Unlock instant, AI-driven research and patent intelligence for your innovation.

Smart contract reentrant vulnerability detection method based on adversarial neural network

A smart contract and neural network technology, applied in neural learning methods, biological neural network models, neural architectures, etc., can solve problems such as low accuracy

Pending Publication Date: 2021-10-22
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The purpose of the present invention is to overcome the technical defects such as low accuracy of existing reentrant vulnerability detection methods, and to solve the technical problem of effectively detecting reentrant vulnerabilities before deploying smart contracts, and creatively propose a method based on adversarial neural Smart contract reentrancy vulnerability detection method for the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart contract reentrant vulnerability detection method based on adversarial neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0034] Such as figure 1 As shown, a smart contract reentrancy vulnerability detection method based on an adversarial neural network includes the following steps:

[0035] Step 1: The vulnerability statement library and the smart contract library perform data preprocessing, code embedding, and statement vector similarity comparisons to find out the actual location of the vulnerability statement in the smart contract and classify it by type. Finally, collect all vulnerable statements in the smart contract library.

[0036] Specifically, step 1 includes the following steps:

[0037] Step 1.1: Data preprocessing.

[0038] Use the "\n" identifier to split the vulnerability statement library and the smart contract library to obtain the statement-level contract code. Segment the sentence through the stuttering word segmentation tool to obtain the word sequence. Normalize word sequences, replacing single character variables with "single" and numbers with "num"; remove unnecessary ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a smart contract reentrant vulnerability detection method based on an adversarial neural network, and belongs to the technical field of block chain security. According to the method, extracting each type of vulnerability threat feature, and when the similarity between a contract statement and a vulnerability statement is greater than a threshold value, matching the contract statement and the vulnerability threat feature. And if matching succeeds, marking the contract statement with a vulnerability statement and recording the type of the vulnerability statement. If the matching fails, indicating that the misjudgment exists, and not marking the contract statement as a vulnerability statement. Through confrontation of the generator and the discriminator, the discriminator has good discrimination capability. According to the method, misjudgment of the vulnerability statements can be avoided, all the vulnerability statements in the intelligent contract library can be automatically searched, and the method has good accuracy.

Description

technical field [0001] The invention relates to a method for detecting a reentrant vulnerability of an intelligent contract based on an adversarial neural network, and belongs to the technical field of block chain security. Background technique [0002] Blockchain technology has many applications in modern information technology and computing environments. This technology has key characteristics such as decentralization, distribution, and tamper resistance, and has the ability to utilize distributed computing resources. A smart contract is a predefined piece of logic that automatically executes, controls, and records related events in the blockchain. The key functionality of smart contracts can ensure transactions are verified, payouts are settled, and malicious activity is detected and mitigated. [0003] Although smart contracts are widely used, there is no uniform standard for the order in which functions are executed in a blockchain system. Due to the lack of execution...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06N3/04G06N3/08
CPCG06F21/577G06N3/08G06N3/045
Inventor 盖珂珂祝烈煌苏鹏徐蕾蒋芃赵辉
Owner BEIJING INSTITUTE OF TECHNOLOGYGY