Research Article
A Novel Machine Learning-Based Analysis Model for Smart Contract Vulnerability
Table 2
Date set of malicious smart contracts.
| | Vulnerability category | The number of smart contracts |
| | Arithmetic | 15 | | Access control | 19 | | Re-entrancy | 20 | | Bad randomness | 8 | | Denial of service | 6 | | Unchecked low level | 5 | | Short address | 1 | | Front running | 4 |
|
|