{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T12:50:39Z","timestamp":1745412639507},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"National Key Research and Development Project","award":["No: 2022YFB2703100","No: 2022YFB2703100"],"award-info":[{"award-number":["No: 2022YFB2703100","No: 2022YFB2703100"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s00530-024-01406-9","type":"journal-article","created":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T12:01:47Z","timestamp":1720612907000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph"],"prefix":"10.1007","volume":"30","author":[{"given":"Peng","family":"Su","sequence":"first","affiliation":[]},{"given":"Jingyuan","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,10]]},"reference":[{"key":"1406_CR1","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.jksuci.2022.08.029","volume":"35","author":"M Almakhour","year":"2023","unstructured":"Almakhour, M., Sliman, L., Samhat, A.E., et al.: A formal verification approach for composite smart contracts security using fsm. J. King Saud Univ. Comput. Inf. Sci. 35, 70\u201386 (2023). https:\/\/doi.org\/10.1016\/j.jksuci.2022.08.029","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"1406_CR2","doi-asserted-by":"publisher","first-page":"99552","DOI":"10.1109\/ACCESS.2020.2995183","volume":"8","author":"I Ashraf","year":"2020","unstructured":"Ashraf, I., Ma, X., Jiang, B., et al.: Gasfuzzer: fuzzing ethereum smart contract binaries to expose gas-oriented exception security vulnerabilities. IEEE Access 8, 99552\u201399564 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2995183","journal-title":"IEEE Access"},{"unstructured":"Bahdanau, D., Cho, K., Bengio, Y.: Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473(2014)","key":"1406_CR3"},{"key":"1406_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111919","volume":"209","author":"J Cai","year":"2024","unstructured":"Cai, J., Li, B., Zhang, T., et al.: Fine-grained smart contract vulnerability detection by heterogeneous code feature learning and automated dataset construction. J. Syst. Softw. 209, 111919 (2024). https:\/\/doi.org\/10.1016\/j.jss.2023.111919","journal-title":"J. Syst. Softw."},{"key":"1406_CR5","doi-asserted-by":"publisher","first-page":"2189","DOI":"10.1109\/TSE.2021.3054928","volume":"48","author":"J Chen","year":"2021","unstructured":"Chen, J., Xia, X., Lo, D., et al.: Defectchecker: automated smart contract defect detection by analyzing evm bytecode. IEEE Trans. Softw. Eng. 48, 2189\u20132207 (2021). https:\/\/doi.org\/10.1109\/TSE.2021.3054928","journal-title":"IEEE Trans. Softw. Eng."},{"doi-asserted-by":"publisher","unstructured":"Chen, Y., Sun, Z., Gong, Z., et\u00a0al.: Improving smart contract security with contrastive learning-based vulnerability detection. In: 2024 IEEE\/ACM 46th International Conference on Software Engineering, pp. 1\u201311. ACM, New York (2024). https:\/\/doi.org\/10.1145\/3597503.3639173","key":"1406_CR6","DOI":"10.1145\/3597503.3639173"},{"key":"1406_CR7","doi-asserted-by":"publisher","first-page":"23549","DOI":"10.1109\/ACCESS.2024.3364351","volume":"12","author":"LSH Colin","year":"2024","unstructured":"Colin, L.S.H., Mohan, P.M., Pan, J., et al.: An integrated smart contract vulnerability detection tool using multi-layer perceptron on real-time solidity smart contracts. IEEE Access 12, 23549\u201323567 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3364351","journal-title":"IEEE Access"},{"unstructured":"Devlin, J., Chang, MW., Lee, K., et\u00a0al.: Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)","key":"1406_CR8"},{"key":"1406_CR9","doi-asserted-by":"publisher","first-page":"2874","DOI":"10.1109\/TSE.2020.2971482","volume":"47","author":"Z Gao","year":"2020","unstructured":"Gao, Z., Jiang, L., Xia, X., et al.: Checking smart contracts with structural code embedding. IEEE Trans. Softw. Eng. 47, 2874\u20132891 (2020). https:\/\/doi.org\/10.1109\/TSE.2020.2971482","journal-title":"IEEE Trans. Softw. Eng."},{"key":"1406_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107583","volume":"97","author":"R Gupta","year":"2022","unstructured":"Gupta, R., Patel, M.M., Shukla, A., et al.: Deep learning-based malicious smart contract detection scheme for internet of things environment. Compute. Electr. Eng. 97, 107583 (2022). https:\/\/doi.org\/10.1016\/j.compeleceng.2021.107583","journal-title":"Compute. Electr. Eng."},{"key":"1406_CR11","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1007\/978-3-642-24797-2_4","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9, 1735\u20131780 (1997). https:\/\/doi.org\/10.1007\/978-3-642-24797-2_4","journal-title":"Neural Comput."},{"key":"1406_CR12","doi-asserted-by":"publisher","first-page":"32595","DOI":"10.1109\/ACCESS.2022.3162065","volume":"10","author":"SJ Hwang","year":"2022","unstructured":"Hwang, S.J., Choi, S.H., Shin, J., et al.: Codenet: code-targeted convolutional neural network architecture for smart contract vulnerability detection. IEEE Access 10, 32595\u201332607 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3162065","journal-title":"IEEE Access"},{"key":"1406_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3560816","volume":"55","author":"W Issa","year":"2023","unstructured":"Issa, W., Moustafa, N., Turnbull, B., et al.: Blockchain-based federated learning for securing internet of things: a comprehensive survey. ACM Comput. Surv. 55, 1\u201343 (2023). https:\/\/doi.org\/10.1145\/3560816","journal-title":"ACM Comput. Surv."},{"key":"1406_CR14","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/s10207-023-00752-5","volume":"23","author":"VK Jain","year":"2024","unstructured":"Jain, V.K., Tripathi, M.: An integrated deep learning model for ethereum smart contract vulnerability detection. Int. J. Inf. Secur. 23, 557\u2013575 (2024). https:\/\/doi.org\/10.1007\/s10207-023-00752-5","journal-title":"Int. J. Inf. Secur."},{"doi-asserted-by":"publisher","unstructured":"Jiang, B., Liu, Y., Chan, W.K.: Contractfuzzer: fuzzing smart contracts for vulnerability detection. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 259\u2013269. ACM, New York (2018). https:\/\/doi.org\/10.1145\/3238147.3238177","key":"1406_CR15","DOI":"10.1145\/3238147.3238177"},{"key":"1406_CR16","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1146\/annurev-financial-110921-022806","volume":"15","author":"K John","year":"2023","unstructured":"John, K., Kogan, L., Saleh, F.: Smart contracts and decentralized finance. Annu. Rev. Financ. Econ. 15, 523\u2013542 (2023). https:\/\/doi.org\/10.1146\/annurev-financial-110921-022806","journal-title":"Annu. Rev. Financ. Econ."},{"doi-asserted-by":"publisher","unstructured":"Kongmanee, J., Kijsanayothin, P., Hewett, R.: Securing smart contracts in blockchain. In: 2019 34th IEEE\/ACM International Conference on Automated Software Engineering Workshop, pp. 69\u201376. IEEE, San Diego (2019). https:\/\/doi.org\/10.1109\/ASEW.2019.00032","key":"1406_CR17","DOI":"10.1109\/ASEW.2019.00032"},{"key":"1406_CR18","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1109\/TGCN.2022.3165692","volume":"6","author":"P Kumar","year":"2022","unstructured":"Kumar, P., Kumar, R., Gupta, G.P., et al.: Bdedge: blockchain and deep-learning for secure edge-envisioned green cavs. IEEE Trans. Green Commun. Netw. 6, 1330\u20131339 (2022). https:\/\/doi.org\/10.1109\/TGCN.2022.3165692","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"1406_CR19","doi-asserted-by":"publisher","first-page":"6358","DOI":"10.1109\/TII.2022.3142030","volume":"18","author":"P Kumar","year":"2022","unstructured":"Kumar, P., Kumar, R., Gupta, G.P., et al.: P2tif: a blockchain and deep learning framework for privacy-preserved threat intelligence in industrial iot. IEEE Trans. Ind. Inf. 18, 6358\u20136367 (2022). https:\/\/doi.org\/10.1109\/TII.2022.3142030","journal-title":"IEEE Trans. Ind. Inf."},{"key":"1406_CR20","doi-asserted-by":"publisher","first-page":"17110","DOI":"10.1109\/JIOT.2021.3122021","volume":"9","author":"R Kumar","year":"2022","unstructured":"Kumar, R., Kumar, P., Tripathi, R., et al.: Bdtwin: an integrated framework for enhancing security and privacy in cybertwin-driven automotive industrial internet of things. IEEE Internet Things J. 9, 17110\u201317119 (2022). https:\/\/doi.org\/10.1109\/JIOT.2021.3122021","journal-title":"IEEE Internet Things J."},{"key":"1406_CR21","doi-asserted-by":"publisher","first-page":"8065","DOI":"10.1109\/TII.2022.3161631","volume":"18","author":"R Kumar","year":"2022","unstructured":"Kumar, R., Kumar, P., Tripathi, R., et al.: Permissioned blockchain and deep learning for secure and efficient data sharing in industrial healthcare systems. IEEE Trans. Ind. Inf. 18, 8065\u20138073 (2022). https:\/\/doi.org\/10.1109\/TII.2022.3161631","journal-title":"IEEE Trans. Ind. Inf."},{"key":"1406_CR22","doi-asserted-by":"publisher","first-page":"22571","DOI":"10.1109\/TITS.2021.3102581","volume":"23","author":"R Kumar","year":"2022","unstructured":"Kumar, R., Kumar, P., Tripathi, R., et al.: P2sf-iov: a privacy-preservation-based secured framework for internet of vehicles. IEEE Trans. Intell. Transp. Syst. 23, 22571\u201322582 (2022). https:\/\/doi.org\/10.1109\/TITS.2021.3102581","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"1406_CR23","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., et al.: Gradient-based learning applied to document recognition. Proc. IEEE 86, 2278\u20132324 (1998). https:\/\/doi.org\/10.1109\/5.726791","journal-title":"Proc. IEEE"},{"doi-asserted-by":"crossref","unstructured":"Li, S., Li, W., Cook, C., et\u00a0al.: Independently recurrent neural network (indrnn): building a longer and deeper rnn. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 5457\u20135466. IEEE (2018)","key":"1406_CR24","DOI":"10.1109\/CVPR.2018.00572"},{"key":"1406_CR25","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/s10515-024-00418-z","volume":"31","author":"Y Liu","year":"2024","unstructured":"Liu, Y., Wang, C., Ma, Y.: Dl4sc: a novel deep learning-based vulnerability detection framework for smart contracts. Autom. Softw. Eng. 31, 24 (2024). https:\/\/doi.org\/10.1007\/s10515-024-00418-z","journal-title":"Autom. Softw. Eng."},{"unstructured":"Liu, Y., Zhang, C., et\u00a0al.: Automated invariant generation for solidity smart contracts. arXiv preprint arXiv:2401.00650 (2024b)","key":"1406_CR26"},{"doi-asserted-by":"publisher","unstructured":"Luu, L., Chu, DH., Olickel, H., et\u00a0al.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 254\u2014269. ACM, New York (2016). https:\/\/doi.org\/10.1145\/2976749.2978309","key":"1406_CR27","DOI":"10.1145\/2976749.2978309"},{"doi-asserted-by":"publisher","unstructured":"Nikoli\u0107, I., Kolluri, A., Sergey, I., et\u00a0al.: Finding the greedy, prodigal, and suicidal contracts at scale. In: Proceedings of the 34th Annual Computer Security Applications Conference, pp. 653\u2014663. ACM, New York (2018). https:\/\/doi.org\/10.1145\/3274694.3274743","key":"1406_CR28","DOI":"10.1145\/3274694.3274743"},{"doi-asserted-by":"publisher","unstructured":"Permenev, A., Dimitrov, D., Tsankov, P., et\u00a0al.: Verx: safety verification of smart contracts. In: 2020 IEEE Symposium on Security and Privacy, pp. 1661\u20131677. IEEE, San Francisco (2020). https:\/\/doi.org\/10.1109\/SP40000.2020.00024","key":"1406_CR29","DOI":"10.1109\/SP40000.2020.00024"},{"key":"1406_CR30","doi-asserted-by":"publisher","first-page":"19685","DOI":"10.1109\/ACCESS.2020.2969429","volume":"8","author":"P Qian","year":"2020","unstructured":"Qian, P., Liu, Z., He, Q., et al.: Towards automated reentrancy detection for smart contracts based on sequential models. IEEE Access 8, 19685\u201319695 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2969429","journal-title":"IEEE Access"},{"key":"1406_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108766","volume":"109","author":"X Ren","year":"2023","unstructured":"Ren, X., Wu, Y., Li, J., et al.: Smart contract vulnerability detection based on a semantic code structure and a self-designed neural network. Comput. Electr. Eng. 109, 108766 (2023). https:\/\/doi.org\/10.1016\/j.compeleceng.2023.108766","journal-title":"Comput. Electr. Eng."},{"doi-asserted-by":"publisher","unstructured":"Sendner, C., Chen, H., Fereidooni, H., et\u00a0al.: Smarter contracts: detecting vulnerabilities in smart contracts with deep transfer learning. In: Network and Distributed System Security Symposium (2023). https:\/\/doi.org\/10.14722\/ndss.2023.23263","key":"1406_CR32","DOI":"10.14722\/ndss.2023.23263"},{"key":"1406_CR33","doi-asserted-by":"publisher","first-page":"12510","DOI":"10.1109\/TVT.2020.3022168","volume":"69","author":"A Shukla","year":"2020","unstructured":"Shukla, A., Bhattacharya, P., Tanwar, S., et al.: Dwara: a deep learning-based dynamic toll pricing scheme for intelligent transportation systems. IEEE Trans. Veh. Technol. 69, 12510\u201312520 (2020). https:\/\/doi.org\/10.1109\/TVT.2020.3022168","journal-title":"IEEE Trans. Veh. Technol."},{"unstructured":"Tann, W.J.W., Han, X.J., Gupta, S.S., et\u00a0al.: Towards safer smart contracts: a sequence learning approach to detecting security threats. arXiv preprint arXiv:1811.06632 (2018)","key":"1406_CR34"},{"key":"1406_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10723-023-09739-x","volume":"22","author":"Y Tsang","year":"2024","unstructured":"Tsang, Y., Lee, C., Zhang, K., et al.: On-chain and off-chain data management for blockchain-internet of things: a multi-agent deep reinforcement learning approach. J. Grid Comput. 22, 1\u201322 (2024). https:\/\/doi.org\/10.1007\/s10723-023-09739-x","journal-title":"J. Grid Comput."},{"doi-asserted-by":"publisher","unstructured":"Tyagi, AK.: Blockchain and artificial intelligence for cyber security in the era of internet of things and industrial internet of things applications. In: AI and Blockchain Applications in Industrial Robotics, pp. 171\u2013199. IGI Global, Hershey (2024). https:\/\/doi.org\/10.4018\/979-8-3693-0659-8.ch007","key":"1406_CR36","DOI":"10.4018\/979-8-3693-0659-8.ch007"},{"doi-asserted-by":"publisher","unstructured":"Wang, Y., Sheng, S., Wang, Y.: A systematic literature review on smart contract vulnerability detection by symbolic execution. In: International Conference on Blockchain and Trustworthy Systems, pp. 226\u2013241. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-99-8101-4_16","key":"1406_CR37","DOI":"10.1007\/978-981-99-8101-4_16"},{"unstructured":"Wang, Z., Hu, Q.: Blockchain-based federated learning: a comprehensive survey. arXiv preprint arXiv:2110.02182 (2021)","key":"1406_CR38"},{"doi-asserted-by":"crossref","unstructured":"Wang, Z., Chen, J., Wang, Y., et\u00a0al.: Efficiently detecting reentrancy vulnerabilities in complex smart contracts. arXiv preprint arXiv:2403.11254 (2024)","key":"1406_CR39","DOI":"10.1145\/3643734"},{"key":"1406_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2023.103076","volume":"234","author":"H Yang","year":"2024","unstructured":"Yang, H., Gu, X., Chen, X., et al.: Crossfuzz: cross-contract fuzzing for smart contract vulnerability detection. Sci. Comput. Program. 234, 103076 (2024). https:\/\/doi.org\/10.1016\/j.scico.2023.103076","journal-title":"Sci. Comput. Program."},{"doi-asserted-by":"publisher","unstructured":"Zhang, Q., Wang, Y., Li, J., et\u00a0al.: Ethploit: from fuzzing to efficient exploit generation against smart contracts. In: 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering, pp. 116\u2013126. IEEE, London (2020). https:\/\/doi.org\/10.1109\/SANER48275.2020.9054822","key":"1406_CR41","DOI":"10.1109\/SANER48275.2020.9054822"},{"key":"1406_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110238","volume":"242","author":"Z Zhen","year":"2024","unstructured":"Zhen, Z., Zhao, X., Zhang, J., et al.: Da-gnn: a smart contract vulnerability detection method based on dual attention graph neural network. Comput. Netw. 242, 110238 (2024). https:\/\/doi.org\/10.1016\/j.comnet.2024.110238","journal-title":"Comput. Netw."},{"key":"1406_CR43","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/s11633-016-1006-2","volume":"13","author":"GB Zhou","year":"2016","unstructured":"Zhou, G.B., Wu, J., Zhang, C.L., et al.: Minimal gated unit for recurrent neural networks. Int. J. Autom. Comput. 13, 226\u2013234 (2016). https:\/\/doi.org\/10.1007\/s11633-016-1006-2","journal-title":"Int. J. Autom. Comput."}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-024-01406-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-024-01406-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-024-01406-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T08:28:54Z","timestamp":1724315334000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-024-01406-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,10]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["1406"],"URL":"https:\/\/doi.org\/10.1007\/s00530-024-01406-9","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"type":"print","value":"0942-4962"},{"type":"electronic","value":"1432-1882"}],"subject":[],"published":{"date-parts":[[2024,7,10]]},"assertion":[{"value":"11 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no potential conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"204"}}