Vulnerability detection in smart contact using chaos optimization-based DL model

Srinivas A Vaddadi, Sanjaikanth E Vadakkethil Somanathan Pillai, Rohith Vallabhaneni, Santosh Reddy Addula, Bhuvanesh Ananthan

Abstract


This research article introduces a deep learning (DL) for identifying vulnerabilities in the smart contracts, leveraging an optimized DL method. The proposed method, termed LogT BiLSTM, combines bidirectional long short-term memory (BiLSTM) with logistic chaos Tasmanian devil optimization (LogT) for enhancing detection of vulnerability. The evaluation of the suggested approach is conducted using publicly available datasets. Initially, preprocessing steps involve removing duplicate data and imputing missing data. Subsequently, the vulnerability detection process utilizes BiLSTM, with the optimization of the loss function achieved through LogT. Results indicate promising performance in identifying vulnerabilities in SC, highlighting the efficacy of the LogT-BiLSTM approach.

Keywords


Blockchain; Deep learning; Loss function optimization; Smart contract; Vulnerability detection

Full Text:

PDF


DOI: http://doi.org/10.11591/ijeecs.v38.i3.pp1793-1803

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Indonesian Journal of Electrical Engineering and Computer Science (IJEECS)
p-ISSN: 2502-4752, e-ISSN: 2502-4760
This journal is published by the Institute of Advanced Engineering and Science (IAES).

shopify stats IJEECS visitor statistics