Research Article

A Novel Machine Learning-Based Analysis Model for Smart Contract Vulnerability

Table 5

The result of experiment.

VulnerabilitiesModelsTools
NamesKNNSGDOyenteSmartCheck
Accuracy (%)Recall (%)Precision (%)Accuracy (%)Recall (%)Precision (%)Accuracy (%)Recall (%)Precision (%)Accuracy (%)Recall (%)Precision (%)

Re-entrancy95.4595.4595.8395.4568.1870.8370.1072.1072.1075.2060.1063.50
Arithmetic95.5490.9091.1090.1098.1095.1074.5062.1064.5085.2053.1065.54
Access control95.0095.0096.6795.4594.4495.5450.1054.1052.5067.2053.1065.54
Bad randomness90.1093.1091.1074.1075.1073.1046.1047.2047.3054.1055.1056.10
Denial of service90.2090.2690.5664.2065.1062.4047.1048.4243.6461.1059.1060.20
Unchecked low level90.1090.1090.1081.1081.2080.1065.6563.3454.2459.1050.2050.10
Short address91.1091.1092.8578.1077.2782.1449.3048.4547.6567.1061.1061.10
Front running95.4595.4596.1089.9086.1086.2054.2756.1859.2655.2056.2054.10