Extensible intelligent contract vulnerability detection method

A smart contract and vulnerability detection technology, applied in the field of scalable smart contract vulnerability detection, can solve the problems of high cost, long detection time, poor scalability, etc., and achieve the effect of high accuracy, convenient detection and fast speed

Pending Publication Date: 2020-01-07
CHONGQING UNIV OF POSTS & TELECOMM
View PDF1 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of the present invention is to provide a scalable smart contract vulnerability detection method aimed at detecting different block Common loopholes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Extensible intelligent contract vulnerability detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The embodiments of the present invention are described below through specific specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the contents disclosed in this specification. The present invention can also be implemented or applied through other different specific embodiments, and various details in this specification can also be modified or changed based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that the drawings provided in the following embodiments are only used to illustrate the basic idea of ​​the present invention in a schematic manner, and the following embodiments and features in the embodiments can be combined with each other without conflict.

[0033] Among them, the accompanying drawings are only used for exemplary description, and represent only schematic diagrams, not physical drawings, and should not be ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an extensible intelligent contract vulnerability detection method, and belongs to the technical field of intelligent contracts. The method comprises the following steps: firstly, summarizing vulnerability characteristics of the intelligent contract according to common intelligent contract safety vulnerabilities, and constructing a intelligent contract vulnerability rule base according to a characteristic custom rule; when a user detects the intelligent contract source code, a lexical analyzer and a syntax analyzer are generated through a self-defined ANTLR syntax rule,lexical analysis and syntax analysis are conducted on the intelligent contract source code, and the intelligent contract source code is converted into an abstract syntax tree and then converted intoXML intermediate representation; then extracting an XPath expression in the rule base file to inquire and locate matched nodes in the XML intermediate representation; and finally, repositioning the row number in the source code to form a vulnerability analysis report. By constructing the custom contract vulnerability rule base, detection is convenient, the speed is high, the accuracy is high, andthe expansibility is good.

Description

technical field [0001] The invention belongs to the field of smart contract security, and relates to an extensible smart contract vulnerability detection method. Background technique [0002] Smart contract is one of the core representative technologies of blockchain 2.0. Its essence is a computer program. As a computer program running on the blockchain, it greatly enriches the functions of the blockchain, making the blockchain not only distributed It is a ledger database, and can complete a certain degree of business processing. Due to the immutable nature of the blockchain, once deployed on the blockchain, it cannot be modified. If there are security loopholes in smart contracts, once the security loopholes are exploited, it is very likely to lead to catastrophic consequences. [0003] At present, common smart contract security vulnerability detection methods include detection methods based on symbolic execution and symbolic abstraction, detection methods based on machin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/57G06F8/41
CPCG06F21/577G06F21/563G06F8/42
Inventor 罗文俊赖恩梅程雨
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products