CN114331396A - Automatic protocol security attribute extraction method and system for Ether house intelligent contract - Google Patents

Automatic protocol security attribute extraction method and system for Ether house intelligent contract Download PDF

Info

Publication number
CN114331396A
CN114331396A CN202111624759.3A CN202111624759A CN114331396A CN 114331396 A CN114331396 A CN 114331396A CN 202111624759 A CN202111624759 A CN 202111624759A CN 114331396 A CN114331396 A CN 114331396A
Authority
CN
China
Prior art keywords
ethernet
contract
intelligent contract
type
intelligent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111624759.3A
Other languages
Chinese (zh)
Inventor
汪万森
黄文超
熊焰
熊峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Science and Technology of China USTC
Original Assignee
University of Science and Technology of China USTC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Science and Technology of China USTC filed Critical University of Science and Technology of China USTC
Priority to CN202111624759.3A priority Critical patent/CN114331396A/en
Publication of CN114331396A publication Critical patent/CN114331396A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses an automatic protocol security attribute extraction method and system for an Ethernet intelligent contract, which realize contract classification based on functions and/or global variable types used in source codes, are an intelligent contract classification scheme based on digital currency types, have clear division standards, can cover most Ethernet intelligent contracts, and have common points in intelligent contracts under the same classification, thereby being convenient for extracting general security attributes; meanwhile, general security attributes can be extracted for different types of contracts, manual participation is not needed, the safety attributes can be summarized according to the characteristics of the intelligent contracts, and the safety analysis method can be applied to automatic intelligent contract safety analysis, so that the analysis is more efficient. Meanwhile, the security attributes can be used for detecting vulnerabilities such as transaction sequence dependence and the like, and are not limited to bottom-layer vulnerabilities such as overflow and the like.

Description

Automatic protocol security attribute extraction method and system for Ether house intelligent contract
Technical Field
The invention relates to the technical field of Taifang intelligent contract security analysis, in particular to a method and a system for automatically extracting protocol security attributes of an Etheng intelligent contract.
Background
EtherFang is one of the most popular blockchain platforms at present. An ether house intelligent contract is a piece of program code that exists on an ether house chain and can be triggered to execute. The intelligent contract has the characteristics of traceability, non-tamper property and the like, and therefore, the intelligent contract can be used as a transaction agreement between different accounts on an Ethernet platform.
In the process of formalized verification of the intelligent contract, firstly, the use scene and the use of the intelligent contract are presumed according to the source code of the intelligent contract, so that what security attribute the intelligent contract should meet is determined, and then whether the intelligent contract meets the corresponding security attribute is verified through security analysis, so that the security of the intelligent contract is ensured.
The existing Ether house intelligent contract formal verification field mainly has two security attribute extraction technologies:
1) the private security attributes are extracted manually. This class of techniques relies on human experience to summarize the security attributes that the contract should satisfy for a particular intelligent contract. For example, document 1: stephens, k. ferles, b. mariano, s. lahiri, and i. delling, "Smartpulse: Automated packaging of temporal properties in smart containers," in 42nd IEEE Symposium on Security and Privacy, IEEE, May 2021; document 2: permenev, D.Dimitrov, P.Tsankov, D.Drachsler-Cohen, and M.T.Vechev, "Verx: Safety verification of smart contracts," in 2020IEEE Symposium on Security and Privacy, SP 2020, San Francisco, CA, USA, May 18-21,2020, pp.1661-1677, IEEE, 2020.
However, the above solution has problems: manual participation is required and cannot be used for automatic formal verification of intelligent contracts.
2) Invariants are automatically generated. The technology generates the invariance attribute which the intelligent contract should meet through a cyclic process of generating invariants, verifying the invariants, feeding back and generating new invariants according to the source codes of the intelligent contract. For example, the literature: s.so, M.Lee, J.park, H.Lee, and H.Oh, "VERISMART A high ply safety for ether sodium copolymers," in 2020IEEE Symposium on Security and Privacy, SP 2020, San Francisco, CA, USA, May 18-21,2020, pp.1678-1694, IEEE, 2020.
However, the above solution has problems: the automatically generated invariants can only be used for verifying bottom-layer vulnerabilities such as overflow and the like, and are only suitable for specific intelligent contracts and have no universality.
Disclosure of Invention
The invention aims to provide an automatic protocol security attribute extraction method and system for an Ethernet intelligent contract, which can automatically extract security attributes which the Ethernet intelligent contract should meet, can be used for detecting vulnerabilities such as transaction sequence dependence and the like, and is not limited to bottom vulnerabilities such as overflow and the like.
The purpose of the invention is realized by the following technical scheme:
a protocol security attribute automatic extraction method for an Ether house intelligent contract comprises the following steps:
determining the type of the intelligent Ethernet house contract according to the type of a function and/or a global variable used in a source code of the intelligent Ethernet house contract;
and extracting the safety attribute of the set type according to the type of the intelligent contract of the Ethernet.
Further, the determining the type of the ethernet intelligent contract according to the function and the global variable type used in the source code of the ethernet intelligent contract includes:
and searching whether the following functions and/or global variables exist in the source code of the Ethernet intelligent contract or not: the first type is variables balances and totalSupply; the second type is the function transfer; the third type is a function buyToken;
if the source codes of the Ether house intelligent contracts comprise the three classes, classifying the Ether house intelligent contracts into exchange contracts;
classifying as a token contract if the source code of the EtherFang Smart contract comprises a first class and a second class;
if the source code of the Etherhouse intelligent contract does not contain the three types, continuously searching whether the Etherhouse intelligent contract uses the Etherhouse official functions transfer, send and call, and if the Etherhouse intelligent contract is used, classifying the Etherhouse intelligent contract into an Etherhouse related contract.
Further, when the type of the intelligent contract of the Ethernet bay is related contracts of the Ethernet currency, the following two types of security attributes are extracted:
the first type is an invariance attribute, and the following invariants are satisfied before and after any transaction:
∑amount(a1)+me(a1)=C1
wherein, the amount (a)1) Indicating that an Ethernet-related contract can be transferred to account a1Number of Ethernet coins, me(a1) Representing account a1The balance of the Ethernet money of A1A set of account addresses representing account variable values or ethernet balances that would be affected by the transaction; c1Is an arbitrary constant value;
the second type is equivalent attribute, which meets the requirement that the balance of the Ethernet money of each account is still the same even if the block numbers or the time stamps of the blocks where the two transactions are located are different after the two transactions with the same parameters are executed.
Further, when the type of the Etherhouse intelligent contract is a token contract, extracting an invariance attribute to satisfy the following invariance before and after any transaction:
∑balances(a2)=totalSupply
wherein, balanaces (a)2) Representing account a2The balance of the stored token, totalpupply represents the total amount of the stored token, A2A set of account addresses representing that token balances will be affected by a transaction.
Further, when the type of the intelligent Ethernet house contract is a converted contract, invariant attributes are extracted, and the following invariants are satisfied before and after any transaction:
γ∑balances(a3)+me(a3)=C2
wherein, balanaces (a)3) Representing account a3Saved token balance, me(a3) Representing account a3The balance of the Ethernet money of A3Set of account addresses indicating that token balance or Ethernet balance is affected by a transaction, C2Is an arbitrary constant value, and γ is the exchange rate of tokens to ethernets.
An automatic extraction system for protocol security attribute of Ethernet intelligent contract, comprising:
the contract classification unit is used for determining the type of the Ethernet intelligent contract according to the function and/or the global variable type used in the source code of the Ethernet intelligent contract;
and the security attribute extraction unit is used for extracting the security attribute of the set type according to the type of the intelligent Ethernet contracts.
The technical scheme provided by the invention can be seen that the contract classification is realized based on the function and/or the global variable type used in the source code, the intelligent contract classification scheme is based on the digital currency type, the classification standard is clear, most of the intelligent contracts of the ether workshops can be covered, the intelligent contracts under the same classification have common points, and the extraction of the general security attribute is convenient; meanwhile, general security attributes can be extracted for different types of contracts, manual participation is not needed, the safety attributes can be summarized according to the characteristics of the intelligent contracts, and the safety analysis method can be applied to automatic intelligent contract safety analysis, so that the analysis is more efficient.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
Fig. 1 is a flowchart of a method for automatically extracting protocol security attributes for an ethernet intelligent contract according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an ethernet intelligent contract source code according to an embodiment of the present invention;
fig. 3 is a schematic diagram of an automatic protocol security attribute extraction system for an ethernet intelligent contract according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a processing apparatus according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
The terms that may be used herein are first described as follows:
the term "and/or" means either or both, e.g., X and/or Y means both "X" or "Y" and "X and Y" are included.
The terms "comprising," "including," "containing," "having," or other similar terms of meaning should be construed as non-exclusive inclusions. For example: including a feature (e.g., material, component, ingredient, carrier, formulation, material, dimension, part, component, mechanism, device, process, procedure, method, reaction condition, processing condition, parameter, algorithm, signal, data, product, or article of manufacture), is to be construed as including not only the particular feature explicitly listed but also other features not explicitly listed as such which are known in the art.
The method for automatically extracting the protocol security attribute for the intelligent Ethernet contract provided by the invention is described in detail below. Details which are not described in detail in the embodiments of the invention belong to the prior art which is known to the person skilled in the art. Those not specifically mentioned in the examples of the present invention were carried out according to the conventional conditions in the art or conditions suggested by the manufacturer.
As shown in fig. 1, a method for automatically extracting protocol security attributes of an ethernet intelligent contract mainly includes the following steps:
step 1, determining the type of the intelligent Ethernet house contract according to the function and/or the global variable type used in the source code of the intelligent Ethernet house contract.
In the embodiment of the invention, the type of the contract is determined mainly according to the digital currency type used by the Ether house intelligent contract, and the preferred implementation mode is as follows:
and searching whether the following functions and/or global variables exist in the source code of the Ethernet intelligent contract or not:
the first type is variables balances and totalSupply; where balance is a mapping (address) type variable that is used to store the token balance of each account. totalSupply is a variable of the agent type that is used to hold the total amount of tokens.
The second type is the function transfer, which is used to transfer tokens between accounts.
The third type is the function buyToken, which is used to receive the ethernet currency for other accounts to exchange tokens for the ethernet currency.
And if the source code of the Etherhouse intelligent contract comprises the three types, classifying the Etherhouse intelligent contract as a converted contract.
Classifying as a token contract if the source code of the EtherFang Smart contract includes a first class and a second class.
If the source code of the Etherhouse intelligent contract does not contain the three types, continuously searching whether the Etherhouse intelligent contract uses the Etherhouse official functions transfer, send and call, and if the Etherhouse intelligent contract is used, classifying the Etherhouse intelligent contract into an Etherhouse related contract.
It will be appreciated by those skilled in the art that the various functions referred to above are conventional in the art, and that the function transfer is an intelligent contract-defined function, named transfer, whose actual function is defined by the contract, and in embodiments of the invention, the function transfer is used to transfer tokens between accounts. The EtherFang official functions transfer, Send and call are functions built in the EtherFang official, which are used to transport EtherFang (EtherFang's official digital currency), and the functions are fixed.
And 2, extracting the safety attribute of a set type according to the type of the intelligent contract of the Etherhouse.
In the embodiment of the invention, corresponding security attributes are extracted according to different contract types, and the preferred implementation mode is as follows:
1) when the type of the intelligent contract of the Ethernet workshop is related contracts of the Ethernet currency, extracting the following two types of security attributes:
the first type is an invariance attribute, and the following invariants are satisfied before and after any transaction:
Figure RE-GDA0003537806670000051
wherein, the amount is a mapping (address ═ mapping)>uint) type variable representing the number of ethernet coins that an ethernet-coin-related contract may be transferred to another account; amount (a)1) Indicating that an Ethernet-related contract can be transferred to account a1Number of Ethernet coins, me(a1) Representing account a1The balance of the Ethernet money of A1A set of account addresses representing account variable values or ethernet balances that would be affected by the transaction; c1Is an arbitrary constant value;
the second type is equivalent attribute, which meets the requirement that the balance of the Ethernet money of each account is still the same even if the block numbers or the time stamps of the blocks where the two transactions are located are different after the two transactions with the same parameters are executed. Similarly, this attribute also requires that when two transactions are executed in sequence, the final ethernet balance for each account is the same regardless of which transaction was executed first.
2) When the type of the Ether house intelligent contract is a token contract, extracting an invariance attribute to satisfy the following invariance before and after any transaction:
Figure RE-GDA0003537806670000052
wherein, balanaces (a)2) Representing account a2The balance of the stored token, totalpupply represents the total amount of the stored token, A2A set of account addresses representing that token balances will be affected by a transaction.
3) When the type of the intelligent Ethernet house contract is a converted contract, invariant attributes are extracted, and the following invariants are satisfied before and after any transaction:
Figure RE-GDA0003537806670000053
wherein, balanaces (a)3) Representing account a3Saved token balance, me(a3) Representing account a3The balance of the Ethernet money of A3Set of account addresses indicating that token balance or Ethernet balance is affected by a transaction, C2Is an arbitrary constant value, and γ is the exchange rate of tokens to ethernets.
The scheme of the embodiment of the invention mainly has the following beneficial effects:
1. the invention provides a classification scheme of the Etheng intelligent contracts based on digital currency types for the first time, the classification standard is clear, most of the Etheng intelligent contracts can be covered, the intelligent contracts under the same classification have common points, and the extraction of general security attributes is convenient.
2. The existing intelligent contract attribute extraction technology at present manually proposes special security attributes for specific intelligent contracts, so that the technology cannot be used for automatic intelligent contract security analysis. The invention provides general security attributes for Ethernet related contracts, token contracts and exchange contracts for the first time, does not need manual participation, can be summarized according to the characteristics of the intelligent contracts, can be applied to automatic intelligent contract security analysis, and enables the analysis to be more efficient. Meanwhile, the security attributes can be used for detecting vulnerabilities such as transaction sequence dependence and the like, and are not limited to bottom-layer vulnerabilities such as overflow and the like.
3. The invention reduces the safety attribute, the reduced attribute requires the safety of the contract execution segment, and compared with the original attribute, the reduced attribute can be verified to obtain the same result with less calculation amount. Taking the invariance attribute as an example, there may be two invariance attributes: 1) the corresponding invariants are constantly established in the intelligent contract execution process; 2) before and after any transaction, the corresponding invariance is established. Since the transaction is an atomic operation in the Etherhouse, the two invariance properties are essentially equivalent. The present invention reduces attribute 1) to the form of attribute 2).
For ease of understanding, a specific example of the EtherFang Intelligent contract is described below.
As shown in fig. 2, for an example of the source code of the intelligent contract of the ethernet, referring to the flow shown in fig. 1, the process mainly includes:
step 1, determining the type of the contract.
Since the contract does not define the variables balanceand totalSupply, the function transfer, the function
buyttoken, and therefore needs to check whether the contract uses the etherhouse official functions transfer, send and call, and the statement in line 15 of fig. 2 uses the function transfer, which is classified as an ethernet-currency related contract.
And 2, extracting the security attribute.
Since the contract is an ethernet-currency related contract, an invariance attribute can be extracted, which requires that the following invariance be established before and after any transaction.
Figure RE-GDA0003537806670000061
Secondly, since the function withdraw in the contract modifies the ethernet balance of the account, an equivalent attribute can be extracted correspondingly, which requires that the final ethernet balance of each account is the same for the transactions calling the function withdraw, no matter which transaction is executed first.
Another embodiment of the present invention further provides an automatic protocol security attribute extraction system for an ethernet intelligent contract, which is mainly used for implementing the method provided in the foregoing embodiment, as shown in fig. 3, the system mainly includes:
the contract classification unit is used for determining the type of the Ethernet intelligent contract according to the function and/or the global variable type used in the source code of the Ethernet intelligent contract;
and the security attribute extraction unit is used for extracting the security attribute of the set type according to the type of the intelligent Ethernet contracts.
It will be clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be performed by different functional modules according to needs, that is, the internal structure of the system is divided into different functional modules to perform all or part of the above described functions.
It should be noted that, the details of the related technologies related to the units in the system are already described in detail in the foregoing embodiment of the method, and therefore, the details are not described again.
Another embodiment of the present invention further provides a processing apparatus, as shown in fig. 4, which mainly includes: one or more processors; a memory for storing one or more programs; wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the methods provided by the foregoing embodiments.
Further, the processing device further comprises at least one input device and at least one output device; in the processing device, a processor, a memory, an input device and an output device are connected through a bus.
In the embodiment of the present invention, the specific types of the memory, the input device, and the output device are not limited; for example:
the input device can be a touch screen, an image acquisition device, a physical button or a mouse and the like;
the output device may be a display terminal;
the Memory may be a Random Access Memory (RAM) or a non-volatile Memory (non-volatile Memory), such as a disk Memory.
Another embodiment of the present invention further provides a readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program implements the method provided by the foregoing embodiment.
The readable storage medium in the embodiment of the present invention may be provided in the foregoing processing device as a computer readable storage medium, for example, as a memory in the processing device. The readable storage medium may be various media that can store program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a magnetic disk, or an optical disk.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (8)

1. A protocol security attribute automatic extraction method for an Ether house intelligent contract is characterized by comprising the following steps:
determining the type of the intelligent Ethernet house contract according to the type of a function and/or a global variable used in a source code of the intelligent Ethernet house contract;
and extracting the safety attribute of the set type according to the type of the intelligent contract of the Ethernet.
2. The method for automatically extracting protocol security attribute oriented to the ethernet house intelligent contract according to claim 1, wherein the determining the type of the ethernet house intelligent contract according to the function and the global variable type used in the source code of the ethernet house intelligent contract comprises:
and searching whether the following functions and/or global variables exist in the source code of the Ethernet intelligent contract or not: the first type is variables balances and totalSupply; the second type is the function transfer; the third type is a function buyToken;
if the source codes of the Ether house intelligent contracts comprise the three classes, classifying the Ether house intelligent contracts into exchange contracts;
classifying as a token contract if the source code of the EtherFang Smart contract comprises a first class and a second class;
if the source code of the Etherhouse intelligent contract does not contain the three types, continuously searching whether the Etherhouse intelligent contract uses the Etherhouse official functions transfer, send and call, and if the Etherhouse intelligent contract is used, classifying the Etherhouse intelligent contract into an Etherhouse related contract.
3. The method for automatically extracting the protocol security attribute of the EtherFang Intelligent contract according to claim 1 or 2,
when the type of the intelligent contract of the Ethernet workshop is related contracts of the Ethernet currency, extracting the following two types of security attributes:
the first type is an invariance attribute, and the following invariants are satisfied before and after any transaction:
Figure FDA0003439375100000011
wherein, the amount (a)1) Indicating that an Ethernet-related contract can be transferred to account a1Number of Ethernet coins, me(a1) Representing account a1The balance of the Ethernet money of A1A set of account addresses representing account variable values or ethernet balances that would be affected by the transaction; c1Is an arbitrary constant value;
the second type is equivalent attribute, which meets the requirement that the balance of the Ethernet money of each account is still the same even if the block numbers or the time stamps of the blocks where the two transactions are located are different after the two transactions with the same parameters are executed.
4. The method for automatically extracting the protocol security attribute of the EtherFang Intelligent contract according to claim 1 or 2,
when the type of the Ether house intelligent contract is a token contract, extracting an invariance attribute to satisfy the following invariance before and after any transaction:
Figure FDA0003439375100000021
wherein, balanaces (a)2) Representing account a2The balance of the stored token, totalpupply represents the total amount of the stored token, A2Indicating remaining tokensThe set of account addresses whose value will be affected by the transaction.
5. The method for automatically extracting the protocol security attribute of the EtherFang Intelligent contract according to claim 1 or 2,
when the type of the intelligent Ethernet house contract is a converted contract, invariant attributes are extracted, and the following invariants are satisfied before and after any transaction:
Figure FDA0003439375100000022
wherein, balanaces (a)3) Representing account a3Saved token balance, me(a3) Representing account a3The balance of the Ethernet money of A3Set of account addresses indicating that token balance or Ethernet balance is affected by a transaction, C2Is an arbitrary constant value, and γ is the exchange rate of tokens to ethernets.
6. An automatic protocol security attribute extraction system for an EtherFang intelligent contract, which is used for implementing the method of any one of claims 1-5, and comprises the following steps:
the contract classification unit is used for determining the type of the Ethernet intelligent contract according to the function and/or the global variable type used in the source code of the Ethernet intelligent contract;
and the security attribute extraction unit is used for extracting the security attribute of the set type according to the type of the intelligent Ethernet contracts.
7. A processing device, comprising: one or more processors; a memory for storing one or more programs;
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-5.
8. A readable storage medium, storing a computer program, characterized in that the computer program, when executed by a processor, implements the method according to any of claims 1-5.
CN202111624759.3A 2021-12-28 2021-12-28 Automatic protocol security attribute extraction method and system for Ether house intelligent contract Pending CN114331396A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111624759.3A CN114331396A (en) 2021-12-28 2021-12-28 Automatic protocol security attribute extraction method and system for Ether house intelligent contract

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111624759.3A CN114331396A (en) 2021-12-28 2021-12-28 Automatic protocol security attribute extraction method and system for Ether house intelligent contract

Publications (1)

Publication Number Publication Date
CN114331396A true CN114331396A (en) 2022-04-12

Family

ID=81015086

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111624759.3A Pending CN114331396A (en) 2021-12-28 2021-12-28 Automatic protocol security attribute extraction method and system for Ether house intelligent contract

Country Status (1)

Country Link
CN (1) CN114331396A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021073A (en) * 2014-05-06 2014-09-03 南京大学 Software vulnerability detection method based on pointer analysis
CN108459860A (en) * 2018-03-28 2018-08-28 成都链安科技有限公司 Block chain intelligence forms of contract chemical examination card code converter and conversion method
CN110298171A (en) * 2019-06-17 2019-10-01 暨南大学 The intelligent measurement and safety protecting method of mobile Internet big data application
CN110782346A (en) * 2019-10-09 2020-02-11 山东科技大学 Intelligent contract classification method based on keyword feature extraction and attention
CN111177730A (en) * 2019-12-19 2020-05-19 河海大学 Method and device for detecting and preventing problems of intelligent contracts of Etheng
CN111552638A (en) * 2020-04-23 2020-08-18 北京奇艺世纪科技有限公司 Code detection method and device
CN112115326A (en) * 2020-08-19 2020-12-22 北京交通大学 Multi-label classification and vulnerability detection method for Ether house intelligent contracts
CN112579463A (en) * 2020-12-25 2021-03-30 北京信息科技大学 Method for predicting defects of intelligent contract for identity
CN113032001A (en) * 2021-03-26 2021-06-25 中山大学 Intelligent contract classification method and device
CN113051624A (en) * 2021-03-19 2021-06-29 南京航空航天大学 Intelligent contract information flow integrity verification method and system based on type detection

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021073A (en) * 2014-05-06 2014-09-03 南京大学 Software vulnerability detection method based on pointer analysis
CN108459860A (en) * 2018-03-28 2018-08-28 成都链安科技有限公司 Block chain intelligence forms of contract chemical examination card code converter and conversion method
CN110298171A (en) * 2019-06-17 2019-10-01 暨南大学 The intelligent measurement and safety protecting method of mobile Internet big data application
CN110782346A (en) * 2019-10-09 2020-02-11 山东科技大学 Intelligent contract classification method based on keyword feature extraction and attention
CN111177730A (en) * 2019-12-19 2020-05-19 河海大学 Method and device for detecting and preventing problems of intelligent contracts of Etheng
CN111552638A (en) * 2020-04-23 2020-08-18 北京奇艺世纪科技有限公司 Code detection method and device
CN112115326A (en) * 2020-08-19 2020-12-22 北京交通大学 Multi-label classification and vulnerability detection method for Ether house intelligent contracts
CN112579463A (en) * 2020-12-25 2021-03-30 北京信息科技大学 Method for predicting defects of intelligent contract for identity
CN113051624A (en) * 2021-03-19 2021-06-29 南京航空航天大学 Intelligent contract information flow integrity verification method and system based on type detection
CN113032001A (en) * 2021-03-26 2021-06-25 中山大学 Intelligent contract classification method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李晓宇: "以太坊代币智能合约形式化验证技术研究", 《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》 *

Similar Documents

Publication Publication Date Title
CN109347787B (en) Identity information identification method and device
CN109087106B (en) Wind control model training and wind control method, device and equipment for recognizing fraudulent use of secondary number-paying account
CN111177005B (en) Service application testing method, device, server and storage medium
CN110826006B (en) Abnormal collection behavior identification method and device based on privacy data protection
CN109086975B (en) Transaction risk identification method and device
KR20190025005A (en) Method and device for controlling data risk
CN107018115B (en) Account processing method and device
CN111353488B (en) Method, device and equipment for identifying risks in code image
CN109918678B (en) Method and device for identifying field meaning
CN111324883B (en) Internet-based E-commerce platform intrusion detection method and computer equipment
CN110827036A (en) Method, device, equipment and storage medium for detecting fraudulent transactions
CN111275071B (en) Prediction model training method, prediction device and electronic equipment
CN103780592A (en) Method and apparatus for determining being stolen of user account
CN107528822A (en) A kind of business performs method and device
CN110443291B (en) Model training method, device and equipment
CN112418864A (en) Data sending method and device
CN114070791A (en) Data flow rate limiting processing method and device
CN114331396A (en) Automatic protocol security attribute extraction method and system for Ether house intelligent contract
CN111582872A (en) Abnormal account detection model training method, abnormal account detection device and abnormal account detection equipment
CN109598478B (en) Wind measurement result description document generation method and device and electronic equipment
CN104639427B (en) A kind of method and device for exporting e-mail messages
CN109299948A (en) A kind of red packet sending method, device, wearable device and storage medium
CN110941719B (en) Data classification method, testing method, device and storage medium
CN110458393B (en) Method and device for determining risk identification scheme and electronic equipment
CN111324732A (en) Model training method, text processing device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination