Vision-Based Learning for Cyberattack Detection in Blockchain Smart Contracts and Transactions
- URL: http://arxiv.org/abs/2512.11272v1
- Date: Fri, 12 Dec 2025 04:28:06 GMT
- Title: Vision-Based Learning for Cyberattack Detection in Blockchain Smart Contracts and Transactions
- Authors: Do Hai Son, Le Vu Hieu, Tran Viet Khoa, Yibeltal F. Alem, Hoang Trong Minh, Tran Thi Thuy Quynh, Nguyen Viet Ha, Nguyen Linh Trung,
- Abstract summary: We propose a novel and effective framework for detecting cyberattacks within blockchain systems.<n>Our framework begins with a preprocessing tool that uses Natural Language Processing (NLP) techniques to transform key features of blockchain transactions into image representations.<n>These images are then analyzed through vision-based analysis using Vision Transformers (ViT), a recent advancement in computer vision known for its superior ability to capture complex patterns and semantic relationships.
- Score: 1.6301630538569725
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Blockchain technology has experienced rapid growth and has been widely adopted across various sectors, including healthcare, finance, and energy. However, blockchain platforms remain vulnerable to a broad range of cyberattacks, particularly those aimed at exploiting transactions and smart contracts (SCs) to steal digital assets or compromise system integrity. To address this issue, we propose a novel and effective framework for detecting cyberattacks within blockchain systems. Our framework begins with a preprocessing tool that uses Natural Language Processing (NLP) techniques to transform key features of blockchain transactions into image representations. These images are then analyzed through vision-based analysis using Vision Transformers (ViT), a recent advancement in computer vision known for its superior ability to capture complex patterns and semantic relationships. By integrating NLP-based preprocessing with vision-based learning, our framework can detect a wide variety of attack types. Experimental evaluations on benchmark datasets demonstrate that our approach significantly outperforms existing state-of-the-art methods in terms of both accuracy (achieving 99.5%) and robustness in cyberattack detection for blockchain transactions and SCs.
Related papers
- On the Adversarial Robustness of Discrete Image Tokenizers [56.377796750281796]
We first formulate attacks that aim to perturb the features extracted by discrete tokenizers, and thus change the extracted tokens.<n>We fine-tune popular tokenizers with unsupervised adversarial training, keeping all other components frozen.<n>Our approach significantly improves robustness to both unsupervised and end-to-end supervised attacks and generalizes well to unseen tasks and data.
arXiv Detail & Related papers (2026-02-20T14:39:17Z) - SEDULity: A Proof-of-Learning Framework for Distributed and Secure Blockchains with Efficient Useful Work [41.41842611951311]
We name the framework SEDULity, which stands for a Secure, Efficient, Distributed, and Useful Learning-based blockchain system.<n>We show that our framework is distributed, secure, and efficiently trains ML models.<n>We further demonstrate that the proposed PoL framework can be extended to other types of useful work and design an incentive mechanism to incentivize task verification.
arXiv Detail & Related papers (2025-12-15T18:55:20Z) - BridgeShield: Enhancing Security for Cross-chain Bridge Applications via Heterogeneous Graph Mining [41.291205709614026]
Cross-chain bridges play a vital role in enabling blockchain interoperability.<n>Due to the inherent design flaws and the enormous value they hold, they have become prime targets for hacker attacks.<n>Existing detection methods mainly address single-chain behaviors and fail to capture cross-chain semantics.<n>We propose BridgeShield, a detection framework that jointly models the source chain, off-chain coordination, and destination chain within a unified graph representation.
arXiv Detail & Related papers (2025-08-28T07:59:20Z) - DoS Attacks and Defense Technologies in Blockchain Systems: A Hierarchical Analysis [0.8225825738565354]
This paper categorizes and organizes existing Denial of Service (DoS) attacks.<n>It focuses on explaining the principles and methods of contract layer and consensus layer DoS attacks.<n>It comprehensively analyzes and compares commonly used detection methods and defense technologies.
arXiv Detail & Related papers (2025-07-30T12:29:34Z) - Enhancing Blockchain Cross Chain Interoperability: A Comprehensive Survey [39.613235136790244]
We systematically analyze over 150 high impact sources from academic journals, digital libraries, and grey literature.<n>We offer a classification of interoperability approaches including Atomic Swaps, Sidechains, Light Clients, and so on, which represent the most comprehensive overview to date.<n>Our findings aim to support researchers, policymakers, and industry leaders in harnessing the transformative potential of blockchain interoperability to address current challenges and drive forward a cohesive multi-chain ecosystem.
arXiv Detail & Related papers (2025-05-08T04:24:50Z) - Trusted Compute Units: A Framework for Chained Verifiable Computations [41.94295877935867]
This paper introduces the Trusted Compute Unit (TCU), a unifying framework that enables composable and interoperable computations across heterogeneous technologies.<n>By enabling secure off-chain interactions without incurring on-chain confirmation delays or gas fees, TCUs significantly improve system performance and scalability.
arXiv Detail & Related papers (2025-04-22T09:01:55Z) - A Game-Theoretic Approach to the Study of Blockchain's Robustness [0.0]
This thesis investigates the robustness of blockchain protocols, specifically focusing on Proof-of-Stake.<n>We define robustness in terms of two critical properties: Safety, which ensures that the blockchain will not have permanent conflicting blocks, and Liveness, which guarantees the continuous addition of new reliable blocks.<n>Our research addresses the gap between traditional distributed systems approaches, which classify agents as either honest or Byzantine (i.e. malicious or faulty), and game-theoretic models that consider rational agents driven by incentives.
arXiv Detail & Related papers (2024-11-28T14:29:14Z) - Machine Learning for Blockchain Data Analysis: Progress and Opportunities [9.07520594836878]
blockchain datasets encompass multiple layers of interactions across real-world entities, e.g., human users, autonomous programs, and smart contracts.
These unique characteristics present both opportunities and challenges for machine learning on blockchain data.
This paper serves as a comprehensive resource for researchers, practitioners, and policymakers, offering a roadmap for navigating this dynamic and transformative field.
arXiv Detail & Related papers (2024-04-28T17:18:08Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - Collaborative Learning Framework to Detect Attacks in Transactions and Smart Contracts [26.70294159598272]
This paper presents a novel collaborative learning framework designed to detect attacks in blockchain transactions and smart contracts.
Our framework exhibits the capability to classify various types of blockchain attacks, including intricate attacks at the machine code level.
Our framework achieves a detection accuracy of approximately 94% through extensive simulations and 91% in real-time experiments with a throughput of over 2,150 transactions per second.
arXiv Detail & Related papers (2023-08-30T07:17:20Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.