Table 1 Comparisons for recent works.

From: An elegant intellectual engine towards automation of blockchain smart contract vulnerability detection

Authors

Focus

Technique

Advantages

Limitations

Chen et al.27

Semantic-based vulnerability detection

Residual Graph Convolutional Networks (GCN) with Edge Attention

Captures contextual information in smart contract code effectively

Edge attention mechanism increases computational complexity

Ma et al.28

Graph-based vulnerability detection

Hierarchical Graph Attention Network (HGAT)

Improves detection accuracy by considering hierarchical relationships

Requires high-quality labeled data for optimal performance

Jie et al.29

Blockchain programs for IoT use contract-oriented languages, executed automatically

Blockchain technology

Enhancing IoT solutions with technical capabilities

Traditional methods rely on rules, struggle with false positives, low accuracy

Osei et al.31

Wide and DL for vulnerability detection

Wide and Deep Neural Network (WDNN)

Combines memorization and generalization capabilities

May struggle with unseen vulnerability patterns

Sharma et al.32

IoT security layers discussed, DL model proposed for intrusion detection, explainable AI used for high accuracy

Intrusion Detection System (IDS)

Detect intrusions in IoT networks, prevent malicious activities efficiently

IoT systems face daily attacks, identification and mitigation needed for network protection

Zhen et al.33

Smart contract vulnerability detection

Dual Attention Graph Neural Network (DA-GNN)

Improves accuracy by leveraging dual attention for better feature extraction

Computationally intensive due to complex graph processing

He et al.21

Enhancing smart contract security

Pre-trained language models for vulnerability detection

Leverages NLP advancements for precise vulnerability identification

Requires extensive training data and high computational resources

Wu et al.25

Smart contract vulnerability detection using hybrid attention

Combine self-attention and convolutional layers

Improved accuracy, handles complex patterns well

Computationally expensive, struggles with large datasets

Wu et al.34

Improved dual-channel technique for identifying vulnerabilities in smart contracts

Dual-channel approach for syntactic and semantic analysis

Enhanced detection performance and faster processing

Increased computational cost and scalability issues

Mothukuri et al.35

Trust scoring and vulnerability detection in DeFi projects

XGBoost

Multi-perspective evaluation with Enhanced transparency and trust

May not scale efficiently across all DeFi platforms

Yazdinejad et al.26

Threat detection in IoT networks using blockchain

DNN

Decentralized architecture enhances security

High resource requirements for fuzzy logic and blockchain computation