AtomGraph: Tackling Atomicity Violation in Smart Contracts using Multimodal GCNs
This program is tentative and subject to change.
Smart contracts are a core component of blockchain technology and are widely deployed across various scenarios. However, atomicity violations have become a potential security risk. Existing analysis tools often lack the precision required to detect these issues effectively. To address this challenge, we introduce AtomGraph, an automated framework designed for detecting atomicity violations. This framework leverages Graph Convolutional Networks (GCN) to identify atomicity violations through multimodal feature learning and fusion. Specifically, driven by a collaborative learning mechanism, the model simultaneously learns from two heterogeneous modalities: extracting structural topological features from the contract’s Control Flow Graph (CFG) and uncovering deep semantics from its opcode sequence. We designed an adaptive weighted fusion mechanism to dynamically adjust the weights of features from each modality to achieve optimal feature fusion. Finally, GCN detects graph-level atomicity violation on the contract. Comprehensive experimental evaluations demonstrate that AtomGraph achieves 96.88% accuracy and 96.97% F1 score, outperforming existing tools. Furthermore, compared to the concatenation fusion model, AtomGraph improves the F1 score by 6.4%, proving its potential in smart contract security detection.
This program is tentative and subject to change.
Fri 17 AprDisplayed time zone: Brasilia, Distrito Federal, Brazil change
16:00 - 17:30 | Dependability and Security 11Journal-first Papers / New Ideas and Emerging Results (NIER) / Research Track at Oceania X Chair(s): Jacques Klein University of Luxembourg | ||
16:00 15mTalk | AtomGraph: Tackling Atomicity Violation in Smart Contracts using Multimodal GCNs New Ideas and Emerging Results (NIER) Xiaoqi Li Hainan University, Zongwei Li Hainan University, Wenkai Li Hainan University, Zeng Zhang Hainan University, Lei Xie Hainan University | ||
16:15 15mTalk | ACFix: Guiding LLMs with Mined Common RBAC Practices for Context-Aware Repair of Access Control Vulnerabilities in Smart Contracts Journal-first Papers Lyuye Zhang Nanyang Technological University, Kaixuan Li Nanyang Technological University, Kairan Sun Nanyang Technological University, Daoyuan Wu Lingnan University, Ye Liu Singapore Management University, Haoye Tian Aalto University, Yang Liu Nanyang Technological University | ||
16:30 15mTalk | Do Automated Fixes Truly Mitigate Smart Contract Exploits? Journal-first Papers Sofia Bobadilla KTH Royal Institute of Technology, Sweden, Mónica Jin KTH Royal Institute of Technology, Martin Monperrus KTH Royal Institute of Technology | ||
16:45 15mTalk | CKG-LLM: LLM-Assisted Detection of Smart Contract Access Control Vulnerabilities Based on Knowledge Graphs New Ideas and Emerging Results (NIER) Xiaoqi Li Hainan University, Hailu Kuang Hainan University, Wenkai Li Hainan University, Zongwei Li Hainan University, Shipeng Ye Hainan University | ||
17:00 15mTalk | One Signature, Multiple Payments: Demystifying and Detecting Signature Replay Vulnerabilities in Smart Contracts Research Track Zexu Wang Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Zewei Lin Sun Yat-sen University, Wenqing Chen Sun Yat-sen University, Kaiwen Ning Sun Yat-sen University, Jianxing Yu Sun Yat-sen University, Yuming Feng Peng Cheng Laboratory, Yu Zhang Harbin Institute of Technology, Weizhe Zhang Harbin Institute of Technology, Zibin Zheng Sun Yat-sen University Pre-print Media Attached | ||
17:15 15mTalk | USCSA: Evolution-Aware Security Analysis for Proxy-Based Upgradeable Smart Contracts New Ideas and Emerging Results (NIER) Xiaoqi Li Hainan University, Lei Xie Hainan University, Wenkai Li Hainan University, Zongwei Li Hainan University Media Attached | ||