Intelligent contract reentrancy vulnerability detection method based on graph neural network

A technology of smart contracts and neural networks, applied in the direction of neural learning methods, biological neural network models, neural architectures, etc., can solve the problems of lack of in-depth research on reentrant vulnerabilities, and achieve the goal of improving practicability and accuracy Effect

Active Publication Date: 2020-08-04
HANGZHOU YUNXIANG NETWORK TECH
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In June 2016, The DAO security breach resulted in a loss of US$50 million; in July 2017, the Parity multi-signature wallet had two security breaches, resulting in a loss of US$30 million and US$152 million respectively
Although methods have been proposed to detect various vulnerabilities in smart contracts, there is still a lack of in-depth research on reentrancy vulnerabilities in specific domains.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent contract reentrancy vulnerability detection method based on graph neural network
  • Intelligent contract reentrancy vulnerability detection method based on graph neural network
  • Intelligent contract reentrancy vulnerability detection method based on graph neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to clearly explain the present invention and make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention are clearly and completely described below in conjunction with the drawings in the embodiments of the present invention, in order to Those skilled in the art can implement it by referring to the text of the description. The technology of the present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.

[0034] The present invention is based on the graph neural network-based intelligent contract reentrant vulnerability detection method, mainly proposes a new time message flow neural network based on the graph neural network, trains and learns the standardized graph extracted by the smart contract, and generates a detection smart contract The identification model of reentrancy vulnerabili...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intelligent contract reentrancy vulnerability detection method based on a graph neural network, which realizes intelligent contract reentrancy vulnerability detection through optimized graph neural network training and learning, and specifically comprises the following steps: collecting an intelligent contract source code data set; extracting and constructing a corresponding graph structure model by the smart contract source code; standardizing the graph structure; constructing a graph neural network of the time message flow; and inputting the standardized intelligent contract graph structure data set, training an intelligent contract reentrant vulnerability detection model, and realizing intelligent contract reentrant vulnerability detection through the model. The static source code is converted into a message flow graph structure with a time sequence, reentrant and non-reentrant labels can be automatically output through the training model, the vulnerability detection accuracy is improved, a new method thought is provided for intelligent contract vulnerability detection, and the method has good practical value.

Description

technical field [0001] The invention belongs to the technical field of block chain smart contract security loophole detection, and in particular relates to a method for detecting reentrant loopholes of smart contracts based on a graph neural network. Background technique [0002] Smart contract is one of the core technologies of blockchain, it is the consensus rule in multi-party participation scenarios, and smart contract is the center of value transmission. The reason why security issues have become more important than ever after the emergence of the blockchain is because smart contracts realize a kind of value transfer. Every number on the blockchain is a value, and the digital changes caused by each loophole are behind it. Huge loss of value. [0003] In June 2016, The DAO security breach resulted in a loss of 50 million US dollars; in July 2017, the Parity multi-signature wallet had two security breaches, resulting in a loss of 30 million US dollars and 152 million US ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/56G06N3/04G06N3/08
CPCG06F21/577G06F21/563G06N3/08G06N3/045
Inventor 黄步添俞之贝刘成永苑振霞焦颖颖罗春凤黄媛媛
Owner HANGZHOU YUNXIANG NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products