Intelligent contract security vulnerability detection method based on machine learning

A technology for smart contracts and vulnerability detection, applied in computer security devices, instruments, data processing applications, etc., and can solve problems such as security vulnerabilities and smart contract community damage

Active Publication Date: 2020-01-31
JINAN UNIVERSITY
View PDF6 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If these tools fail to analyze an increasing number of contracts in a timely manner, more and more security breaches will cause irreparable damage to the smart contract community

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent contract security vulnerability detection method based on machine learning
  • Intelligent contract security vulnerability detection method based on machine learning
  • Intelligent contract security vulnerability detection method based on machine learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0039] This embodiment discloses a machine learning-based smart contract security vulnerability detection method, such as figure 1 As shown, the detection method includes the following steps:

[0040]S1. Collect a large amount of Solidity smart contract codes and Java / C++ codes on the Internet to form the basic data set for machine learning. Select contracts whose Solidity compilation version is higher than the specified version number and whose code content repetition rate is lower than the repetition threshold in the basic data set as the machine learning sample set;

[0041] Specifically in this embodiment, the process of step S1 is as follows:

[0042] S11. Use crawler scripts to collect Solidity smart contract codes from the Ethereum smart contract platform, and collect Java / C++ codes from the open source community;

[0043] S12. Convert the Solidity smart contract code into structured XML text, directly obtain the compiled version of Solidity, and then compare the conv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intelligent contract security vulnerability detection method based on machine learning, and the method comprises the steps: firstly collecting intelligent contract source code data, carrying out the data preprocessing, and constructing a sample set of machine learning; determining a vulnerability label for the sample set data through a public intelligent contract vulnerability detector; translating the smart contract source code into an XML structured text; on this basis, carrying out feature extraction on intelligent contract source codes in a data set, and for different vulnerability types of intelligent contracts, considering the limited current Solidy intelligent contract sample data, so that two different machine learning algorithms are adopted to carry outanalysis according to the number of label samples, a random forest algorithm is adopted to construct a model for multiple data samples, transfer learning is adopted to construct a detection model forfew data samples, and the Solidy smart contract vulnerability can be detected more efficiently and automatically.

Description

technical field [0001] The invention relates to the technical field of cyberspace security, in particular to a machine learning-based smart contract security loophole detection method. Background technique [0002] Ethereum is the most mature public chain other than Bitcoin. With the continuous development and maturity on a global scale, it has become the preferred development platform for the underlying blockchain in the industry. Ethereum can support Turing's complete smart contract, which breaks through the restrictions of Bitcoin on the application of blockchain, so that people's understanding of blockchain is no longer limited to digital currency, and the application field is further expanded in the form of smart contracts to All walks of life, such as blockchain distributed application DApp. The economic losses due to the blockchain’s own mechanism problems, ecological security and user safety have reached billions of dollars, and the losses caused by smart contract s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06Q40/04
CPCG06F21/577G06Q40/04
Inventor 翁健陈新凯李明袁浩宸张斌卢贺贤
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products