{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T17:27:38Z","timestamp":1775755658059,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T00:00:00Z","timestamp":1734566400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T00:00:00Z","timestamp":1734566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10207-024-00965-2","type":"journal-article","created":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T18:32:56Z","timestamp":1734633176000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Vulnsense: efficient vulnerability detection in ethereum smart contracts by multimodal learning with graph neural network and language model"],"prefix":"10.1007","volume":"24","author":[{"given":"Phan The","family":"Duy","sequence":"first","affiliation":[]},{"given":"Nghi Hoang","family":"Khoa","sequence":"additional","affiliation":[]},{"given":"Nguyen Huu","family":"Quyen","sequence":"additional","affiliation":[]},{"given":"Le Cong","family":"Trinh","sequence":"additional","affiliation":[]},{"given":"Vu Trung","family":"Kien","sequence":"additional","affiliation":[]},{"given":"Trinh Minh","family":"Hoang","sequence":"additional","affiliation":[]},{"given":"Van-Hau","family":"Pham","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,19]]},"reference":[{"key":"965_CR1","unstructured":"Ghimiray, D.: Avast (2023). https:\/\/www.avast.com\/c-silk-road-dark-web-market"},{"issue":"10","key":"965_CR2","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TSE.2019.2942301","volume":"47","author":"W Zou","year":"2021","unstructured":"Zou, W., Lo, D., Kochhar, P.S., Le, X.-B.D., Xia, X., Feng, Y., Chen, Z., Xu, B.: Smart contract development: challenges and opportunities. IEEE Trans. Software Eng. 47(10), 2084\u20132106 (2021)","journal-title":"IEEE Trans. Software Eng."},{"key":"965_CR3","doi-asserted-by":"publisher","first-page":"19","DOI":"10.4018\/JCIT.2019010102","volume":"21","author":"I Mehar","year":"2019","unstructured":"Mehar, I., Shier, C., Giambattista, A., Gong, E., Fletcher, G., Sanayhie, R., Kim, H., Laskowski, M.: Understanding a revolutionary and flawed grand experiment in blockchain: the dao attack. J. Cases Inf. Technol. 21, 19\u201332 (2019). https:\/\/doi.org\/10.4018\/JCIT.2019010102","journal-title":"J. Cases Inf. Technol."},{"key":"965_CR4","doi-asserted-by":"publisher","first-page":"57037","DOI":"10.1109\/ACCESS.2022.3169902","volume":"10","author":"SS Kushwaha","year":"2022","unstructured":"Kushwaha, S.S., Joshi, S., Singh, D., Kaur, M., Lee, H.-N.: Ethereum smart contract analysis tools: a systematic review. IEEE Access 10, 57037\u201357062 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3169902","journal-title":"IEEE Access"},{"key":"965_CR5","doi-asserted-by":"publisher","unstructured":"Badruddoja, S., Dantu, R., He, Y., Upadhayay, K., Thompson, M.: Making smart contracts smarter. In: 2021 IEEE international conference on blockchain and cryptocurrency (ICBC) 1\u20133 (2021). https:\/\/doi.org\/10.1109\/ICBC51069.2021.9461148","DOI":"10.1109\/ICBC51069.2021.9461148"},{"key":"965_CR6","unstructured":"Nveloso: Nveloso\/conkas: Ethereum virtual machine (EVM) bytecode or solidity smart contract static analysis tool based on symbolic execution (2021). https:\/\/github.com\/nveloso\/conkas"},{"key":"965_CR7","unstructured":"Consensys: Consensys\/mythril: security analysis Tool for EVM bytecode. supports smart contracts built for Ethereum, Hedera, quorum, Vechain, Roostock, Tron and other EVM-compatible blockchains. (2023). https:\/\/github.com\/ConsenSys\/mythril"},{"key":"965_CR8","doi-asserted-by":"publisher","unstructured":"Tsankov, P., Dan, A., Drachsler-Cohen, D., Gervais, A., B\u00fcnzli, F., Vechev, M.: Securify: practical security analysis of smart contracts. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security. CCS \u201918, pp. 67\u201382. Association for computing machinery, New York, NY, USA (2018). https:\/\/doi.org\/10.1145\/3243734.3243780","DOI":"10.1145\/3243734.3243780"},{"key":"965_CR9","unstructured":"Lutz, O., Chen, H., Fereidooni, H., Sendner, C., Dmitrienko, A., Sadeghi, A.R., Koushanfar, F.: ESCORT: ethereum smart COntRacTs vulnerability detection using deep neural network and transfer learning (2021)"},{"issue":"2","key":"965_CR10","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1109\/TNSE.2020.2968505","volume":"8","author":"W Wang","year":"2021","unstructured":"Wang, W., Song, J., Xu, G., Li, Y., Wang, H., Su, C.: Contractward: automated vulnerability detection models for ethereum smart contracts. IEEE transactions on network science and engineering 8(2), 1133\u20131144 (2021). https:\/\/doi.org\/10.1109\/TNSE.2020.2968505","journal-title":"IEEE transactions on network science and engineering"},{"key":"965_CR11","doi-asserted-by":"publisher","first-page":"19685","DOI":"10.1109\/ACCESS.2020.2969429","volume":"8","author":"P Qian","year":"2020","unstructured":"Qian, P., Liu, Z., He, Q., Zimmermann, R., Wang, X.: Towards automated reentrancy detection for smart contracts based on sequential models. IEEE Access 8, 19685\u201319695 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2969429","journal-title":"IEEE Access"},{"issue":"9","key":"965_CR12","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.3390\/electronics12092046","volume":"12","author":"F Jiang","year":"2023","unstructured":"Jiang, F., Chao, K., Xiao, J., Liu, Q., Gu, K., Wu, J., Cao, Y.: Enhancing smart-contract security through machine learning: a survey of approaches and techniques. Electronics 12(9), 2046 (2023). https:\/\/doi.org\/10.3390\/electronics12092046","journal-title":"Electronics"},{"key":"965_CR13","unstructured":"Khodadadi, M., Tahmoresnezhad, J.: HyMo: vulnerability detection in smart contracts using a novel multi-modal hybrid model (2023)"},{"issue":"7","key":"965_CR14","doi-asserted-by":"publisher","first-page":"2189","DOI":"10.1109\/tse.2021.3054928","volume":"48","author":"J Chen","year":"2022","unstructured":"Chen, J., Xia, X., Lo, D., Grundy, J., Luo, X., Chen, T.: DefectChecker: automated smart contract defect detection by analyzing EVM bytecode. IEEE Trans. Software Eng. 48(7), 2189\u20132207 (2022). https:\/\/doi.org\/10.1109\/tse.2021.3054928","journal-title":"IEEE Trans. Software Eng."},{"key":"965_CR15","unstructured":"Team, S.: The solidity contract-oriented programming language. https:\/\/docs.soliditylang.org\/en\/develop\/index.html Accessed 03 April 2024"},{"issue":"2s","key":"965_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3545572","volume":"19","author":"S Jabeen","year":"2023","unstructured":"Jabeen, S., Li, X., Amin, M.S., Bourahla, O., Li, S., Jabbar, A.: A review on methods and applications in multimodal deep learning. ACM Trans. Multimed. Comput. Commun. Appl. 19(2s), 1\u201341 (2023)","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"issue":"2","key":"965_CR17","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1109\/TPAMI.2018.2798607","volume":"41","author":"T Baltru\u0161aitis","year":"2019","unstructured":"Baltru\u0161aitis, T., Ahuja, C., Morency, L.-P.: Multimodal machine learning: a survey and taxonomy. IEEE Trans. Pattern Anal. Mach. Intell. 41(2), 423\u2013443 (2019). https:\/\/doi.org\/10.1109\/TPAMI.2018.2798607","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"965_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121168","volume":"235","author":"W Nam","year":"2023","unstructured":"Nam, W., Jang, B.: A survey on multimodal bidirectional machine learning translation of image and natural language processing. Expert Syst. Appl. 235, 121168 (2023)","journal-title":"Expert Syst. Appl."},{"key":"965_CR19","doi-asserted-by":"publisher","unstructured":"Xu, P., Zhu, X., Clifton, D.A.: Multimodal learning with transformers: a survey. IEEE Trans. Pattern Anal. Mach. Intell. 1\u201320 (2023) https:\/\/doi.org\/10.1109\/TPAMI.2023.3275156","DOI":"10.1109\/TPAMI.2023.3275156"},{"key":"965_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.03.132","volume":"636","author":"W Jie","year":"2023","unstructured":"Jie, W., Chen, Q., Wang, J., Voundi Koe, A.S., Li, J., Huang, P., Wu, Y., Wang, Y.: A novel extended multimodal ai framework towards vulnerability detection in smart contracts. Inf. Sci. 636, 118907 (2023). https:\/\/doi.org\/10.1016\/j.ins.2023.03.132","journal-title":"Inf. Sci."},{"key":"965_CR21","doi-asserted-by":"publisher","unstructured":"Luu, L., Chu, D.-H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. Cryptology ePrint Archive, Paper 2016\/633. https:\/\/eprint.iacr.org\/2016\/633 (2016). https:\/\/doi.org\/10.1145\/2976749.2978309","DOI":"10.1145\/2976749.2978309"},{"key":"965_CR22","doi-asserted-by":"publisher","unstructured":"Feist, J., Greico, G., Groce, A.: Slither: a static analysis framework for smart contracts. In: Proceedings of the 2nd international workshop on emerging trends in software engineering for blockchain. WETSEB \u201919, pp. 8\u201315. IEEE Press, (2019). https:\/\/doi.org\/10.1109\/WETSEB.2019.00008","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"965_CR23","doi-asserted-by":"publisher","unstructured":"Jiang, B., Liu, Y., Chan, W.K.: Contractfuzzer: Fuzzing smart contracts for vulnerability detection. In: Proceedings of the 33rd ACM\/IEEE international conference on automated software engineering. ASE \u201918, pp. 259\u2013269. Association for computing machinery, New York, NY, USA (2018). https:\/\/doi.org\/10.1145\/3238147.3238177","DOI":"10.1145\/3238147.3238177"},{"key":"965_CR24","doi-asserted-by":"publisher","unstructured":"Xue, Y., Ye, J., Zhang, W., Sun, J., Ma, L., Wang, H., Zhao, J.: xfuzz: Machine learning guided cross-contract fuzzing. IEEE transactions on dependable and secure computing, 1\u201314 (2022) https:\/\/doi.org\/10.1109\/TDSC.2022.3182373","DOI":"10.1109\/TDSC.2022.3182373"},{"key":"965_CR25","unstructured":"Jeon, S., Lee, G., Kim, H., Woo, S.S.: Smartcondetect: highly accurate smart contract code vulnerability detection mechanism using bert. In: KDD Workshop on programming language processing (2021)"},{"key":"965_CR26","doi-asserted-by":"publisher","first-page":"43806","DOI":"10.1109\/ACCESS.2020.2977362","volume":"8","author":"G Tian","year":"2020","unstructured":"Tian, G., Wang, Q., Zhao, Y., Guo, L., Sun, Z., Lv, L.: Smart contract classification with a bi-lstm based approach. IEEE Access 8, 43806\u201343816 (2020)","journal-title":"IEEE Access"},{"key":"965_CR27","doi-asserted-by":"crossref","unstructured":"Sendner, C., Chen, H., Fereidooni, H., Petzi, L., K\u00f6nig, J., Stang, J., Dmitrienko, A., Sadeghi, A.-R., Koushanfar, F.: Smarter contracts: detecting vulnerabilities in smart contracts with deep transfer learning. In: NDSS (2023)","DOI":"10.14722\/ndss.2023.23263"},{"issue":"2","key":"965_CR28","first-page":"1296","volume":"35","author":"Z Liu","year":"2021","unstructured":"Liu, Z., Qian, P., Wang, X., Zhuang, Y., Qiu, L., Wang, X.: Combining graph neural networks with expert knowledge for smart contract vulnerability detection. IEEE Trans. Knowl. Data Eng. 35(2), 1296\u20131310 (2021)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"965_CR29","doi-asserted-by":"publisher","unstructured":"Zhuang, Y., Liu, Z., Qian, P., Liu, Q., Wang, X., He, Q.: Smart contract vulnerability detection using graph neural network. In: Bessiere, C. (ed.) Proceedings of the 29th international joint conference on artificial intelligence, IJCAI-20, pp. 3283\u20133290. International joint conferences on artificial intelligence organization, (2020). https:\/\/doi.org\/10.24963\/ijcai.2020\/454 . Main track","DOI":"10.24963\/ijcai.2020\/454"},{"key":"965_CR30","doi-asserted-by":"publisher","unstructured":"Nguyen, H.H., Nguyen, N.-M., Doan, H.-P., Ahmadi, Z., Doan, T.-N., Jiang, L.: Mando-guru: Vulnerability detection for smart contract source code by heterogeneous graph embeddings. In: Proceedings of the 30th ACM Joint European software engineering conference and symposium on the foundations of software engineering. ESEC\/FSE 2022, pp. 1736\u20131740. Association for computing machinery, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3540250.3558927","DOI":"10.1145\/3540250.3558927"},{"key":"965_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111705","volume":"202","author":"D Chen","year":"2023","unstructured":"Chen, D., Feng, L., Fan, Y., Shang, S., Wei, Z.: Smart contract vulnerability detection based on semantic graph and residual graph convolutional networks with edge attention. J. Syst. Softw. 202, 111705 (2023). https:\/\/doi.org\/10.1016\/j.jss.2023.111705","journal-title":"J. Syst. Softw."},{"issue":"1","key":"965_CR32","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1186\/s13677-023-00459-x","volume":"12","author":"C Ma","year":"2023","unstructured":"Ma, C., Liu, S., Xu, G.: Hgat: smart contract vulnerability detection method based on hierarchical graph attention network. J. Cloud Comp. 12(1), 93 (2023)","journal-title":"J. Cloud Comp."},{"issue":"9","key":"965_CR33","doi-asserted-by":"publisher","first-page":"3581","DOI":"10.3390\/s22093581","volume":"22","author":"L Zhang","year":"2022","unstructured":"Zhang, L., Wang, J., Wang, W., Jin, Z., Zhao, C., Cai, Z., Chen, H.: A novel smart contract vulnerability detection method based on information graph and ensemble learning. Sensors 22(9), 3581 (2022). https:\/\/doi.org\/10.3390\/s22093581","journal-title":"Sensors"},{"key":"965_CR34","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.inffus.2019.06.019","volume":"53","author":"Y Jiang","year":"2020","unstructured":"Jiang, Y., Li, W., Hossain, M.S., Chen, M., Alelaiwi, A., Al-Hammadi, M.: A snapshot research and implementation of multimodal information fusion for data-driven emotion recognition. Inf. Fusion 53, 209\u2013221 (2020)","journal-title":"Inf. Fusion"},{"key":"965_CR35","doi-asserted-by":"publisher","first-page":"168865","DOI":"10.1109\/ACCESS.2020.3023871","volume":"8","author":"Y Cimtay","year":"2020","unstructured":"Cimtay, Y., Ekmekcioglu, E., Caglar-Ozhan, S.: Cross-subject multimodal emotion recognition based on hybrid fusion. IEEE Access 8, 168865\u2013168878 (2020)","journal-title":"IEEE Access"},{"key":"965_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101873","volume":"95","author":"D Gibert","year":"2020","unstructured":"Gibert, D., Mateu, C., Planes, J.: Hydra: a multimodal deep learning framework for malware classification. Comput. & Secur. 95, 101873 (2020)","journal-title":"Comput. & Secur."},{"issue":"3","key":"965_CR37","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1109\/TIFS.2018.2866319","volume":"14","author":"T Kim","year":"2019","unstructured":"Kim, T., Kang, B., Rho, M., Sezer, S., Im, E.G.: A multimodal deep learning method for android malware detection using various features. IEEE Trans. Inf. Forensics Secur. 14(3), 773\u2013788 (2019). https:\/\/doi.org\/10.1109\/TIFS.2018.2866319","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"965_CR38","doi-asserted-by":"crossref","unstructured":"Zhou, X., Verma, R.M.: Vulnerability detection via multimodal learning: datasets and analysis. In: Proceedings of the 2022 ACM on Asia conference on computer and communications security, pp. 1225\u20131227 (2022)","DOI":"10.1145\/3488932.3527288"},{"key":"965_CR39","doi-asserted-by":"publisher","unstructured":"Trinh, L.C., Kien, V.T., Hoang, T.M., Quyen, N.H., Khoa, N.H., Duy, P.T., Pham, V.-H.: A multimodal deep learning approach for efficient vulnerability detection in smart contracts. In: GLOBECOM 2023 - 2023 IEEE global communications conference, pp. 3421\u20133426 (2023). https:\/\/doi.org\/10.1109\/GLOBECOM54140.2023.10437295","DOI":"10.1109\/GLOBECOM54140.2023.10437295"},{"key":"965_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103341","volume":"132","author":"W Tao","year":"2023","unstructured":"Tao, W., Su, X., Wan, J., Wei, H., Zheng, W.: Vulnerability detection through cross-modal feature enhancement and fusion. Comput. & Secur. 132, 103341 (2023)","journal-title":"Comput. & Secur."},{"key":"965_CR41","doi-asserted-by":"crossref","unstructured":"Cai, J., Li, B., Zhang, J., Sun, X., Chen, B.: Combine sliced joint graph with graph neural networks for smart contract vulnerability detection. J. Syst. Softw. 195, 111550 (2023)","DOI":"10.1016\/j.jss.2022.111550"},{"issue":"2014","key":"965_CR42","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Paper 151(2014), 1\u201332 (2014)","journal-title":"Ethereum Proj. Yellow Paper"},{"key":"965_CR43","doi-asserted-by":"crossref","unstructured":"Durieux, T., Ferreira, J.F., Abreu, R., Cruz, P.: Empirical review of automated analysis tools on 47,587 ethereum smart contracts. In: Proceedings of the ACM\/IEEE 42nd international conference on software engineering, pp. 530\u2013541 (2020)","DOI":"10.1145\/3377811.3380364"},{"key":"965_CR44","doi-asserted-by":"crossref","unstructured":"Ferreira, J.F., Cruz, P., Durieux, T., Abreu, R.: Smartbugs: A framework to analyze solidity smart contracts. In: Proceedings of the 35th IEEE\/ACM international conference on automated software engineering, pp. 1349\u20131352 (2020)","DOI":"10.1145\/3324884.3415298"},{"key":"965_CR45","doi-asserted-by":"crossref","unstructured":"Ghaleb, A., Pattabiraman, K.: How effective are smart contract analysis tools? evaluating smart contract static analysis tools using bug injection. In: Proceedings of the 29th ACM SIGSOFT international symposium on software testing and analysis, pp. 415\u2013427 (2020)","DOI":"10.1145\/3395363.3397385"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00965-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00965-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00965-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:20:46Z","timestamp":1739337646000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00965-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,19]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["965"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00965-2","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,19]]},"assertion":[{"value":"19 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None of the authors have any conflict of interest in the manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not available.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not available.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"48"}}