Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Blockchain attack tracing system and method

A block chain and attacker's technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as increased time spent, limited resources, and excluding re-entrant attacks, and achieve the goal of improving credibility Effect

Active Publication Date: 2020-10-16
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But this method does not cover all reentrancy attacks
[0008] Although the detection technology based on dynamic analysis can detect more threats and vulnerabilities, it often requires a lot of resources, and the resources on the chain are also limited
At the same time, with the complexity of smart contract code functions, there are more and more execution paths for dynamic analysis, and the time spent is also increasing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain attack tracing system and method
  • Blockchain attack tracing system and method
  • Blockchain attack tracing system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034]In order to make the purpose, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention, that is, the described embodiments are only some of the embodiments of the present invention, but not all of them.

[0035] The detailed description of the embodiments of the invention is not intended to limit the scope of the claimed invention but to represent only selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts belong to the protection scope of the present invention.

[0036] It should be noted that relative terms such as the terms "first" and "second" are only used to distinguish one entity or operati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information security, provides a blockchain attack tracing system and method, and aims to solve the technical problem that an attacker cannot be tracedback when an attack threat is detected in a blockchain. According to the main scheme, the system comprises: a data acquisition module for capturing corresponding data in a full synchronization processto obtain transactions and transaction information thereof; a transaction database construction module which is used for establishing an external transaction information table, an internal transaction information table and a contract creation information table according to the obtained transaction and transaction information thereof and providing an API for data query, wherein the data mainly comprises two transaction parties, a transaction block height, a transaction amount and consumed gas; a data flow tree construction module which is used for acquiring transaction data through the API ofthe database to construct a data relationship tree; and an attacker tracing module which is used for carrying out stain marking on the basis of the established data flow tree and finally positioning an attacker according to the depth of stain marking.

Description

technical field [0001] The present invention belongs to the field of block chain security. When the smart contract is attacked, the source of the attack on the contract can be found by tracing the source according to the method. This method intuitively shows the connection between contracts and users by establishing a data relationship tree, and deepens the influence structure of the blockchain network. Invoking security mechanism processing after tracing to the source of the attack can greatly enhance the security of the blockchain. Background technique [0002] Blockchain is one of the hottest technologies at present, and its applications such as Bitcoin and Ethereum also have high economic value. Therefore, attacks on these blockchain applications using smart contracts emerge in endlessly. Many people are currently devoting themselves to research on how to prevent these attacks and protect assets on the chain. But the difficulty is that the code of the smart contract is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L2463/146H04L9/50
Inventor 牛伟纳张小松赵成洋朱航张珂旋黄晓祥李婷
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products