Intelligent contract security vulnerability mining method and system based on artificial intelligence

A smart contract and vulnerability mining technology, which is applied in the direction of computer security devices, instruments, platform integrity maintenance, etc., can solve the problems of complex logic rules, the inability to be used in large-scale automation, and the neglect of security vulnerabilities, so as to reduce manual intervention cost, the effect of avoiding widespread spread

Active Publication Date: 2019-08-27
佛山市微风科技有限公司
View PDF12 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These logical rules are numerous and complex, and manual definitions are prone to omissions. If omissions occur, even if the static analysis method is completely correct, security vulnerabilities will be overlooked;
[0006] (2) For the method of mining vulnerabilities based on code static analysis, a large amount of manual intervention is required, so that it cannot be used in large-scale automation;
[0007] (3) The current formal proof method cannot prove the security of a smart contract in the true sense, because according to the requirements of f

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent contract security vulnerability mining method and system based on artificial intelligence
  • Intelligent contract security vulnerability mining method and system based on artificial intelligence

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0046] In the following, the concept, specific structure, and technical effects of the present disclosure will be clearly and completely described with reference to the embodiments and drawings, so as to fully understand the objectives, solutions, and effects of the present disclosure. It should be noted that the embodiments in the application and the features in the embodiments can be combined with each other if there is no conflict.

[0047] Such as figure 1 Shown is a flowchart of an artificial intelligence-based smart contract security vulnerability mining method according to the present disclosure. The following is combined figure 1 To illustrate an artificial intelligence-based smart contract security vulnerability mining method according to the embodiments of the present disclosure.

[0048] The present disclosure proposes an artificial intelligence-based smart contract security vulnerability mining method, which specifically includes the following steps:

[0049] Step 1. The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intelligent contract security vulnerability mining method and system based on artificial intelligence. The invention provides an intelligent contract security vulnerabilitymining method based on artificial intelligence. The method comprises the following steps of disassembling a binary system of the intelligent contract according to an instruction set of an intelligentcontract, converting the system into smart contract assembly, dividing the byte code into different modules according to an intelligent contract byte code jump instruction; and then according to thesource code block and the target code block of the jump instruction, generating a control flow graph of the intelligent contract byte code for deep learning, thereby greatly reducing the manual intervention cost, and furthest avoiding negligence on security vulnerability detection caused by manual intervention errors in other defenses. The technology disclosed by the invention can be applied to anindustrial platform in a large range; the technology disclosed by the invention has an intelligent learning function, and when a novel vulnerability sample is found, the characteristics of the vulnerability sample can be quickly learned, so that the large-range diffusion of vulnerabilities is avoided.

Description

technical field [0001] The disclosure relates to the fields of artificial intelligence and smart contracts, and specifically relates to a method for mining security vulnerabilities of smart contracts based on artificial intelligence, which is applicable to the discovery and early warning of vulnerabilities in Ethereum smart contracts. Background technique [0002] As a decentralized consensus system, blockchain has been widely used in many fields that traditionally rely on centralized trust institutions. As the pioneer of blockchain 2.0, Ethereum currently has the world's largest blockchain open source platform and community, which can provide developers with the ability to write their own blockchain rules and distributed ledgers. Ethereum named this technology smart contracts. A smart contract is a piece of code that runs on the blockchain. This code specifies the transaction rules on the blockchain, so nodes on this chain must unconditionally follow this rule to conduct t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/57G06Q40/04
CPCG06F21/563G06F21/577G06Q40/04
Inventor 肖银皓
Owner 佛山市微风科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products