首页 > 最新文献

Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure最新文献

英文 中文
DecFL: An Ubiquitous Decentralized Model Training Protocol and Framework Empowered by Blockchain DecFL:由区块链授权的无处不在的去中心化模型训练协议和框架
Felix Morsbach, S. Toor
Machine learning has become ubiquitous across many fields in the last decade and modern real world applications often require a decentralized solution for training such models. This demand sprouted the research in federated learning, which solves some of the challenges with centralized machine learning, but at the same times raises further questions in regard to security, privacy and scalability. We have designed and implemented DecFL, an ubiquitous protocol for decentralized model training. The protocol is machine-learning-model-, vendor-, and technology-agnostic and provides a basis for practitioner's own implementations. The implemented DecFL framework presented in this article is an exemplary realization of the carefully designed protocol stack based on Ethereum and IPFS and offers a scalable baseline solution for decentralized machine learning. In this article, we present a study based on the proposed protocol, its theoretical bounds and experiments based on the implemented framework. Using open-source datasets (MNIST and CIFAR10), we demonstrate key features, the actual cost of training a model (in euro) and the communication overhead. We further show that through a proper choice of technologies DecFL achieves a linear scaling, which is a non-trivial task in a decentralized setting. Along with discussing some of the security challenges in the field, we highlight aggregation poisoning as a relevant attack vector, its associated risks and a possible prevention strategy for decentralized model training through DecFL.
在过去十年中,机器学习在许多领域变得无处不在,现代现实世界的应用通常需要一个分散的解决方案来训练这样的模型。这种需求催生了联邦学习的研究,它解决了集中式机器学习的一些挑战,但同时也提出了关于安全性、隐私性和可扩展性的进一步问题。我们设计并实现了DecFL,这是一种用于分散模型训练的无处不在的协议。该协议与机器学习模型、供应商和技术无关,并为实践者自己的实现提供了基础。本文中提出的实现DecFL框架是基于以太坊和IPFS精心设计的协议栈的典范实现,并为分散的机器学习提供了可扩展的基线解决方案。在本文中,我们基于提出的协议,其理论边界和基于实现框架的实验进行了研究。使用开源数据集(MNIST和CIFAR10),我们展示了关键特征,训练模型的实际成本(欧元)和通信开销。我们进一步表明,通过适当的技术选择,DecFL实现了线性扩展,这在分散的环境中是一项重要的任务。除了讨论该领域的一些安全挑战外,我们还强调了聚合中毒作为一个相关的攻击向量,其相关风险以及通过DecFL进行分散模型训练的可能预防策略。
{"title":"DecFL: An Ubiquitous Decentralized Model Training Protocol and Framework Empowered by Blockchain","authors":"Felix Morsbach, S. Toor","doi":"10.1145/3457337.3457842","DOIUrl":"https://doi.org/10.1145/3457337.3457842","url":null,"abstract":"Machine learning has become ubiquitous across many fields in the last decade and modern real world applications often require a decentralized solution for training such models. This demand sprouted the research in federated learning, which solves some of the challenges with centralized machine learning, but at the same times raises further questions in regard to security, privacy and scalability. We have designed and implemented DecFL, an ubiquitous protocol for decentralized model training. The protocol is machine-learning-model-, vendor-, and technology-agnostic and provides a basis for practitioner's own implementations. The implemented DecFL framework presented in this article is an exemplary realization of the carefully designed protocol stack based on Ethereum and IPFS and offers a scalable baseline solution for decentralized machine learning. In this article, we present a study based on the proposed protocol, its theoretical bounds and experiments based on the implemented framework. Using open-source datasets (MNIST and CIFAR10), we demonstrate key features, the actual cost of training a model (in euro) and the communication overhead. We further show that through a proper choice of technologies DecFL achieves a linear scaling, which is a non-trivial task in a decentralized setting. Along with discussing some of the security challenges in the field, we highlight aggregation poisoning as a relevant attack vector, its associated risks and a possible prevention strategy for decentralized model training through DecFL.","PeriodicalId":270073,"journal":{"name":"Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130870002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Session details: BSCI Session 1 会议详情:BSCI会议1
Jiamou Liu
{"title":"Session details: BSCI Session 1","authors":"Jiamou Liu","doi":"10.1145/3467995","DOIUrl":"https://doi.org/10.1145/3467995","url":null,"abstract":"","PeriodicalId":270073,"journal":{"name":"Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130773145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralised Peer-to-Peer Crop Insurance 分散的点对点农作物保险
Vinayak Iyer, Kshitij Shah, S. Rane, R. Shankarmani
Agriculture is the lifeline of Indian economy which contributes to 22% of the GDP, provides 58% employment, and sustains 69% of the population. However, agricultural production comes with various risk factors beyond human control. Farmers are highly exposed to risk and it is aggravated by the limited span of risk mitigation instruments such as insurance where there is a lack of participation from the private sector and the claim payout procedure is very lengthy, due to which the farmer cannot initiate new cropping activity or it is delayed. There is no proper and adequate provision of security for crops grown by Indian farmers and despite increasing vulnerability, they have not yet fully developed the capacity to mitigate risk effectively. There is a need to design innovative insurance products to balance the interests of the insurer as well as the insured. With the Prime Minister's call to be "self sufficient" or "aatmanirbhar", in this paper we present a decentralised peer-to-peer crop insurance framework which enables to overcome the current disadvantages by securing farmers' interests, eliminating intermediaries and providing a secure, standardized, and transparent system that does not hinder any information from stakeholders. Through blockchain technology, the system promotes trust in a trust less environment wherein the farmers and the private investors go into a contract. The investors pool their investments and provide cover for the farmers, thus help the nation become self sufficient and help the farmers prosper.
农业是印度经济的生命线,贡献了22%的GDP,提供了58%的就业机会,养活了69%的人口。然而,农业生产伴随着各种人类无法控制的风险因素。农民面临的风险很高,而且由于保险等风险缓解工具的期限有限而加剧了这种风险,因为保险缺乏私营部门的参与,索赔支付程序非常漫长,因此农民无法开始新的种植活动或被推迟。印度农民种植的作物没有得到适当和充分的安全保障,尽管脆弱性日益增加,但他们尚未充分发展有效减轻风险的能力。有必要设计创新的保险产品,以平衡保险人和被保险人的利益。随着总理呼吁“自给自足”或“aatmanirbhar”,在本文中,我们提出了一个分散的点对点作物保险框架,通过确保农民的利益,消除中介,提供一个安全,标准化和透明的系统,不阻碍利益相关者的任何信息,从而克服当前的劣势。通过区块链技术,该系统在一个缺乏信任的环境中促进信任,在这个环境中,农民和私人投资者签订了合同。投资者将他们的投资集中起来,为农民提供保障,从而帮助国家实现自给自足,帮助农民致富。
{"title":"Decentralised Peer-to-Peer Crop Insurance","authors":"Vinayak Iyer, Kshitij Shah, S. Rane, R. Shankarmani","doi":"10.1145/3457337.3457837","DOIUrl":"https://doi.org/10.1145/3457337.3457837","url":null,"abstract":"Agriculture is the lifeline of Indian economy which contributes to 22% of the GDP, provides 58% employment, and sustains 69% of the population. However, agricultural production comes with various risk factors beyond human control. Farmers are highly exposed to risk and it is aggravated by the limited span of risk mitigation instruments such as insurance where there is a lack of participation from the private sector and the claim payout procedure is very lengthy, due to which the farmer cannot initiate new cropping activity or it is delayed. There is no proper and adequate provision of security for crops grown by Indian farmers and despite increasing vulnerability, they have not yet fully developed the capacity to mitigate risk effectively. There is a need to design innovative insurance products to balance the interests of the insurer as well as the insured. With the Prime Minister's call to be \"self sufficient\" or \"aatmanirbhar\", in this paper we present a decentralised peer-to-peer crop insurance framework which enables to overcome the current disadvantages by securing farmers' interests, eliminating intermediaries and providing a secure, standardized, and transparent system that does not hinder any information from stakeholders. Through blockchain technology, the system promotes trust in a trust less environment wherein the farmers and the private investors go into a contract. The investors pool their investments and provide cover for the farmers, thus help the nation become self sufficient and help the farmers prosper.","PeriodicalId":270073,"journal":{"name":"Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121628888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Session details: BSCI Short Paper Session 2 会议详情:BSCI短论文会议2
Xuyun Zhang
{"title":"Session details: BSCI Short Paper Session 2","authors":"Xuyun Zhang","doi":"10.1145/3467998","DOIUrl":"https://doi.org/10.1145/3467998","url":null,"abstract":"","PeriodicalId":270073,"journal":{"name":"Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133066243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Decentralized Chain (DDC) and k-Queue Variable Bulk Arrival and Static Bulk Service Model 分布式去中心化链(DDC)和k-Queue可变批量到达和静态批量服务模型
Abhilash Kancharla, Jongho Seol, Hyeyoung Kim, N. Park
This paper proposes a quantitative model for a new blockchain technology that distributes public ledger in a decentralized manner, referred to as Distributed Decentralized chain (DDC). A clique of k nodes in the P2P network participates in storing a complete copy of blockchain instead of having every node carry an entire copy. The proposed model is k-Queue Variable Bulk Arrival and Static Bulk Service queueing model (k-VBASBS), in which the state is defined by (i,k), where i is the number of slots from 0 upto n in a block on the current node, and k is the number of distributed nodes to store a complete copy of a chain of blocks. Without loss of generality and practicality, it is assumed that there are two different transaction posting rates assumed to take into account the overhead of inter-node (i.e., μ(inter-node)) control-hopping versus the one of the original intra-node posting rate (i.e., μ(intra-node)), and μ(inter-node)μ<<(intra-node). Based on the proposed k-VBASBS model, the average waiting time, space requirement, and throughput of the transactions will be simulated for the performance, and the dependability will be also modeled and simulated by the vulnerability to 51% attack.
本文提出了一种新的区块链技术的定量模型,该技术以去中心化的方式分发公共账本,称为分布式去中心化链(DDC)。P2P网络中k个节点组成的小团体参与存储区块链的完整副本,而不是让每个节点都携带完整副本。提出的模型是k- queue可变批量到达和静态批量服务队列模型(k- vbasbs),其状态定义为(i,k),其中i是当前节点上块中从0到n的槽数,k是用于存储区块链完整副本的分布式节点数。在不失去一般性和实用性的前提下,假设存在两种不同的交易发布率,以考虑节点间(即μ(节点间))控制跳的开销与原始节点内发布率(即μ(节点内))和μ(节点间)μ<<(节点内)的开销。基于所提出的k-VBASBS模型,对事务的平均等待时间、空间需求和吞吐量进行性能模拟,并对可靠性进行51%攻击脆弱性的建模和模拟。
{"title":"Distributed Decentralized Chain (DDC) and k-Queue Variable Bulk Arrival and Static Bulk Service Model","authors":"Abhilash Kancharla, Jongho Seol, Hyeyoung Kim, N. Park","doi":"10.1145/3457337.3457840","DOIUrl":"https://doi.org/10.1145/3457337.3457840","url":null,"abstract":"This paper proposes a quantitative model for a new blockchain technology that distributes public ledger in a decentralized manner, referred to as Distributed Decentralized chain (DDC). A clique of k nodes in the P2P network participates in storing a complete copy of blockchain instead of having every node carry an entire copy. The proposed model is k-Queue Variable Bulk Arrival and Static Bulk Service queueing model (k-VBASBS), in which the state is defined by (i,k), where i is the number of slots from 0 upto n in a block on the current node, and k is the number of distributed nodes to store a complete copy of a chain of blocks. Without loss of generality and practicality, it is assumed that there are two different transaction posting rates assumed to take into account the overhead of inter-node (i.e., μ(inter-node)) control-hopping versus the one of the original intra-node posting rate (i.e., μ(intra-node)), and μ(inter-node)μ<<(intra-node). Based on the proposed k-VBASBS model, the average waiting time, space requirement, and throughput of the transactions will be simulated for the performance, and the dependability will be also modeled and simulated by the vulnerability to 51% attack.","PeriodicalId":270073,"journal":{"name":"Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124262817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach for Developing Decentralized Storage and Sharing Systems 一种开发分散存储和共享系统的新方法
Canh Tran, Van-Duy Pham, Thang Nguyen, Huu Dinh, Minh-Tri Hoang, Thanh-Chung Dao, B. Nguyen, Ba-Lam Do
In recent years, the proliferation of blockchain technology has opened many research directions. In this context, the combination of blockchain-based techniques and traditional methods to improve existing systems has received significant interest from researchers. In this paper, we present a decentralized storage and sharing system based on a combination of IPFS (Inter-Planetary File System), encryption technologies (including Advanced Encryption Standard (AES), Elliptic Curve Cryptosystem (ECC), ABE (Attribute-based Encryption), Multi-Authority ABE (MA-ABE)), and multichain. In particular, we facilitate the advantages of the IPFS network to store user's data in a distributed manner. Furthermore, we make use of a cryptographer to protect the privacy of data. The hash returned by the IPFS network will be stored in our multichain architecture to provide transparency for all users participating in the system. To the best of our knowledge, it is the first storage and sharing system using IPFS, cryptographer, and multichain to ensure decentralized, trustworthy, transparent characteristics for storing and sharing data.
近年来,区块链技术的扩散打开了许多研究方向。在这种情况下,基于区块链的技术和传统方法的结合来改进现有系统已经引起了研究人员的极大兴趣。在本文中,我们提出了一个基于IPFS(星际文件系统)、加密技术(包括高级加密标准(AES)、椭圆曲线密码系统(ECC)、ABE(基于属性的加密)、Multi-Authority ABE (MA-ABE))和多链的分散存储和共享系统。特别是利用IPFS网络的优势,以分布式的方式存储用户的数据。此外,我们利用密码学来保护数据的隐私。IPFS网络返回的哈希值将存储在我们的多链架构中,为参与系统的所有用户提供透明度。据我们所知,它是第一个使用IPFS,密码学和多链来确保存储和共享数据的分散,可信,透明特性的存储和共享系统。
{"title":"A Novel Approach for Developing Decentralized Storage and Sharing Systems","authors":"Canh Tran, Van-Duy Pham, Thang Nguyen, Huu Dinh, Minh-Tri Hoang, Thanh-Chung Dao, B. Nguyen, Ba-Lam Do","doi":"10.1145/3457337.3457845","DOIUrl":"https://doi.org/10.1145/3457337.3457845","url":null,"abstract":"In recent years, the proliferation of blockchain technology has opened many research directions. In this context, the combination of blockchain-based techniques and traditional methods to improve existing systems has received significant interest from researchers. In this paper, we present a decentralized storage and sharing system based on a combination of IPFS (Inter-Planetary File System), encryption technologies (including Advanced Encryption Standard (AES), Elliptic Curve Cryptosystem (ECC), ABE (Attribute-based Encryption), Multi-Authority ABE (MA-ABE)), and multichain. In particular, we facilitate the advantages of the IPFS network to store user's data in a distributed manner. Furthermore, we make use of a cryptographer to protect the privacy of data. The hash returned by the IPFS network will be stored in our multichain architecture to provide transparency for all users participating in the system. To the best of our knowledge, it is the first storage and sharing system using IPFS, cryptographer, and multichain to ensure decentralized, trustworthy, transparent characteristics for storing and sharing data.","PeriodicalId":270073,"journal":{"name":"Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124944144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Anomaly Event Detection Method Based on GNN Algorithm for Multi-data Sources 基于GNN算法的多数据源异常事件检测方法
Yipeng Ji, Jingyi Wang, Shaoning Li, Yangyang Li, Shenwen Lin, Xiong Li
Anomaly event detection is crucial for critical infrastructure security(transportation system, social-ecological sector, insurance service, government sector etc.) due to its ability to reveal and address the potential cyber-threats in advance by analysing the data(messages, microblogs, logs etc.) from digital systems and networks. However, the convenience and applicability of smart devices and the maturity of connected technology make the social anomaly events data multi-source and dynamic, which result in the inadaptability for multi-source data detection and thus affect the critical infrastructure security. To effectively address the proposed problems, in this paper, we design a novel anomaly detection method based on multi-source data. First, we leverage spectral clustering algorithm for feature extraction and fusion of multiple data sources. Second, by harnessing the power of deep graph neural network(Deep-GNN), we perform a fine-gained anomaly social event detection, revealing the threatening events and guarantee the critical infrastructure security. Experimental results demonstrate that our framework outperforms other baseline anomaly event detection methods and shows high tracking accuracy, strong robustness and stability.
异常事件检测对于关键基础设施安全(交通系统、社会生态部门、保险服务、政府部门等)至关重要,因为它能够通过分析来自数字系统和网络的数据(消息、微博、日志等)提前揭示和解决潜在的网络威胁。然而,智能设备的方便性和适用性以及互联技术的成熟,使得社会异常事件数据具有多源性和动态性,从而导致对多源数据检测的不适应性,从而影响关键基础设施的安全。为了有效地解决上述问题,本文设计了一种基于多源数据的异常检测方法。首先,我们利用光谱聚类算法进行多数据源的特征提取和融合。其次,利用深度图神经网络(deep - gnn)的力量,进行精细获得的异常社会事件检测,揭示威胁事件,保证关键基础设施的安全。实验结果表明,该框架优于其他基线异常事件检测方法,具有较高的跟踪精度、较强的鲁棒性和稳定性。
{"title":"An Anomaly Event Detection Method Based on GNN Algorithm for Multi-data Sources","authors":"Yipeng Ji, Jingyi Wang, Shaoning Li, Yangyang Li, Shenwen Lin, Xiong Li","doi":"10.1145/3457337.3457846","DOIUrl":"https://doi.org/10.1145/3457337.3457846","url":null,"abstract":"Anomaly event detection is crucial for critical infrastructure security(transportation system, social-ecological sector, insurance service, government sector etc.) due to its ability to reveal and address the potential cyber-threats in advance by analysing the data(messages, microblogs, logs etc.) from digital systems and networks. However, the convenience and applicability of smart devices and the maturity of connected technology make the social anomaly events data multi-source and dynamic, which result in the inadaptability for multi-source data detection and thus affect the critical infrastructure security. To effectively address the proposed problems, in this paper, we design a novel anomaly detection method based on multi-source data. First, we leverage spectral clustering algorithm for feature extraction and fusion of multiple data sources. Second, by harnessing the power of deep graph neural network(Deep-GNN), we perform a fine-gained anomaly social event detection, revealing the threatening events and guarantee the critical infrastructure security. Experimental results demonstrate that our framework outperforms other baseline anomaly event detection methods and shows high tracking accuracy, strong robustness and stability.","PeriodicalId":270073,"journal":{"name":"Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129606400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts Eth2Vec:学习以太坊智能合约漏洞检测的合约范围代码表示
Nami Ashizawa, Naoto Yanai, Jason Paul Cruz, Shingo Okamura
Ethereum smart contracts are programs that run on the Ethereum blockchain, and many smart contract vulnerabilities have been discovered in the past decade. Many security analysis tools have been created to detect such vulnerabilities, but their performance decreases drastically when codes to be analyzed are being rewritten. In this paper, we propose Eth2Vec, a machine-learning-based static analysis tool for vulnerability detection in smart contracts. It is also robust against code rewrites, i.e., it can detect vulnerabilities even in rewritten codes. Existing machine-learning-based static analysis tools for vulnerability detection need features, which analysts create manually, as inputs. In contrast, Eth2Vec automatically learns features of vulnerable Ethereum Virtual Machine (EVM) bytecodes with tacit knowledge through a neural network for natural language processing. Therefore, Eth2Vec can detect vulnerabilities in smart contracts by comparing the code similarity between target EVM bytecodes and the EVM bytecodes it already learned. We conducted experiments with existing open databases, such as Etherscan, and our results show that Eth2Vec outperforms a recent model based on support vector machine in terms of well-known metrics, i.e., precision, recall, and F1-score.
以太坊智能合约是在以太坊区块链上运行的程序,在过去十年中发现了许多智能合约漏洞。已经创建了许多安全分析工具来检测此类漏洞,但是当要分析的代码被重写时,它们的性能会急剧下降。在本文中,我们提出了Eth2Vec,一种基于机器学习的静态分析工具,用于智能合约中的漏洞检测。它对代码重写也很健壮,也就是说,它甚至可以在重写的代码中检测漏洞。现有的基于机器学习的漏洞检测静态分析工具需要分析人员手动创建的特征作为输入。相比之下,Eth2Vec通过神经网络进行自然语言处理,以隐性知识自动学习易受攻击的以太坊虚拟机(EVM)字节码的特征。因此,Eth2Vec可以通过比较目标EVM字节码与它已经学习到的EVM字节码之间的代码相似性来检测智能合约中的漏洞。我们对现有的开放数据库(如Etherscan)进行了实验,结果表明,Eth2Vec在众所周知的指标(即精度、召回率和f1分数)方面优于最近基于支持向量机的模型。
{"title":"Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts","authors":"Nami Ashizawa, Naoto Yanai, Jason Paul Cruz, Shingo Okamura","doi":"10.1145/3457337.3457841","DOIUrl":"https://doi.org/10.1145/3457337.3457841","url":null,"abstract":"Ethereum smart contracts are programs that run on the Ethereum blockchain, and many smart contract vulnerabilities have been discovered in the past decade. Many security analysis tools have been created to detect such vulnerabilities, but their performance decreases drastically when codes to be analyzed are being rewritten. In this paper, we propose Eth2Vec, a machine-learning-based static analysis tool for vulnerability detection in smart contracts. It is also robust against code rewrites, i.e., it can detect vulnerabilities even in rewritten codes. Existing machine-learning-based static analysis tools for vulnerability detection need features, which analysts create manually, as inputs. In contrast, Eth2Vec automatically learns features of vulnerable Ethereum Virtual Machine (EVM) bytecodes with tacit knowledge through a neural network for natural language processing. Therefore, Eth2Vec can detect vulnerabilities in smart contracts by comparing the code similarity between target EVM bytecodes and the EVM bytecodes it already learned. We conducted experiments with existing open databases, such as Etherscan, and our results show that Eth2Vec outperforms a recent model based on support vector machine in terms of well-known metrics, i.e., precision, recall, and F1-score.","PeriodicalId":270073,"journal":{"name":"Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134078724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
期刊
Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1