Research Article

A Novel Machine Learning-Based Analysis Model for Smart Contract Vulnerability

Algorithm 2

Get common child nodes.
Input: : AST of the smart contract to be analyzed :AST of malicious smart contract
Output: : the list of the shared child node is an empty list
fordo
  ifthen
   
  end if
end for