{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:06:48Z","timestamp":1742980008997,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819751006"},{"type":"electronic","value":"9789819751013"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5101-3_3","type":"book-chapter","created":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T18:01:46Z","timestamp":1720980106000},"page":"44-63","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Vulnerability Detection for\u00a0Smart Contracts Using Gated Graph Neural Network"],"prefix":"10.1007","author":[{"given":"Yiwen","family":"Zhai","sequence":"first","affiliation":[]},{"given":"Jia","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Mingwu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,15]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/j.ins.2022.11.169","volume":"623","author":"M Zhang","year":"2023","unstructured":"Zhang, M., Yang, M., Shen, G., Xia, Z., Wang, Y.: A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of things. Inf. Sci. 623, 293\u2013310 (2023)","journal-title":"Inf. Sci."},{"key":"3_CR2","unstructured":"Brockschmidt, M.: GNN-FiLM: graph neural networks with feature-wise linear modulation. In: International Conference on Machine Learning, pp. 1144\u20131152. PMLR (2020)"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Cho, K., et al.: Learning phrase representations using RNN encoder-decoder for statistical machine translation. In: Conference on Empirical Methods in Naturel Language Processing (2014)","DOI":"10.3115\/v1\/D14-1179"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Durieux, T., Ferreira, J.F., Abreu, R., Cruz, P.: Empirical review of automated analysis tools on 47,587 Ethereum smart contracts. In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering, pp. 530\u2013541 (2020)","DOI":"10.1145\/3377811.3380364"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Feist, J., Grieco, G., Groce, A.: Slither: a static analysis framework for smart contracts. In: 2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), pp. 8\u201315. IEEE (2019)","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Ferreira, J.F., Cruz, P., Durieux, T., Abreu, R.: SmartBugs: a framework to analyze solidity smart contracts. In: Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering, pp. 1349\u20131352 (2020)","DOI":"10.1145\/3324884.3415298"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Ghaleb, A., Pattabiraman, K.: How effective are smart contract analysis tools? Evaluating smart contract static analysis tools using bug injection. In: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 415\u2013427 (2020)","DOI":"10.1145\/3395363.3397385"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Gori, M., Monfardini, G., Scarselli, F.: A new model for learning in graph domains. In: Proceedings. 2005 IEEE International Joint Conference on Neural Networks, vol.\u00a02, pp. 729\u2013734 (2005)","DOI":"10.1109\/IJCNN.2005.1555942"},{"issue":"10","key":"3_CR9","doi-asserted-by":"publisher","first-page":"2222","DOI":"10.1109\/TNNLS.2016.2582924","volume":"28","author":"K Greff","year":"2016","unstructured":"Greff, K., Srivastava, R.K., Koutn\u00edk, J., Steunebrink, B.R., Schmidhuber, J.: LSTM: a search space Odyssey. IEEE Trans. Neural Netw. Learn. Syst. 28(10), 2222\u20132232 (2016)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Jiang, B., Liu, Y., Chan, W.K.: ContractFuzzer: fuzzing smart contracts for vulnerability detection. In: 2018 33rd IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 259\u2013269. IEEE (2018)","DOI":"10.1145\/3238147.3238177"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Kushwaha, S.S., Joshi, S., Singh, D., Kaur, M., Lee, H.N.: Ethereum smart contract analysis tools: a systematic review. In: IEEE Access (2022)","DOI":"10.1109\/ACCESS.2022.3169902"},{"key":"3_CR12","unstructured":"Li, Y., Tarlow, D., Brockschmidt, M., Zemel, R.: Gated graph sequence neural networks. In: Proceedings of the 2016 International Conference on Learning Representations (2016)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Liao, J.W., Tsai, T.T., He, C.K., Tien, C.W.: SoliAudit: smart contract vulnerability assessment based on machine learning and fuzz testing. In: 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pp. 458\u2013465. IEEE (2019)","DOI":"10.1109\/IOTSMS48152.2019.8939256"},{"issue":"2","key":"3_CR14","first-page":"1296","volume":"35","author":"Z Liu","year":"2021","unstructured":"Liu, Z., Qian, P., Wang, X., Zhuang, Y., Qiu, L., Wang, X.: Combining graph neural networks with expert knowledge for smart contract vulnerability detection. IEEE Trans. Knowl. Data Eng. 35(2), 1296\u20131310 (2021)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Luu, L., Chu, D.H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 254\u2013269 (2016)","DOI":"10.1145\/2976749.2978309"},{"issue":"3","key":"3_CR16","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/0020-0255(79)90023-9","volume":"19","author":"JJ McGregor","year":"1979","unstructured":"McGregor, J.J.: Relational consistency algorithms and their application in finding subgraph and graph isomorphisms. Inf. Sci. 19(3), 229\u2013250 (1979)","journal-title":"Inf. Sci."},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Mi, F., Wang, Z., Zhao, C., Guo, J., Ahmed, F., Khan, L.: VSCL: automating vulnerability detection in smart contracts with deep learning. In: 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp.\u00a01\u20139. IEEE (2021)","DOI":"10.1109\/ICBC51069.2021.9461050"},{"key":"3_CR18","unstructured":"Mueller, B.: Smashing Ethereum smart contracts for fun and real profit. In: HITB SECCONF Amsterdam, vol. 9, p. 54 (2018)"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., et al.: MANDO: multi-level heterogeneous graph embeddings for fine-grained detection of smart contract vulnerabilities, pp. 1\u201310 (2022)","DOI":"10.1109\/DSAA54385.2022.10032337"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Nikoli\u0107, I., Kolluri, A., Sergey, I., Saxena, P., Hobor, A.: Finding the greedy, prodigal, and suicidal contracts at scale. In: Proceedings of the 34th Annual Computer Security Applications Conference, pp. 653\u2013663 (2018)","DOI":"10.1145\/3274694.3274743"},{"key":"3_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1007\/978-3-319-93417-4_38","volume-title":"The Semantic Web","author":"M Schlichtkrull","year":"2018","unstructured":"Schlichtkrull, M., Kipf, T.N., Bloem, P., van\u00a0den Berg, R., Titov, I., Welling, M.: Modeling relational data with graph convolutional networks. In: Gangemi, A., et al. (eds.) ESWC 2018. LNCS, vol. 10843, pp. 593\u2013607. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93417-4_38"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Tikhomirov, S., Voskresenskaya, E., Ivanitskiy, I., Takhaviev, R., Marchenko, E., Alexandrov, Y.: SmartCheck: static analysis of Ethereum smart contracts. In: Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, pp. 9\u201316 (2018)","DOI":"10.1145\/3194113.3194115"},{"issue":"7","key":"3_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3464421","volume":"54","author":"P Tolmach","year":"2021","unstructured":"Tolmach, P., Li, Y., Lin, S.W., Liu, Y., Li, Z.: A survey of smart contract formal specification and verification. ACM Comput. Surv. 54(7), 1\u201338 (2021)","journal-title":"ACM Comput. Surv."},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Tsankov, P., Dan, A., Drachsler-Cohen, D., Gervais, A., Buenzli, F., Vechev, M.: Securify: practical security analysis of smart contracts. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 67\u201382 (2018)","DOI":"10.1145\/3243734.3243780"},{"issue":"20","key":"3_CR25","first-page":"10","volume":"1050","author":"P Velickovic","year":"2017","unstructured":"Velickovic, P., Cucurull, G., Casanova, A., Romero, A., Lio, P., Bengio, Y., et al.: Graph attention networks. STAT 1050(20), 10\u201348550 (2017)","journal-title":"STAT"},{"issue":"2","key":"3_CR26","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1109\/TNSE.2020.2968505","volume":"8","author":"W Wang","year":"2020","unstructured":"Wang, W., Song, J., Xu, G., Li, Y., Wang, H., Su, C.: ContractWard: automated vulnerability detection models for Ethereum smart contracts. IEEE Trans. Netw. Sci. Eng. 8(2), 1133\u20131144 (2020)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"2","key":"3_CR27","doi-asserted-by":"publisher","first-page":"770","DOI":"10.3390\/app13020770","volume":"13","author":"H Wu","year":"2023","unstructured":"Wu, H., Dong, H., He, Y., Duan, Q.: Smart contract vulnerability detection based on hybrid attention mechanism model. Appl. Sci. 13(2), 770 (2023)","journal-title":"Appl. Sci."},{"key":"3_CR28","unstructured":"Xu, K., Li, C., Tian, Y., Sonobe, T., Kawarabayashi, K.i., Jegelka, S.: Representation learning on graphs with jumping knowledge networks. In: International Conference on Machine Learning, pp. 5453\u20135462. PMLR (2018)"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Yu, X., Zhao, H., Hou, B., Ying, Z., Wu, B.: DeeSCVHunter: a deep learning-based framework for smart contract vulnerability detection. In: 2021 International Joint Conference on Neural Networks (IJCNN), pp.\u00a01\u20138. IEEE (2021)","DOI":"10.1109\/IJCNN52387.2021.9534324"},{"issue":"9","key":"3_CR30","doi-asserted-by":"publisher","first-page":"3577","DOI":"10.3390\/s22093577","volume":"22","author":"L Zhang","year":"2022","unstructured":"Zhang, L., et al.: CBGRU: a detection method of smart contract vulnerability based on a hybrid model. Sensors 22(9), 3577 (2022)","journal-title":"Sensors"},{"key":"3_CR31","doi-asserted-by":"publisher","first-page":"102619","DOI":"10.1016\/j.sysarc.2022.102619","volume":"129","author":"M Zhang","year":"2022","unstructured":"Zhang, M., Yang, M., Shen, G.: SSBAS-FA: a secure sealed-bid e-auction scheme with fair arbitration based on time-released blockchain. J. Syst. Architect. 129, 102619 (2022)","journal-title":"J. Syst. Architect."},{"issue":"11","key":"3_CR32","doi-asserted-by":"publisher","first-page":"326","DOI":"10.3390\/fi14110326","volume":"14","author":"Y Zhang","year":"2022","unstructured":"Zhang, Y., Liu, D.: Toward vulnerability detection for Ethereum smart contracts using graph-matching network. Fut. Internet 14(11), 326 (2022)","journal-title":"Fut. Internet"},{"issue":"10","key":"3_CR33","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TSE.2019.2942301","volume":"47","author":"W Zou","year":"2021","unstructured":"Zou, W., et al.: Smart contract development: challenges and opportunities. IEEE Trans. Softw. Eng. 47(10), 2084\u20132106 (2021)","journal-title":"IEEE Trans. Softw. Eng."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5101-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T03:12:57Z","timestamp":1732417977000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5101-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819751006","9789819751013"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5101-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"15 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACISP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australasian Conference on Information Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acisp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.acisp24.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}