ISSN :3049-2335

Smart Contracts- Vulnerabilities, CodeLlama Usage and Gas-Driven Detection

Original Research (Published On: 23-May-2025 )
DOI : https://dx.doi.org/10.54364/cybersecurityjournal.2025.1111

natan katz

Adv. Know. Base. Syst. Data Sci. Cyber., 2 (2):215-235

natan katz : Co-founder of a startup, independent researcher of AI, and cyber

Download PDF Here

DOI: https://dx.doi.org/10.54364/cybersecurityjournal.2025.1111

Article History: Received on: 02-Apr-25, Accepted on: 16-May-25, Published on: 23-May-25

Corresponding Author: natan katz

Email: natan.katz@gmail.com

Citation: Natan katz (2025). Smart Contracts- Vulnerabilities, CodeLlama Usage and Gas-Driven Detection. Adv. Know. Base. Syst. Data Sci. Cyber., 2 (2 ):215-235


s

Abstract

    

Smart contracts are a major tool in Ethereum transactions. Therefore

hackers can exploit them by adding code vulnerabilities to their sources

and using these vulnerabilities for performing malicious transactions. This

paper presents two successful approaches for detecting malicious contracts:

one uses opcode and relies on GPT2 and the other uses the Solidity source

and a LORA fine-tuned CodeLlama. Finally, we present an XGBOOST

model that combines gas properties and Hexa-decimal signatures for detecting

   malicious transactions. This approach relies on early assumptions

that maliciousness is manifested by the uncommon usage of the contracts’

functions and the effort to pursue the transaction.

Reference

   



Statistics

   Article View: 275
   PDF Downloaded: 6