User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 17
Detection of Re-Entrancy, Timestamp Dependence and Infinite Loop Attack in Smart Contracts Using Graph Convolution Network
2023
Journal:  
International Journal of Intelligent Systems and Applications in Engineering
Author:  
Abstract:

Abstract Smart Contract Attack Detection Using Graph Convolution Network (GCN) is a research area that focuses on identifying and preventing malicious activities within smart contracts deployed on blockchain platforms. Smart contracts are self-executing digital agreements that run on decentralized networks, such as Ethereum. While smart contracts provide transparency and automation, they can also be vulnerable to various attacks, leading to financial losses or system disruptions. To address this challenge, the concept of Graph Convolution Network is leveraged. GCN is a deep learning technique that operates on graph-structured data, where nodes represent entities, and edges represent relationships between them. In the context of smart contracts, a graph can be constructed to capture the dependencies between different functions, variables, and transactions within the contract. The goal of utilizing GCN in smart contract attack detection is to learn patterns and detect anomalies in the graph structure. By training the model on a large dataset of known secure and malicious smart contracts, it can learn to identify suspicious patterns that might indicate an ongoing attack. The GCN model can consider features such as function calls, control flow, and data dependencies to detect potential vulnerabilities or abnormal behavior. In this paper we are going to address the detection of reentrancy attack, timestamp dependence attack and infinite loop attack using Graph Convolution Network. Smartbugs wild dataset is used for performing the attack detection. By using GCN we are able to detect these attacks accurately and our model is compared with the existing models and it shows that our model is better than the existing models in terms of performance metrics.

Keywords:

Citation Owners
Information: There is no ciation to this publication.
Similar Articles










International Journal of Intelligent Systems and Applications in Engineering

Field :   Mühendislik

Journal Type :   Uluslararası

Metrics
Article : 1.632
Cite : 489
2023 Impact : 0.054
International Journal of Intelligent Systems and Applications in Engineering