Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Block chain transaction monitoring method and system based on static characteristics and dynamic instrumentation

A block chain and static detection technology, applied in the field of computer security, can solve the problems of high false alarm rate of vulnerabilities, inability to detect lightning loan vulnerabilities, and inability to detect vulnerabilities, so as to reduce the detection false positive rate, improve detection accuracy, and improve The effect of detection accuracy

Inactive Publication Date: 2022-01-11
北京雁翎网卫智能科技有限公司
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, malicious transaction detection and research on classic vulnerabilities of smart contracts (integer overflow, reentrancy vulnerabilities, timestamp dependency vulnerabilities, etc.) are relatively rich, but it is impossible to detect some code logic vulnerabilities, and it is also impossible to detect flash loan vulnerabilities. , and the false positive rate of vulnerabilities generated by static analysis is relatively high
In addition, the current transaction monitoring and data analysis on the blockchain are only used to track the flow of assets, and rarely involve the monitoring of malicious transactions.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain transaction monitoring method and system based on static characteristics and dynamic instrumentation
  • Block chain transaction monitoring method and system based on static characteristics and dynamic instrumentation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Below in conjunction with the accompanying drawings, the present invention is further described by means of embodiments, but the scope of the present invention is not limited in any way.

[0030] like figure 1 The flow of the blockchain transaction detection method shown, the specific implementation includes four stages:

[0031] Stage 1. Transaction data extraction and analysis stage;

[0032] Stage 2, transaction data static detection stage;

[0033] Stage 3: The dynamic execution test stage of transaction data;

[0034] The fourth stage is the transaction confirmation and reporting stage.

[0035] The first stage includes the following steps:

[0036] Step 1, run the blockchain main network node client to collect the smart contract addresses to be monitored;

[0037] Among them, the smart contract addresses to be monitored include but are not limited to:

[0038] Addresses of DeFi contract projects with large funds, such as Aave, Curve, Maker, Compound, WBTC, U...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a block chain transaction monitoring method and system based on static characteristics and dynamic instrumentation, and the method and system reduce the detection false alarm rate of malicious transactions to the greatest extent through transaction data static semantic analysis and transaction replay dynamic execution detection, distinguish malicious transaction and normal transaction behaviors more accurately. The transmission behavior of sensitive data in the transaction is detected by intelligent contract virtual machine instrumentation and dynamic taint analysis methods; and meanwhile, a machine learning method is utilized, return results of malicious transaction behaviors and normal transaction behaviors detected by a system dynamic and static method are analyzed, and a final study and judgment stage is added, so that whether the transaction is the malicious transaction or not can be effectively judged. The invention can detect the transaction of the corresponding smart contract of the block chain, assists a machine learning algorithm to effectively improve the detection accuracy in a mode of combining static feature analysis and dynamic execution detection and analysis, and has a significant effect on improving the detection accuracy.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a method and system for monitoring block chain transactions based on static features and dynamic instrumentation. Background technique [0002] With the further improvement of network informatization and the development of blockchain technology, the scale of the blockchain-based transaction market has expanded rapidly in recent years. At the same time, due to the lack of supervision of transactions and data on the chain, there are a large number of Malicious transactions threaten the security of smart contracts and user funds on the chain, causing immeasurable economic losses. [0003] One of the most important technical features of blockchain is smart contracts. Smart contracts are programs stored on the blockchain that assist and verify the negotiation and operation of contracts. Many blockchain platforms support the operation of smart contracts. Blockchain smart c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06Q20/40G06N20/00
CPCG06Q20/3829G06Q20/401G06Q20/405G06N20/00
Inventor 刘宇航陈夏润肖遥杨洲胡叶舟方莹刘军杰
Owner 北京雁翎网卫智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products