A python implementation of Toward Vulnerability Detection for Ethereum Smart Contracts Using Graph-Matching Network.基于图神经网络的以太坊智能合约漏洞检测方法研究
☆26Jul 7, 2023Updated 2 years ago
Alternatives and similar repositories for SmartCodeASG
Users that are interested in SmartCodeASG are comparing it to the libraries listed below
Sorting:
- Code using in Paper "Smart Contract Vulnerability Detection Based on Semantic Graph and Residual Graph Convolutional Networks with Edge A…☆16Apr 24, 2023Updated 2 years ago
- Cross-Modality Mutual Learning for Smart Contract Vulnerability Detection☆34Feb 28, 2023Updated 3 years ago
- Smart Contract Vulnerability Detection Based on Deep Learning. (LSTM, BLSTM, BLSTM+Attention)☆29Jul 14, 2019Updated 6 years ago
- 智能合约安全漏洞检测工具☆29Sep 11, 2023Updated 2 years ago
- DeeSCVHunter: A Deep Learning-Based Framework for Smart Contract Vulnerability Detection (IJCNN 2021)☆25May 14, 2023Updated 2 years ago
- Evaluation Results for the Paper "EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts"☆13May 28, 2021Updated 4 years ago
- 基于源代码的图融合的智能合约漏洞检测☆24Apr 23, 2024Updated last year
- Extracting graph data from smart contract source code☆13Feb 28, 2023Updated 3 years ago
- 基于字节码的图融合的智能合约漏洞检测☆13Apr 23, 2024Updated last year
- Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection (TSE Accepted)☆24Aug 23, 2022Updated 3 years ago
- Dynamit: Dynamic Vulnerability Detection of Ethereum Smart Contracts Using Machine Learning☆30Nov 6, 2023Updated 2 years ago
- Datasets for evaluating smart contract security analysis tools ( continuously updating... )☆199Aug 21, 2023Updated 2 years ago
- ☆67Aug 17, 2022Updated 3 years ago
- ☆25Jun 21, 2022Updated 3 years ago
- zkSNARK based Voting constructor☆12May 19, 2019Updated 6 years ago
- NFT game using Polygon and Torus☆10Apr 30, 2021Updated 4 years ago
- ☆46Jul 29, 2021Updated 4 years ago
- Smart Contract Vulnerability Detection Using Graph Neural Networks (IJCAI-20 Accepted)☆150Feb 28, 2023Updated 3 years ago
- Tree-LSTM + Self-Structured Attention -- a method to summarize textual data by topics☆10Apr 26, 2018Updated 7 years ago
- smart contracts deployed on Ethereum, one per skeleton☆11Mar 10, 2024Updated 2 years ago
- MANDO is a new heterogeneous graph representation to learn the heterogeneous contract graphs' structures to accurately detect vulnerabili…☆35Nov 24, 2023Updated 2 years ago
- Smart Contract Vulnerability Detection From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion (IJCAI-21 Accept…☆100Feb 28, 2023Updated 3 years ago
- ☆22Jun 20, 2024Updated last year
- Combining Graph Neural Networks with Expert Knowledge for Smart Contract Vulnerability Detection (TKDE Accepted)☆120Feb 28, 2023Updated 3 years ago
- ☆19Feb 22, 2024Updated 2 years ago
- Big integer arithmetic // secp256k1 & additional P256 ECC operations in circom☆15Dec 8, 2023Updated 2 years ago
- ☆15Sep 15, 2021Updated 4 years ago
- Betting dApp on Ethereum simulating a coin flip☆12Jan 7, 2021Updated 5 years ago
- LSTM-based smart contract reentry vulnerability detection.☆10Apr 14, 2019Updated 6 years ago
- Threshold Paillier implementation in Go, based on "A generalization of Paillier’s public-key system with applicationsto electronic voting…☆20Jan 21, 2020Updated 6 years ago
- Launch an Ethereum sandbox from the command line☆13Jun 5, 2017Updated 8 years ago
- ☆13Jul 6, 2023Updated 2 years ago
- Source code embeddings for various programming languages☆16Jul 11, 2018Updated 7 years ago
- ☆14Jul 18, 2019Updated 6 years ago
- Source code for Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration☆12Sep 4, 2024Updated last year
- ☆12Aug 7, 2023Updated 2 years ago
- my talk on defcon26☆20Sep 29, 2018Updated 7 years ago
- Anomaly detection in the Ethereum network☆14Apr 17, 2022Updated 3 years ago
- ☆61Jul 6, 2022Updated 3 years ago