Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A smart contract security vulnerability mining method and system based on artificial intelligence

A smart contract and vulnerability mining technology, applied in computer security devices, data processing applications, finance, etc., can solve the problems of complex logic rules, inability to be used in large-scale automation, lack of intelligence, etc., to reduce the cost of manual intervention, Avoid the effect of wide spread

Active Publication Date: 2021-03-26
憨猴科技集团有限公司
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These logical rules are numerous and complex, and manual definitions are prone to omissions. If omissions occur, even if the static analysis method is completely correct, security vulnerabilities will be overlooked;
[0006] (2) For the method of mining vulnerabilities based on code static analysis, a large amount of manual intervention is required, so that it cannot be used in large-scale automation;
[0007] (3) The current formal proof method cannot prove the security of a smart contract in the true sense, because according to the requirements of formal proof, a system must be proved to be safe by all its associated codes, so if To use formal proof, it is necessary to verify every line of code of the entire Ethereum system from the bottom layer to the upper layer, and every change needs to be completely re-verified, which is currently unrealistic;
[0008] (4) All current methods lack the characteristics of intelligence, that is, they can only detect fixed rules, do not have the function of evolution and learning, and do not know how to relearn when encountering new security vulnerabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A smart contract security vulnerability mining method and system based on artificial intelligence
  • A smart contract security vulnerability mining method and system based on artificial intelligence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The concept, specific structure and technical effects of the present disclosure will be clearly and completely described below in conjunction with the embodiments and drawings, so as to fully understand the purpose, scheme and effect of the present disclosure. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0047] Such as figure 1 Shown is a flow chart of an artificial intelligence-based smart contract security vulnerability mining method according to the present disclosure, combined below figure 1 An artificial intelligence-based smart contract security vulnerability mining method according to an embodiment of the present disclosure will be described.

[0048] This disclosure proposes an artificial intelligence-based smart contract security vulnerability mining method, which specifically includes the following steps:

[0049] Step 1, the smart contra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an intelligent contract security vulnerability mining method and system based on artificial intelligence. The invention provides an intelligent contract security vulnerabilitymining method based on artificial intelligence. The method comprises the following steps of disassembling a binary system of the intelligent contract according to an instruction set of an intelligentcontract, converting the system into smart contract assembly, dividing the byte code into different modules according to an intelligent contract byte code jump instruction; and then according to thesource code block and the target code block of the jump instruction, generating a control flow graph of the intelligent contract byte code for deep learning, thereby greatly reducing the manual intervention cost, and furthest avoiding negligence on security vulnerability detection caused by manual intervention errors in other defenses. The technology disclosed by the invention can be applied to anindustrial platform in a large range; the technology disclosed by the invention has an intelligent learning function, and when a novel vulnerability sample is found, the characteristics of the vulnerability sample can be quickly learned, so that the large-range diffusion of vulnerabilities is avoided.

Description

technical field [0001] The disclosure relates to the fields of artificial intelligence and smart contracts, and specifically relates to a method for mining security vulnerabilities of smart contracts based on artificial intelligence, which is applicable to the discovery and early warning of vulnerabilities in Ethereum smart contracts. Background technique [0002] As a decentralized consensus system, blockchain has been widely used in many fields that traditionally rely on centralized trust institutions. As the pioneer of blockchain 2.0, Ethereum currently has the world's largest blockchain open source platform and community, which can provide developers with the ability to write their own blockchain rules and distributed ledgers. Ethereum named this technology smart contracts. A smart contract is a piece of code that runs on the blockchain. This code specifies the transaction rules on the blockchain, so nodes on this chain must unconditionally follow this rule to conduct t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06F21/57G06Q40/04
CPCG06F21/563G06F21/577G06Q40/04
Inventor 肖银皓
Owner 憨猴科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products