{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:28:42Z","timestamp":1772908122703,"version":"3.50.1"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"23","license":[{"start":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T00:00:00Z","timestamp":1680134400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T00:00:00Z","timestamp":1680134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s11042-023-15042-4","type":"journal-article","created":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T06:03:05Z","timestamp":1680156185000},"page":"36379-36393","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["TP-Detect: trigram-pixel based vulnerability detection for Ethereum smart contracts"],"prefix":"10.1007","volume":"82","author":[{"given":"Lohith J","family":"J","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anusree Manoj","family":"K","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guru Nanma","family":"P","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pooja","family":"Srinivasan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,3,30]]},"reference":[{"issue":"4","key":"15042_CR1","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/MSECP.2003.1219077","volume":"1","author":"D Ahmad","year":"2003","unstructured":"Ahmad D (2003) The rising threat of vulnerabilities due to integer errors. IEEE Sec Priv 1(4):77\u201382","journal-title":"IEEE Sec Priv"},{"key":"15042_CR2","doi-asserted-by":"crossref","unstructured":"Albert E, Gordillo P, Livshits B, Rubio A, Sergey I (2018) Ethir: a framework for high-level analysis of ethereum bytecode. In: International symposium on automated technology for verification and analysis. Springer, pp 513\u2013520","DOI":"10.1007\/978-3-030-01090-4_30"},{"key":"15042_CR3","doi-asserted-by":"crossref","unstructured":"Alharby M, Van Moorsel A (2017) Blockchain-based smart contracts: a systematic mapping study. arXiv:1710.06372","DOI":"10.5121\/csit.2017.71011"},{"key":"15042_CR4","doi-asserted-by":"crossref","unstructured":"Ashizawa N, Yanai N, Cruz JP, Okamura S (2021) Eth2vec: learning contract-wide code representations for vulnerability detection on ethereum smart contracts. In: Proceedings of the 3rd ACM international symposium on blockchain and secure critical infrastructure, pp 47\u201359","DOI":"10.1145\/3457337.3457841"},{"issue":"1","key":"15042_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332","journal-title":"Mach Learn"},{"key":"15042_CR6","unstructured":"Brent L, Jurisevic A, Kong M, Liu E, Gauthier F, Gramoli V, Holz R, Scholz B (2018) Vandal: a scalable security analysis framework for smart contracts. arXiv:1809.03981"},{"key":"15042_CR7","first-page":"22","volume":"1","author":"V Buterin","year":"2013","unstructured":"Buterin V, et al. (2013) Ethereum white paper. GitHub Repository 1:22\u201323","journal-title":"GitHub Repository"},{"key":"15042_CR8","unstructured":"Cachin C, et al. (2016) Architecture of the hyperledger blockchain fabric. In: Workshop on distributed cryptocurrencies and consensus ledgers, vol 310. IL, Chicago, pp 1\u20134"},{"key":"15042_CR9","unstructured":"Cavnar WB, Trenkle JM et al (1994) N-gram-based text categorization. In: Proceedings of SDAIR-94, 3rd annual symposium on document analysis and information retrieval, vol 161175. Citeseer"},{"key":"15042_CR10","doi-asserted-by":"publisher","first-page":"37575","DOI":"10.1109\/ACCESS.2019.2905769","volume":"7","author":"W Chen","year":"2019","unstructured":"Chen W, Zheng Z, Ngai EC-H, Zheng P, Zhou Y (2019) Exploiting blockchain data to detect smart ponzi schemes on ethereum. IEEE Access 7:37575\u201337586","journal-title":"IEEE Access"},{"key":"15042_CR11","doi-asserted-by":"publisher","first-page":"116287","DOI":"10.1016\/j.image.2021.116287","volume":"95","author":"J Chen","year":"2021","unstructured":"Chen J, Liao X, Qin Z (2021) Identifying tampering operations in image operator chains based on decision fusion. Signal Process Image Commun 95:116287","journal-title":"Signal Process Image Commun"},{"key":"15042_CR12","doi-asserted-by":"crossref","unstructured":"Contro F, Crosara M, Ceccato M, Preda MD (2021) Ethersolve: computing an accurate control-flow graph from ethereum bytecode. arXiv:2103.09113","DOI":"10.1109\/ICPC52881.2021.00021"},{"key":"15042_CR13","unstructured":"Dharanikota S, Mukherjee S, Bhardwaj C, Rastogi A, Lal A (2021) Celestial: a smart contracts verification framework. In: 2021 Formal methods in computer aided design (FMCAD). IEEE, pp 133\u2013142"},{"key":"15042_CR14","doi-asserted-by":"crossref","unstructured":"Dick S (2019) Artificial intelligence","DOI":"10.1162\/99608f92.92fe150c"},{"key":"15042_CR15","doi-asserted-by":"crossref","unstructured":"Eshghie M, Artho C, Gurov D (2021) Dynamic vulnerability detection on smart contracts using machine learning. In: Evaluation and assessment in software engineering, pp 305\u2013312","DOI":"10.1145\/3463274.3463348"},{"key":"15042_CR16","doi-asserted-by":"crossref","unstructured":"Feist J, Grieco G, Groce A (2019) Slither: a static analysis framework for smart contracts. In: 2019 IEEE\/ACM 2nd international workshop on emerging trends in software engineering for blockchain (WETSEB). IEEE, pp 8\u201315","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"15042_CR17","doi-asserted-by":"crossref","unstructured":"Ferreira JF, Cruz P, Durieux T, Abreu R (2020) Smartbugs: a framework to analyze solidity smart contracts. In: Proceedings of the 35th IEEE\/ACM international conference on automated software engineering, pp 1349\u20131352","DOI":"10.1145\/3324884.3415298"},{"key":"15042_CR18","doi-asserted-by":"crossref","unstructured":"Grieco G, Song W, Cygan A, Feist J, Groce A (2020) Echidna: effective, usable, and fast fuzzing for smart contracts. In: Proceedings of the 29th ACM SIGSOFT international symposium on software testing and analysis, pp 557\u2013560","DOI":"10.1145\/3395363.3404366"},{"key":"15042_CR19","doi-asserted-by":"crossref","unstructured":"Guo G, Wang H, Bell D, Bi Y, Greer K (2003) Knn model-based approach in classification. In: OTM Confederated international conferences on the move to meaningful internet systems. Springer, pp 986\u2013996","DOI":"10.1007\/978-3-540-39964-3_62"},{"issue":"1","key":"15042_CR20","doi-asserted-by":"publisher","first-page":"6","DOI":"10.3390\/technologies7010006","volume":"7","author":"P Hegedu\u030bs","year":"2019","unstructured":"Hegedu\u030bs P (2019) Towards analyzing the complexity landscape of solidity based ethereum smart contracts. Technologies 7(1):6","journal-title":"Technologies"},{"key":"15042_CR21","unstructured":"Huang TH-D (2018) Hunting the ethereum smart contract: color-inspired inspection of potential attacks. arXiv:1807.01868. Accessed 12 Oct 2021"},{"key":"15042_CR22","unstructured":"Jentzsch C (2016) Decentralized autonomous organization to automate governance. White paper, November"},{"key":"15042_CR23","doi-asserted-by":"crossref","unstructured":"Kalra S, Goel S, Dhawan M, Sharma S (2018) Zeus: analyzing safety of smart contracts. In: Ndss, pp 1\u201312","DOI":"10.14722\/ndss.2018.23082"},{"key":"15042_CR24","unstructured":"Kaviani P, Dhotre S (2017) Short survey on naive bayes algorithm. Int J Adv Res Comput Sci Manag 04"},{"key":"15042_CR25","doi-asserted-by":"crossref","unstructured":"Khan SN, Loukil F, Ghedira-Guegan C, Benkhelifa E, Bani-Hani A (2021) Blockchain smart contracts: applications, challenges, and future trends. Peer-to-peer Netw Appl:1\u201325","DOI":"10.1007\/s12083-021-01127-0"},{"key":"15042_CR26","doi-asserted-by":"publisher","unstructured":"Kumar R, Tripathi RC (2014) A trigram word selection methodology to detect textual similarity with comparative analysis of similar techniques. In: 2014 Fourth international conference on communication systems and network technologies, pp 383\u2013387. https:\/\/doi.org\/10.1109\/CSNT.2014.82","DOI":"10.1109\/CSNT.2014.82"},{"issue":"7553","key":"15042_CR27","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436\u2013444","journal-title":"Nature"},{"issue":"3","key":"15042_CR28","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2019","unstructured":"Liao X, Yu Y, Li B, Li Z, Qin Z (2019) A new payload partition strategy in color image steganography. IEEE Trans Circ Syst Video Technol 30 (3):685\u2013696","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"15042_CR29","doi-asserted-by":"publisher","first-page":"103244","DOI":"10.1016\/j.jvcir.2021.103244","volume":"79","author":"X Liao","year":"2021","unstructured":"Liao X, Peng J, Cao Y (2021) Gifmarking: the robust watermarking for animated gif based deep learning. J Vis Commun Image Represent 79:103244","journal-title":"J Vis Commun Image Represent"},{"key":"15042_CR30","unstructured":"Liljestrand H, Nyman T, Gunn LJ, Ekberg J-E, Asokan N (2021) Pacstack: an authenticated call stack. In: 30th {USENIX} security symposium ({USENIX}, security 21)"},{"key":"15042_CR31","unstructured":"Lutz O, Chen H, Fereidooni H, Sendner C, Dmitrienko A, Sadeghi AR, Koushanfar F (2021) Escort: ethereum smart contracts vulnerability detection using deep neural network and transfer learning. arXiv:2103.12607"},{"key":"15042_CR32","doi-asserted-by":"crossref","unstructured":"Luu L, Chu D-H, Olickel H, Saxena P, Hobor A (2016) Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp 254\u2013269","DOI":"10.1145\/2976749.2978309"},{"key":"15042_CR33","unstructured":"Min SL, Baer J-L, Mn M (1989) A timestamp-based cache coherence scheme"},{"key":"15042_CR34","doi-asserted-by":"crossref","unstructured":"Momeni P, Wang Y, Samavi R (2019) Machine learning model for smart contracts security analysis. In: 2019 17th International conference on privacy, security and trust (PST). IEEE, pp 1\u20136","DOI":"10.1109\/PST47121.2019.8949045"},{"key":"15042_CR35","doi-asserted-by":"crossref","unstructured":"Mossberg M, Manzano F, Hennenfent E, Groce A, Grieco G, Feist J, Brunson T, Dinaburg A (2019) Manticore: a user-friendly symbolic execution framework for binaries and smart contracts. In: 2019 34th IEEE\/ACM international conference on automated software engineering (ASE). IEEE, pp 1186\u20131189","DOI":"10.1109\/ASE.2019.00133"},{"key":"15042_CR36","unstructured":"Mueller B, Honig J, Parasaram N et al (2023) ConsenSys\/Mythril"},{"key":"15042_CR37","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decentralized Bus Rev:21260"},{"key":"15042_CR38","doi-asserted-by":"crossref","unstructured":"Nikoli\u0107 I, Kolluri A, Sergey I, Saxena P, Hobor A (2018) Finding the greedy, prodigal, and suicidal contracts at scale. In: Proceedings of the 34th annual computer security applications conference, pp 653\u2013663","DOI":"10.1145\/3274694.3274743"},{"key":"15042_CR39","doi-asserted-by":"publisher","unstructured":"Parthasarathy S, Harikrishnan A, Narayanan G, J LJ, Singh K (2021) Secure distributed medical record storage using blockchain and emergency sharing using multi-party computation. In: 2021 11th IFIP International conference on new technologies, mobility and security (NTMS), pp 1\u20135. https:\/\/doi.org\/10.1109\/NTMS49979.2021.9432643","DOI":"10.1109\/NTMS49979.2021.9432643"},{"issue":"1","key":"15042_CR40","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10619-006-8593-9","volume":"20","author":"I Ray","year":"2006","unstructured":"Ray I, Xin T (2006) Analysis of dependencies in advanced transaction models. Distrib Parallel Databases 20(1):5\u201327","journal-title":"Distrib Parallel Databases"},{"key":"15042_CR41","unstructured":"Remix- Ethereum (2023) https:\/\/remix.ethereum.org\/#optimize=false&runs=200&evmVersion=null&version=soljson-v0.8.7+commit.e28d00a7.js"},{"issue":"1","key":"15042_CR42","first-page":"1","volume":"14","author":"B Sambana","year":"2020","unstructured":"Sambana B, Ramesh Y, Rao MS (2020) Blockchain approach to cyber security vulnerabilities attacks and potential countermeasures. Int J Sec Appl 14 (1):1\u201314","journal-title":"Int J Sec Appl"},{"key":"15042_CR43","unstructured":"Samreen NF, Alalfi MH (2020) Reentrancy vulnerability identification in ethereum smart contracts. In: 2020 IEEE international workshop on blockchain oriented software engineering (IWBOSE). IEEE, pp 22\u201329"},{"issue":"3","key":"15042_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-021-00592-x","volume":"2","author":"IH Sarker","year":"2021","unstructured":"Sarker IH (2021) Machine learning: algorithms, real-world applications and research directions. SN Comput Sci 2(3):1\u201321","journal-title":"SN Comput Sci"},{"key":"15042_CR45","unstructured":"Sezer S, Eyhoff C, Prinz W, Rose T (2020) Exploiting smart contract bytecode for classification on ethereum. In: PoEM Workshops, pp 11\u201322"},{"key":"15042_CR46","doi-asserted-by":"crossref","unstructured":"Singh R, Mir BA, Chakravarthi DS, Alharbi AR, Kumar H, Hingaa SK, et al. (2022) Smart healthcare system with light-weighted blockchain system and deep learning techniques. Comput Intell Neurosci 2022","DOI":"10.1155\/2022\/1621258"},{"key":"15042_CR47","doi-asserted-by":"crossref","unstructured":"Spyromitros E, Tsoumakas G, Vlahavas I (2008) An empirical study of lazy multilabel classification algorithms. In: Hellenic conference on artificial intelligence. Springer, pp 401\u2013406","DOI":"10.1007\/978-3-540-87881-0_40"},{"key":"15042_CR48","doi-asserted-by":"crossref","unstructured":"Sun Y, Gu L (2021) Attention-based machine learning model for smart contract vulnerability detection. In: Journal of physics: conference series, vol 1820. IOP Publishing, p 012004","DOI":"10.1088\/1742-6596\/1820\/1\/012004"},{"key":"15042_CR49","doi-asserted-by":"crossref","unstructured":"Tikhomirov S, Voskresenskaya E, Ivanitskiy I, Takhaviev R, Marchenko E, Alexandrov Y (2018) Smartcheck: static analysis of ethereum smart contracts. In: Proceedings of the 1st international workshop on emerging trends in software engineering for blockchain, pp 9\u201316","DOI":"10.1145\/3194113.3194115"},{"key":"15042_CR50","doi-asserted-by":"crossref","unstructured":"Tsankov P, Dan A, Drachsler-Cohen D, Gervais A, Buenzli F, Vechev M (2018) Securify: practical security analysis of smart contracts. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, pp 67\u201382","DOI":"10.1145\/3243734.3243780"},{"key":"15042_CR51","doi-asserted-by":"crossref","unstructured":"Wang W, Song J, Xu G, Li Y, Wang H, Su C (2020) Contractward: automated vulnerability detection models for ethereum smart contracts. IEEE Trans Netw Sci Eng","DOI":"10.1109\/TNSE.2020.2968505"},{"key":"15042_CR52","doi-asserted-by":"crossref","unstructured":"Xing C, Chen Z, Chen L, Guo X, Zheng Z, Li J (2020) A new scheme of vulnerability analysis in smart contract with machine learning. Wirel Netw:1\u201310","DOI":"10.1007\/s11276-020-02379-z"},{"key":"15042_CR53","doi-asserted-by":"crossref","unstructured":"Xu Y, Hu G, You L, Cao C (2021) A novel machine learning-based analysis model for smart contract vulnerability. Sec Commun Netw 2021","DOI":"10.1155\/2021\/5798033"},{"key":"15042_CR54","doi-asserted-by":"crossref","unstructured":"Zeng F, Mao L, Chen Z, Cao Q (2009) Mutation-based testing of integer overflow vulnerabilities. In: 2009 5th International conference on wireless communications, networking and mobile computing. IEEE, pp 1\u20134","DOI":"10.1109\/WICOM.2009.5302048"},{"issue":"7","key":"15042_CR55","doi-asserted-by":"publisher","first-page":"2038","DOI":"10.1016\/j.patcog.2006.12.019","volume":"40","author":"M-L Zhang","year":"2007","unstructured":"Zhang M-L, Zhou Z-H (2007) Ml-knn: a lazy learning approach to multi-label learning. Pattern Recognit 40(7):2038\u20132048","journal-title":"Pattern Recognit"},{"key":"15042_CR56","doi-asserted-by":"publisher","first-page":"494","DOI":"10.7717\/peerj-cs.494","volume":"7","author":"X Zhu","year":"2021","unstructured":"Zhu X, Huang J, Wang B, Qi C (2021) Malware homology determination using visualized images and feature fusion. PeerJ Comput Sci 7:494","journal-title":"PeerJ Comput Sci"},{"key":"15042_CR57","doi-asserted-by":"crossref","unstructured":"Zhuang Y, Liu Z, Qian P, Liu Q, Wang X, He Q (2020) Smart contract vulnerability detection using graph neural network. In: IJCAI, pp 3283\u20133290","DOI":"10.24963\/ijcai.2020\/454"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15042-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15042-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15042-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T10:23:21Z","timestamp":1695205401000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15042-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,30]]},"references-count":57,"journal-issue":{"issue":"23","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["15042"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15042-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,30]]},"assertion":[{"value":"11 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Competing interests"}}]}}