Leveraging Machine Learning Models to Improve Smart Contract Security: A Survey of Vulnerabilities and Detection Methods

Research output: Contribution to journalReview articlepeer-review

1 Scopus citations

Abstract

Smart Contracts (SCs), self-executing programs on blockchain platforms, are transforming industries such as banking, healthcare, and supply chains through automated, trustless transactions. However, their inherent vulnerabilities have led to severe financial and operational losses, with large-scale exploits causing substantial economic damage. Machine Learning (ML) has emerged as a promising approach for SC vulnerability detection, yet its effectiveness, adaptability, and generalizability remain insufficiently explored. This article comprehensively classifies current Ethereum SC vulnerabilities and attacks. It also surveys 108 ML-based detection methods, covering both traditional models and a structured taxonomy of advanced approaches such as GNN-based, LLM-based, contrastive learning, ensemble, hybrid, meta-learning, and transfer learning techniques. The strengths, limitations, and practical challenges of these methods are systematically analyzed, with particular attention to factors such as detection stages, classification problems, dataset characteristics, feature engineering, performance evaluation, generalizability, detection capability, model aging, and ethical and privacy implications. Additionally, existing datasets on SC vulnerabilities are reviewed and consolidated. By integrating these insights, this work provides actionable guidelines and a foundation for building secure, resilient, and trustworthy SC ecosystems.

Original languageEnglish
Article number151
JournalACM Computing Surveys
Volume58
Issue number6
DOIs
StatePublished - 9 Dec 2025

Bibliographical note

Publisher Copyright:
© 2025 Copyright held by the owner/author(s).

Keywords

  • Blockchain
  • ethereum
  • machine learning
  • security
  • smart contract vulnerabilities
  • smart contracts
  • software security

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Leveraging Machine Learning Models to Improve Smart Contract Security: A Survey of Vulnerabilities and Detection Methods'. Together they form a unique fingerprint.

Cite this