Skip to main content
Article
Unknown Threats Detection Methods of Smart Contracts
IEEE Internet of Things Journal
  • Daojing He, Harbin Institute of Technology
  • Ke Ding, East China Normal University
  • Sammy Chan, City University of Hong Kong
  • Mohsen Guizani, Mohamed Bin Zayed University of Artificial Intelligence
Document Type
Article
Abstract

With the explosive growth of blockchain platforms and applications, security threats of blockchain also occur frequently. As a decentralized application deployed on the blockchain, smart contracts help the blockchain realize safe and efficient information storage, asset management, and value transfer. Therefore, smart contracts play a vital role in the security of the blockchain. In recent years, security threats against smart contracts have increased, not only causing huge economic losses but also impacting the credit system of the blockchain. Therefore, many researchers have carried out corresponding research on the security threats of smart contracts. Common threat detection methods include formal verification, symbolic execution, fuzzing, etc. Most of these methods are only for known threats, while there is not much work on detecting unknown threats. In order to better deal with unknown threats, we present a review of the typical smart contract security events in recent years, analyze the security threats from contract coding, Ethereum virtual machine, and blockchain characteristics. Further, we compare and summarize the latest unknown threat detection methods. Then, to address the problem that very few unknown threat samples are available, a detection method based on a few-shot learning is proposed.

DOI
10.1109/JIOT.2023.3299492
Publication Date
7-28-2023
Keywords
  • Blockchain,
  • Blockchains,
  • Decentralized autonomous organization,
  • Encoding,
  • Few-shot Learning,
  • Internet of Things,
  • Security,
  • Smart Contract,
  • Smart contracts,
  • Threat assessment,
  • Unknown Threats,
  • Vulnerability Detection
Comments

IR Deposit conditions:

OA version (pathway a) Accepted version

No embargo

When accepted for publication, set statement to accompany deposit (see policy)

Must link to publisher version with DOI

Publisher copyright and source must be acknowledged

Citation Information
D. He, K. Ding, S. Chan and M. Guizani, "Unknown Threats Detection Methods of Smart Contracts," in IEEE Internet of Things Journal, doi: 10.1109/JIOT.2023.3299492.