Results 1 to 10 of about 372,889 (280)

Smart Contract Vulnerability Detection Based on Deep Learning and Multimodal Decision Fusion [PDF]

open access: yesSensors, 2023
With the rapid development and widespread application of blockchain technology in recent years, smart contracts running on blockchains often face security vulnerability problems, resulting in significant economic losses.
Weichu Deng   +5 more
doaj   +2 more sources

A new method of software vulnerability detection based on a quantum neural network [PDF]

open access: yesScientific Reports, 2022
In the field of network security, although there has been related work on software vulnerability detection based on classic machine learning, detection ability is directly proportional to the scale of training data.
Xin Zhou   +9 more
doaj   +2 more sources

Smart Contract Vulnerability Detection Model Based on Multi-Task Learning [PDF]

open access: yesSensors, 2022
The key issue in the field of smart contract security is efficient and rapid vulnerability detection in smart contracts. Most of the existing detection methods can only detect the presence of vulnerabilities in the contract and can hardly identify their ...
Jing Huang   +3 more
doaj   +2 more sources

A Novel Smart Contract Vulnerability Detection Method Based on Information Graph and Ensemble Learning [PDF]

open access: yesSensors, 2022
Blockchain presents a chance to address the security and privacy issues of the Internet of Things; however, blockchain itself has certain security issues. How to accurately identify smart contract vulnerabilities is one of the key issues at hand.
Lejun Zhang   +6 more
doaj   +2 more sources

Data on Vulnerability Detection in Android. [PDF]

open access: yesData Brief, 2019
The data in this article have been collaborated from mainly four sources- Google Playstore, Wandoujia (third party app store market), AMD and Androzoo. These data include ~85,000 APKs (Android Package Kit), both malicious and benign from these data sources.
Garg S, Baliyan N.
europepmc   +4 more sources

Smart Contract Vulnerability Detection Based on Abstract Syntax Tree Pruning [PDF]

open access: yesJisuanji kexue, 2023
With the development of blockchain technology,smart contracts have been widely used in various fields,and Ethereum has become the largest smart contract platform.At the same time,the frequent smart contract vulnerabilities have caused huge economic ...
LIU Zerun, ZHENG Hong, QIU Junjie
doaj   +1 more source

Intelligent vulnerability detection system based on graph structured source code slice

open access: yes网络与信息安全学报, 2021
For the intelligent vulnerability detection, the system extracts the graph structured source code slices according to the vulnerability characteristics from the program dependency graph of source code, and then presents the graph structured slice ...
ZOU Deqing   +3 more
doaj   +3 more sources

Survey on static software vulnerability detection for source code

open access: yes网络与信息安全学报, 2019
Static software vulnerability detection is mainly divided into two types according to different analysis objects: vulnerability detection for binary code and vulnerability detection for source code.
LI Zhen, WANG Zeli, JIN Hai, ZOU Deqing
doaj   +3 more sources

Operation System Vulnerabilities Analysis Based on Code Clone Detection

open access: yesJisuanji kexue yu tansuo, 2021
Software vulnerability detection based on code clone detection technology is an important direction in the static analysis of software vulnerability. At present, the existing software vulnerability detection tools have deficie-ncies in the vulnerability ...
WANG Zhe, REN Yi, ZHOU Kai, GUAN Jianbo, TAN Yusong
doaj   +1 more source

An Opcode-Based Vulnerability Detection of Smart Contracts

open access: yesApplied Sciences, 2023
Aiming at the problem of insufficient technology for detecting smart contract vulnerabilities and the lack of improvement of certain detection tools, a method for the expansion and improvement of the internal module of the Mythril method is proposed ...
Jia Sui, Lili Chu, Han Bao
doaj   +1 more source

Home - About - Disclaimer - Privacy