{"id":"https://openalex.org/W4387185496","doi":"https://doi.org/10.3233/faia230374","title":"GraphSA: Smart Contract Vulnerability Detection Combining Graph Neural Networks and Static Analysis","display_name":"GraphSA: Smart Contract Vulnerability Detection Combining Graph Neural Networks and Static Analysis","publication_year":2023,"publication_date":"2023-09-28","ids":{"openalex":"https://openalex.org/W4387185496","doi":"https://doi.org/10.3233/faia230374"},"language":"en","primary_location":{"id":"doi:10.3233/faia230374","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia230374","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA230374","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA230374","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101265395","display_name":"Long He","orcid":"https://orcid.org/0000-0003-4484-5825"},"institutions":[{"id":"https://openalex.org/I18452120","display_name":"Yantai University","ror":"https://ror.org/01rp41m56","country_code":"CN","type":"education","lineage":["https://openalex.org/I18452120"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Long He","raw_affiliation_strings":["School of Computer and Control Engineering, Yantai University, Yantai 264005, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Control Engineering, Yantai University, Yantai 264005, China","institution_ids":["https://openalex.org/I18452120"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087919123","display_name":"Xiangfu Zhao","orcid":"https://orcid.org/0000-0001-5870-5730"},"institutions":[{"id":"https://openalex.org/I18452120","display_name":"Yantai University","ror":"https://ror.org/01rp41m56","country_code":"CN","type":"education","lineage":["https://openalex.org/I18452120"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiangfu Zhao","raw_affiliation_strings":["School of Computer and Control Engineering, Yantai University, Yantai 264005, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Control Engineering, Yantai University, Yantai 264005, China","institution_ids":["https://openalex.org/I18452120"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100373193","display_name":"Yichen Wang","orcid":"https://orcid.org/0000-0002-7189-3163"},"institutions":[{"id":"https://openalex.org/I18452120","display_name":"Yantai University","ror":"https://ror.org/01rp41m56","country_code":"CN","type":"education","lineage":["https://openalex.org/I18452120"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yichen Wang","raw_affiliation_strings":["School of Computer and Control Engineering, Yantai University, Yantai 264005, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Control Engineering, Yantai University, Yantai 264005, China","institution_ids":["https://openalex.org/I18452120"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100567983","display_name":"Jiahui Yang","orcid":"https://orcid.org/0009-0003-5225-8572"},"institutions":[{"id":"https://openalex.org/I18452120","display_name":"Yantai University","ror":"https://ror.org/01rp41m56","country_code":"CN","type":"education","lineage":["https://openalex.org/I18452120"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiahui Yang","raw_affiliation_strings":["School of Computer and Control Engineering, Yantai University, Yantai 264005, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Control Engineering, Yantai University, Yantai 264005, China","institution_ids":["https://openalex.org/I18452120"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108785001","display_name":"Xuelei Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I18452120","display_name":"Yantai University","ror":"https://ror.org/01rp41m56","country_code":"CN","type":"education","lineage":["https://openalex.org/I18452120"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuelei Sun","raw_affiliation_strings":["School of Computer and Control Engineering, Yantai University, Yantai 264005, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Control Engineering, Yantai University, Yantai 264005, China","institution_ids":["https://openalex.org/I18452120"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5087919123"],"corresponding_institution_ids":["https://openalex.org/I18452120"],"apc_list":null,"apc_paid":null,"fwci":3.1509,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.92516323,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9839000105857849,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9839000105857849,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9495999813079834,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8106197714805603},{"id":"https://openalex.org/keywords/opcode","display_name":"Opcode","score":0.66789311170578},{"id":"https://openalex.org/keywords/control-flow-graph","display_name":"Control flow graph","score":0.6663379669189453},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5645531415939331},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.4948393702507019},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.45154449343681335},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.43213173747062683},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.4253523051738739},{"id":"https://openalex.org/keywords/smart-contract","display_name":"Smart contract","score":0.42146626114845276},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4209912419319153},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4100561738014221},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.40611422061920166},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3289417028427124},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2898194193840027},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1463097333908081},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.10879653692245483},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10809087753295898}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8106197714805603},{"id":"https://openalex.org/C52173422","wikidata":"https://www.wikidata.org/wiki/Q766483","display_name":"Opcode","level":2,"score":0.66789311170578},{"id":"https://openalex.org/C27458966","wikidata":"https://www.wikidata.org/wiki/Q1187693","display_name":"Control flow graph","level":2,"score":0.6663379669189453},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5645531415939331},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.4948393702507019},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.45154449343681335},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.43213173747062683},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.4253523051738739},{"id":"https://openalex.org/C2779950589","wikidata":"https://www.wikidata.org/wiki/Q7544035","display_name":"Smart contract","level":3,"score":0.42146626114845276},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4209912419319153},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4100561738014221},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.40611422061920166},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3289417028427124},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2898194193840027},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1463097333908081},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.10879653692245483},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10809087753295898},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/faia230374","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia230374","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA230374","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.3233/faia230374","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia230374","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA230374","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6100000143051147,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3638049514","display_name":null,"funder_award_id":"62072392","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7880935157","display_name":null,"funder_award_id":"61972360","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4387185496.pdf"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W2539190473","https://openalex.org/W2540162589","https://openalex.org/W2595976459","https://openalex.org/W2755841085","https://openalex.org/W2784110831","https://openalex.org/W2899379687","https://openalex.org/W2911557038","https://openalex.org/W2949557841","https://openalex.org/W2963401022","https://openalex.org/W2963610883","https://openalex.org/W2964015378","https://openalex.org/W3003036212","https://openalex.org/W3035733952","https://openalex.org/W3105187050","https://openalex.org/W3183985440","https://openalex.org/W3215438351","https://openalex.org/W4200390322","https://openalex.org/W4205750933","https://openalex.org/W4225727354","https://openalex.org/W4248175462","https://openalex.org/W4283257386","https://openalex.org/W4285716886","https://openalex.org/W4289548059","https://openalex.org/W4294558607","https://openalex.org/W4294636385"],"related_works":["https://openalex.org/W4377235325","https://openalex.org/W4226025875","https://openalex.org/W4322577345","https://openalex.org/W4323712682","https://openalex.org/W4385749679","https://openalex.org/W2982912425","https://openalex.org/W2876884816","https://openalex.org/W4384302888","https://openalex.org/W2111825754","https://openalex.org/W2135849267"],"abstract_inverted_index":{"Security":[0],"incidents":[1],"in":[2,23,78,119],"smart":[3,24,52,74,148],"contracts":[4,25,149],"still":[5],"occur":[6],"frequently,":[7],"as":[8],"the":[9,59,67,79,92,114,120],"underlying":[10],"code":[11,85,98],"is":[12,63],"often":[13],"vulnerable":[14],"to":[15,20,112,133],"attacks.":[16],"However,":[17],"traditional":[18],"methods":[19],"detect":[21],"vulnerabilities":[22],"are":[26],"limited":[27],"by":[28,65],"certain":[29],"rigid":[30],"rules,":[31],"reducing":[32],"accuracy":[33,173],"and":[34,48,88,106,128,137,153],"scalability.":[35],"In":[36],"this":[37],"work,":[38],"we":[39,57,101,126,141],"propose":[40,102],"GraphSA,":[41],"which":[42,62],"combines":[43],"Graph":[44],"neural":[45,109],"networks":[46],"(GNNs)":[47],"Static":[49],"Analysis":[50],"for":[51],"contract":[53,60],"vulnerability":[54],"detection.":[55],"First,":[56],"present":[58],"tree,":[61],"obtained":[64],"converting":[66],"control":[68,93],"flow":[69,94],"graph":[70,108],"(CFG)":[71],"of":[72,116,162],"a":[73,82],"contract.":[75],"Each":[76],"node":[77,118],"tree":[80],"represents":[81,91],"crucial":[83],"operation":[84],"(opcode)":[86],"block,":[87],"each":[89,117],"edge":[90],"(execution":[95],"order)":[96],"between":[97],"blocks.":[99],"Then,":[100],"an":[103],"extended":[104],"SAGConv":[105],"Topkpooling":[107],"network":[110],"(ST-GNN)":[111],"learn":[113],"features":[115],"tree.":[121],"To":[122],"enhance":[123],"detection":[124,172],"accuracy,":[125],"eliminate":[127],"merge":[129],"some":[130],"non-crucial":[131],"nodes":[132,136],"highlight":[134],"key":[135],"execution":[138],"orders.":[139],"Finally,":[140],"evaluate":[142],"our":[143,168],"approach":[144,169],"on":[145,151,159],"7,962":[146],"real-world":[147],"running":[150],"Ethereum":[152],"compare":[154],"it":[155],"with":[156],"state-of-the-art":[157],"approaches":[158],"six":[160],"types":[161],"vulnerabilities.":[163],"Experimental":[164],"results":[165],"show":[166],"that":[167],"achieves":[170],"higher":[171],"than":[174],"others.":[175]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
