net contributes to the enhancement of trust and safety in
blockchain technology implementations.
REFERENCES
[1] C. F. Torres, M. Steichen, and R. State, “The art of the scam: Demystifying honeypots in ethereum smart contracts,” Proceedings
of the 28th USENIX Security Symposium, pp. 1591–1607, 2019.
[2] R. Baldoni, E. Coppa, D. C. D’elia, C. Demetrescu, and I. Finocchi, “A survey of symbolic execution techniques,” ACM Computing
Surveys, vol. 51, no. 3, 2018, doi: 10.1145/3182657.
[3] Y. Fu et al., “EVMFuzzer: Detect EVM vulnerabilities via fuzz testing,” ESEC/FSE 2019 - Proceedings of the 2019 27th ACM
Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1110–
1114, 2019, doi: 10.1145/3338906.3341175.
[4] N. Ashizawa, N. Yanai, J. P. Cruz, and S. Okamura, “Eth2Vec: learning contract-wide code representations for vulnerability
detection on Ethereum smart contracts,” BSCI 2021 - Proceedings of the 3rd ACM International Symposium on Blockchain and
Secure Critical Infrastructure, co-located with ASIA CCS 2021, pp. 47–59, 2021, doi: 10.1145/3457337.3457841.
[5] W. Wang, J. Song, G. Xu, Y. Li, H. Wang, and C. Su, “ContractWard: automated vulnerability detection models for Ethereum smart
contracts,” IEEE Transactions on Network Science and Engineering, vol. 8, no. 2, pp. 1133–1144, 2021, doi:
10.1109/TNSE.2020.2968505.
[6] S. Badruddoja, R. Dantu, Y. He, K. Upadhayay, and M. Thompson, “Making smart contracts smarter,” IEEE International
Conference on Blockchain and Cryptocurrency, ICBC 2021, 2021, doi: 10.1109/ICBC51069.2021.9461148.
[7] P. Tsankov, A. Dan, D. Drachsler-Cohen, A. Gervais, F. Bünzli, and M. Vechev, “Securify: Practical security analysis of smart
contracts,” Proceedings of the ACM Conference on Computer and Communications Security, pp. 67–82, 2018, doi:
10.1145/3243734.3243780.
[8] A. Warnecke, D. Arp, C. Wressnegger, and K. Rieck, “Evaluating explanation methods for deep learning in security,” Proceedings
- 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020, pp. 158–174, 2020, doi:
10.1109/EuroSP48549.2020.00018.
[9] Y. Zhuang, Z. Liu, P. Qian, Q. Liu, X. Wang, and Q. He, “Smart contract vulnerability detection using graph neural networks,”
IJCAI International Joint Conference on Artificial Intelligence, vol. 2021, pp. 3283–3290, 2020, doi: 10.24963/ijcai.2020/454.
[10] J. Feist, G. Grieco, and A. Groce, “Slither: A static analysis framework for smart contracts,” Proceedings - 2019 IEEE/ACM 2nd
International Workshop on Emerging Trends in Software Engineering for Blockchain, WETSEB 2019, pp. 8–15, 2019, doi:
10.1109/WETSEB.2019.00008.
[11] J. Gao, H. Liu, C. Liu, Q. Li, Z. Guan, and Z. Chen, “EASYFLOW: Keep ethereum away from overflow,” Proceedings - 2019
IEEE/ACM 41st International Conference on Software Engineering: Companion, ICSE-Companion 2019, pp. 23–26, 2019, doi:
10.1109/ICSE-Companion.2019.00029.
[12] K. Bhargavan et al., “Formal verification of smart contracts: Short paper,” PLAS 2016 - Proceedings of the 2016 ACM Workshop
on Programming Languages and Analysis for Security, co-located with CCS 2016, pp. 91–96, 2016, doi: 10.1145/2993600.2993611.
[13] T. Chen and C. Guestrin, “XGBoost: A scalable tree boosting system,” Proceedings of the ACM SIGKDD International Conference
on Knowledge Discovery and Data Mining, vol. 13-17-August-2016, pp. 785–794, 2016, doi: 10.1145/2939672.2939785.
[14] Y. Freund and R. E. Schapire, “A decision-theoretic generalization of on-line learning and an application to boosting,” Journal of
Computer and System Sciences, vol. 55, no. 1, pp. 119–139, 1997, doi: 10.1006/jcss.1997.1504.
[15] L. Breiman, “Random forests,” Machine Learning, vol. 45, no. 1, pp. 5–32, 2001, doi: 10.1023/A:1010933404324.
[16] J. A. K. Suykens and J. Vandewalle, “Least squares support vector machine classifiers,” Neural Processing Letters, vol. 9, no. 3,
pp. 293–300, 1999, doi: 10.1023/A:1018628609742.
[17] J. Cheng, J. Song, D. Fan, Y. Zhang, and W. Feng, “Current status and prospects of blockchain technology,” Communications in
Computer and Information Science, vol. 1253 CCIS, pp. 674–684, 2020, doi: 10.1007/978-981-15-8086-4_63.
[18] M. Yin, D. Malkhi, M. K. Reiter, G. G. Gueta, and I. Abraham, “HotStuff: BFT consensus in the lens of blockchain,” arXiv-
Computer Science, pp. 1-23, 2018.
[19] Y. Ni, C. Zhang, and T. Yin, “A review of approaches for detecting vulnerabilities in smart contracts within web 3.0 applications,”
Blockchains, vol. 1, no. 1, pp. 3–18, 2023, doi: 10.3390/blockchains1010002.
[20] Y. Zhang et al., “An efficient smart contract vulnerability detector based on semantic contract graphs using approximate graph
matching,” IEEE Internet of Things Journal, vol. 10, no. 24, pp. 21431–21442, 2023, doi: 10.1109/JIOT.2023.3294496.
[21] T. M. Cover and P. E. Hart, “Nearest neighbor pattern classification,” IEEE Transactions on Information Theory, vol. 13, no. 1, pp.
21–27, 1967, doi: 10.1109/TIT.1967.1053964.
[22] Z. Ying-li, M. Jia-li, L. Zi-ang, L. Xin, and Z. Rui, “Overview of vulnerability detection methods for Ethereum solidity smart
contracts,” Computing Sciences, vol. 49, no. 3, pp. 52–61, 2022.
[23] F. Ma et al., “Security reinforcement for Ethereum virtual machine,” Information Processing and Management, vol. 58, no. 4, 2021,
doi: 10.1016/j.ipm.2021.102565.
[24] S. S. Kushwaha, S. Joshi, D. Singh, M. Kaur, and H. N. Lee, “Systematic review of security vulnerabilities in Ethereum blockchain
smart contract,” IEEE Access, vol. 10, pp. 6605–6621, 2022, doi: 10.1109/ACCESS.2021.3140091.
[25] Z. Liu, P. Qian, X. Wang, Y. Zhuang, L. Qiu, and X. Wang, “Combining graph neural networks with expert knowledge for smart
contract vulnerability detection,” IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 2, pp. 1296–1310, 2023,
doi: 10.1109/TKDE.2021.3095196.
[26] C. Goller and A. Kuechler, “Learning task-dependent distributed representations by backpropagation through structure,” IEEE
International Conference on Neural Networks - Conference Proceedings, vol. 1, pp. 347–352, 1996, doi:
10.1109/icnn.1996.548916.
[27] T. Zia and U. Zahid, “Long short-term memory recurrent neural network architectures for Urdu acoustic modeling,” International
Journal of Speech Technology, vol. 22, no. 1, pp. 21–30, 2019, doi: 10.1007/s10772-018-09573-7.
[28] A. A. Ballakur and A. Arya, “Empirical evaluation of gated recurrent neural network architectures in aviation delay prediction,”
Proceedings of the 2020 International Conference on Computing, Communication and Security, ICCCS 2020, 2020, doi:
10.1109/ICCCS49678.2020.9276855.
[29] S. Fu, W. Liu, D. Tao, Y. Zhou, and L. Nie, “HesGCN: Hessian graph convolutional networks for semi-supervised classification,”
Information Sciences, vol. 514, pp. 484–498, 2020, doi: 10.1016/j.ins.2019.11.019.
[30] S. Tikhomirov, E. Voskresenskaya, I. Ivanitskiy, R. Takhaviev, E. Marchenko, and Y. Alexandrov, “SmartCheck: Static analysis
of ethereum smart contracts,” Proceedings - International Conference on Software Engineering, pp. 9–16, 2018, doi:
10.1145/3194113.3194115.
[31] Z. Liu, M. Jiang, S. Zhang, J. Zhang, and Y. Liu, “A smart contract vulnerability detection mechanism based on deep learning and
expert rules,” IEEE Access, vol. 11, pp. 77990–77999, 2023, doi: 10.1109/ACCESS.2023.3298048.
BIOGRAPHIES OF AUTHOR
Dr. Preethi received a bachelor's degree in computer science and engineering from
VTU, Karnataka in 2008, a master's degree in computer science and engineering from VTU,
Karnataka 2013, and a philosophy of doctorate degree in Computer Science and Engineering
from Presidency University, Bangalore in 2022, respectively. She has a total of 15 years of
Teaching experience. She is currently working as an Assistant Professor-Senior Scale in the
Department of Information Technology, Manipal Institute of Technology, Bengaluru, Manipal
Academy of Higher Education, Manipal, India. Her research areas include the internet of things,
computer architecture, and cryptography. She has many papers to her credit in reputed
international journals, national journals, and conferences. She has been serving as a reviewer for
highly respected journals. She can be contacted at email: [email protected].
Smart contracts vulnerabilities detection using ensemble architecture of graphical attention … (Preethi)
736 ISSN: 2252-8938