{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T07:02:44Z","timestamp":1777705364319,"version":"3.51.4"},"reference-count":33,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T00:00:00Z","timestamp":1666310400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems: Applications in Engineering and Technology"],"published-print":{"date-parts":[[2023,1,30]]},"abstract":"<jats:p>Ethereum is one of the popular Blockchain platform. The key component in the Ethereum Blockchain is the smart contract. Smart contracts (SC) are like normal computer programs which are written mostly in solidity high-level object-oriented programming language. Smart contracts allow completing transactions directly between two parties in the network without any middle man or mediator. Modification of the smart contracts are not possible once deployed into the Blockchain. Thus smart contract has to be vulnerable free before deploying into the Blockchain. In this paper, Bayesian Network Model was designed and constructed based on Bayesian learning concept to detect smart contract security vulnerabilities which are Reentrancy, Tx.origin and DOS. The results showed that the proposed BNMC (Bayesian Network Model Construction) design is able to detect the severity of each vulnerability and also suggest the reasons for the vulnerability. The accuracy of the proposed BNMC results are improved (accuracy 8% increased for both Reentracy and Tx.origin, 6% increased for DOS), compared with traditional method LSTM. This proposed BNMS design and implementation is the first attempt to detect smart contract vulnerabilities using Bayesian Networks.<\/jats:p>","DOI":"10.3233\/jifs-221898","type":"journal-article","created":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T12:02:39Z","timestamp":1666353759000},"page":"1907-1920","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":2,"title":["Bayesian network based vulnerability detection of blockchain smart contracts"],"prefix":"10.1177","volume":"44","author":[{"given":"Lakshminarayana","family":"Kodavali","sequence":"first","affiliation":[{"name":"Puducherry Technological University","place":["India"]}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sathiyamurthy","family":"Kuppuswamy","sequence":"additional","affiliation":[{"name":"Puducherry Technological University","place":["India"]}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"179","published-online":{"date-parts":[[2022,10,21]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-09176-7"},{"key":"e_1_3_1_3_2","doi-asserted-by":"crossref","unstructured":"LiaoJ.W. TsaiT.T. HeC.K. TienC.W. SoliAudit: Smart Contract Vulnerability Assessment Based on Machine Learning and Fuzz Testing 2019 Sixth International Conference on Internet of Things: Systems Management and Security (IOTSMS) 2019 pp. 458\u2013465.","DOI":"10.1109\/IOTSMS48152.2019.8939256"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.3934\/mfc.2018007"},{"key":"e_1_3_1_5_2","first-page":"1815","article-title":"Blockchain for IoT Access Control, Security and Privacy: A Review","volume":"117","author":"Patil P.","year":"2021","unstructured":"PatilP., SangeethaM. and BhaskarV., Blockchain for IoT Access Control, Security and Privacy: A Review, Mathematical Foundations of Computing 117 (2021), 1815\u20131834. https:\/\/doi.org\/10.1007\/s11277-020-07947-2.","journal-title":"Mathematical Foundations of Computing"},{"key":"e_1_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Safder Iqra Saeed-Ul Hassan Deep Learning-based Extraction of Algorithmic Metadata in Full-Text Scholarly Documents In Information Processing and Management 2020.","DOI":"10.1016\/j.ipm.2020.102269"},{"key":"e_1_3_1_7_2","unstructured":"Wang Wei Jingjing Song Guangquan Xu Yidong Li Wang Hao Chunhua Su ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts In IEEE Transactions on Network Science and Engineering 2019."},{"key":"e_1_3_1_8_2","first-page":"2020","article-title":"A Survey on Bayesian Deep Learning, In5, Article 108, 37 pages","volume":"53","author":"Hao Wang","unstructured":"Hao Wang, Dit-Yan Yeung, A Survey on Bayesian Deep Learning, In5, Article 108, 37 pages, ACM Comput Surv 53, 2020.","journal-title":"ACM Comput Surv"},{"key":"e_1_3_1_9_2","unstructured":"Yugesh Verma LSTM use in text classification (2021) Accessed on: Sept 7 2022. [Online] Available: https:\/\/analyticsindiamag.com\/a-complete-guide-to-lstmarchitecture-and-its-use-in-text-classification\/."},{"key":"e_1_3_1_10_2","unstructured":"Ethereum Smart Contract Best Practices (2022) Accessed on: Sept 7 2022. [Online] Available: https:\/\/consensys.github.io\/smart-contract-bestpractices\/knownattacks\/."},{"key":"e_1_3_1_11_2","doi-asserted-by":"crossref","unstructured":"LakshmiNarayanaK. SathiyamurthyK. Automation and smart materials in detecting smart contracts vulnerabilities in Blockchain using deep learning In Materials Today: Proceedings 2021. https:\/\/doi.org\/10.1016\/j.matpr.2021.04.125.","DOI":"10.1016\/j.matpr.2021.04.125"},{"key":"e_1_3_1_12_2","unstructured":"Smart Contract Dataset (2020) Accessed on: Sept 7 2022. [Online] Available: https:\/\/swcregistry.io\/docs\/SWC-107#modifier-reentrancy-fixedsol."},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.3390\/a14050138"},{"key":"e_1_3_1_14_2","unstructured":"Tom MitchellM. In Machine Learning McGraw Hill Chapter-6 pp. 177\u2013184 1997."},{"key":"e_1_3_1_15_2","unstructured":"Wesley Joon Wie Tann Xing Jie Han Sourav Sen Gupta Ong Yew-Soon Towards Safer Smart Contracts: A Sequence Learning Approach to Detecting Security Threats In Proceedings of ACM (Conference 19) ACM New York NY USA 2019."},{"key":"e_1_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Pouyan Momeni Wang Yu Samavi Reza Machine Learning Model for Smart Contracts Security Analysis In IEEE conference 2019.","DOI":"10.1109\/PST47121.2019.8949045"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969429"},{"issue":"11","key":"e_1_3_1_18_2","article-title":"An energy-efficient blockchain approach for secure communication in IoT-enabled electric vehicles","volume":"35","author":"Raju Bhaskar K.B.","year":"2022","unstructured":"Raju BhaskarK.B. Prasanth Aruchamy, Paramasivan Saranya, An energy-efficient blockchain approach for secure communication in IoT-enabled electric vehicles, International Journal of Communication System 35(Issue 11) (2022).","journal-title":"International Journal of Communication System"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22093581"},{"key":"e_1_3_1_20_2","doi-asserted-by":"crossref","unstructured":"Liu Yiping Xu Jie Cui Baojiang Contract Vulnerability Detection Based on Symbolic Execution Technology CNCERT 2021 CCIS 1506 pp. 193\u2013207 2022.8.10.","DOI":"10.1007\/978-981-16-9229-1_12"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22051829"},{"key":"e_1_3_1_22_2","unstructured":"Peng Qian Wang Xun Combining Graph Neural Networks with Expert Knowledge for Smart Contract Vulnerability Detection In IEEE transactions on knowledge and data engineering 2021."},{"key":"e_1_3_1_23_2","doi-asserted-by":"crossref","unstructured":"FengMi. Wang Zhuoyi VSCL: Automating Vulnerability Detection in Smart Contracts with Deep Learning In IEEE International Conference on Blockchain and Cryptocurrency (ICBC) 2021.","DOI":"10.1109\/ICBC51069.2021.9461050"},{"key":"e_1_3_1_24_2","first-page":"2018","article-title":"A Bayesian Network Model for Predicting Post-stroke Outcomes With Available Risk Factors, In volume","volume":"9","author":"Eunjeong Park","unstructured":"Eunjeong Park, A Bayesian Network Model for Predicting Post-stroke Outcomes With Available Risk Factors, In volume, Frontiers in Neurology 9, 2018.","journal-title":"Frontiers in Neurology"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-021-05986-9"},{"key":"e_1_3_1_26_2","doi-asserted-by":"crossref","unstructured":"Lucas Charlotte Pelletier A Bayesianinspired deep earning-based semi-supervised domain adaptation technique for land cover mapping In Machine Learning 2020. https:\/\/doi.org\/10.1007\/s10994-020-05942-z.","DOI":"10.1007\/s10994-020-05942-z"},{"issue":"4","key":"e_1_3_1_27_2","first-page":"3727","article-title":"Web Text Data Mining Method Based on Bayesian Network with Fuzzy Algorithms,","volume":"38","author":"Zhao","year":"2020","unstructured":"Zhao, Wei, Luo, Zeju, Web Text Data Mining Method Based on Bayesian Network with Fuzzy Algorithms,, Journal of Intelligent&Fuzzy Systems 38(4) (2020), 3727\u20133735.","journal-title":"Journal of Intelligent&Fuzzy Systems"},{"issue":"6","key":"e_1_3_1_28_2","first-page":"5753","article-title":"The Risk Assessment of Manufacturing Supply Chains Based on Bayesian Networks with Uncertainty of Demand","volume":"42","author":"Meng","year":"2022","unstructured":"Meng, Mengjun, Qiuyun, Wang, Yingming, The Risk Assessment of Manufacturing Supply Chains Based on Bayesian Networks with Uncertainty of Demand, Journal of Intelligent&Fuzzy Systems 42(6) (2022), 5753\u20135771.","journal-title":"Journal of Intelligent&Fuzzy Systems"},{"issue":"3","key":"e_1_3_1_29_2","first-page":"1991","article-title":"A Bayesian Network Structural Learning Algorithm for Calculating the Failure Probabilities of Complex Engineering Systems with Limited Data","volume":"42","author":"Chen","year":"2022","unstructured":"Chen, Yong, et al., A Bayesian Network Structural Learning Algorithm for Calculating the Failure Probabilities of Complex Engineering Systems with Limited Data, Journal of Intelligent&Fuzzy Systems 42(3) (2022), 1991\u20132004.","journal-title":"Journal of Intelligent&Fuzzy Systems"},{"issue":"2","key":"e_1_3_1_30_2","first-page":"2015","article-title":"Development of an Integrated Blended Learning Model and Its Performance Prediction on Students\u2019 Learning Using Bayesian Network,&","volume":"43","author":"Lakho","year":"2022","unstructured":"Lakho, Shamshad, et al., Development of an Integrated Blended Learning Model and Its Performance Prediction on Students\u2019 Learning Using Bayesian Network,&, Fuzzy Systems 43(2) (2022), 2015\u20132023.","journal-title":"Fuzzy Systems"},{"key":"e_1_3_1_31_2","unstructured":"Smart Contract Dataset (2022) Accessed on: Sept 7 2022. [Online] Available: https:\/\/github.com\/smartbugs\/smartbugs."},{"key":"e_1_3_1_32_2","doi-asserted-by":"crossref","unstructured":"TikhomirovS. VoskresenskayaE. Smartcheck: Static analysis of ethereum smart contracts In WETSEB 2018 pp. 9\u201316.","DOI":"10.1145\/3194113.3194115"},{"key":"e_1_3_1_33_2","unstructured":"MuellerB. (2017). ConsenSys\/Mythril. Accessed on: May 7 2022; [Online] Available: http:\/\/github.com\/ConsenSys\/mythril."},{"key":"e_1_3_1_34_2","unstructured":"Meon.fund Oyente (2020) Accessed on: May 7 2022; [Online].Available: https:\/\/github.com\/melonproject\/oyente."}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems: Applications in Engineering and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-221898","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-221898","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-221898","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:43:38Z","timestamp":1777455818000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-221898"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,21]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,1,30]]}},"alternative-id":["10.3233\/JIFS-221898"],"URL":"https:\/\/doi.org\/10.3233\/jifs-221898","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,21]]}}}