Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
In this study, we propose a novel approach, Peculiar, which uses Pre-training technique for detection of smart contract vulnerabilities based on crucial data ...
In this study, we propose a novel approach, Peculiar, which uses Pre-training technique for detection of smart contract vulnerabilities based on crucial data.
In this study, we propose a novel approach, Peculiar, which uses Pre-training technique for detection of smart contract vulnerabilities based on crucial data ...
Aug 17, 2021 · In this study, we propose a novel approach, Peculiar, which uses Pre-training technique for detection of smart contract vulnerabilities based on ...
People also ask
The tools analysis results we use is Vulnerability Analysis of Smart Contracts using SmartBugs and filtered following the paper Empirical Review of Automated ...
In this study, we propose a novel approach, Peculiar, which uses Pre-training technique for detection of smart contract vulnerabilities based on crucial data.
Sep 6, 2023 · Here, we propose a novel method SCGformer to detect Ethereum smart contract vulnerabilities. Firstly, we build control flow graph based on smart ...
To detect reentrancy vulnerabilities, Wu et al. proposed a peculiar approach for extracting critical data flow graphs from the smart contract code [17] .
Sep 6, 2023 · To address this problem, we propose a novel vulnerability detection method based on transformer by constructing the control flow graph (CFG) of ...
Mar 29, 2024 · Wu et al., “Peculiar: Smart Contract Vulnerability Detection Based on Crucial Data Flow Graph and Pre-training Techniques,” Proc. – Int.