2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE) 2020
DOI: 10.1109/iciscae51034.2020.9236931
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Vulnerability Detection Tools of Smart Contract Bytecode

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…From start to finish, the transaction requires a certain amount of time. If a transaction to change the contract is conducted within this time frame and the changed transaction is confirmed first, the transaction that was initiated first would be impacted [42] [43]. In fact, this dependence on transaction order is a big issue; for example, a vendor can adjust the price after a customer has bought something, causing the buyer to pay more without their permission.…”
Section: Transaction Ordering Dependency (Tod)mentioning
confidence: 99%
See 2 more Smart Citations
“…From start to finish, the transaction requires a certain amount of time. If a transaction to change the contract is conducted within this time frame and the changed transaction is confirmed first, the transaction that was initiated first would be impacted [42] [43]. In fact, this dependence on transaction order is a big issue; for example, a vendor can adjust the price after a customer has bought something, causing the buyer to pay more without their permission.…”
Section: Transaction Ordering Dependency (Tod)mentioning
confidence: 99%
“…Hackers can take advantage of this in lottery contracts to improve their winning rate. Most tools only detect timestamp dependencies in these forms of vulnerabilities [42] [44] [45].…”
Section: Predictable Random Number (Prn)mentioning
confidence: 99%
See 1 more Smart Citation
“…Previous studies [18,19] proposed the approaches of machine learning, artificial intelligence, and deep learning integrated within vulnerability detection for smart contracts. In these studies, the fundamental approach involves building a system that can automatically evolve into more effectively detecting vulnerabilities in smart contracts.…”
Section: E Ai-driven Approachmentioning
confidence: 99%
“…6. AI architecture for Smart Contract Vulnerability Detection [19] This architecture in Fig. 6 consists of using machine learning algorithm into training an artificial intelligence (AI) model that can understand what smart contracts are and the vulnerabilities associated to them.…”
Section: E Ai-driven Approachmentioning
confidence: 99%