SG11202008600YA - A method and system for detecting and preventing issues in smart contracts based on historical behavior analysis - Google Patents

A method and system for detecting and preventing issues in smart contracts based on historical behavior analysis

Info

Publication number
SG11202008600YA
SG11202008600YA SG11202008600YA SG11202008600YA SG11202008600YA SG 11202008600Y A SG11202008600Y A SG 11202008600YA SG 11202008600Y A SG11202008600Y A SG 11202008600YA SG 11202008600Y A SG11202008600Y A SG 11202008600YA SG 11202008600Y A SG11202008600Y A SG 11202008600YA
Authority
SG
Singapore
Prior art keywords
detecting
behavior analysis
historical behavior
smart contracts
contracts based
Prior art date
Application number
SG11202008600YA
Inventor
Kfir Nissan
Gilad Eisenberger
Original Assignee
Valid Network Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Valid Network Ltd filed Critical Valid Network Ltd
Publication of SG11202008600YA publication Critical patent/SG11202008600YA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/30Arrangements for executing machine instructions, e.g. instruction decode
    • G06F9/30181Instruction operation extension or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/223Payment schemes or models based on the use of peer-to-peer networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Strategic Management (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Human Resources & Organizations (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Bioethics (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Virology (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
SG11202008600YA 2018-03-18 2019-03-18 A method and system for detecting and preventing issues in smart contracts based on historical behavior analysis SG11202008600YA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201862644521P 2018-03-18 2018-03-18
PCT/IL2019/050296 WO2019180701A1 (en) 2018-03-18 2019-03-18 A method and system for detecting and preventing issues in smart contracts based on historical behavior analysis

Publications (1)

Publication Number Publication Date
SG11202008600YA true SG11202008600YA (en) 2020-10-29

Family

ID=67986912

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202008600YA SG11202008600YA (en) 2018-03-18 2019-03-18 A method and system for detecting and preventing issues in smart contracts based on historical behavior analysis

Country Status (5)

Country Link
US (1) US20210365555A1 (en)
EP (1) EP3769244A4 (en)
IL (1) IL277113A (en)
SG (1) SG11202008600YA (en)
WO (1) WO2019180701A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111124421B (en) * 2019-12-23 2023-04-21 卓尔智联(武汉)研究院有限公司 Abnormal contract data detection method and device for blockchain intelligent contract
CN111782551B (en) * 2020-08-04 2021-07-27 腾讯科技(深圳)有限公司 Test method and device for block chain item and computer equipment
CN114491513B (en) * 2022-01-18 2024-07-16 武汉大学 Knowledge graph-based blockchain intelligent contract reentry attack detection system and method
CN114510723B (en) * 2022-02-18 2024-04-16 北京大学 Intelligent contract authority management vulnerability detection method and device
CN116506231B (en) * 2023-06-28 2023-10-03 广东长盈科技股份有限公司 Network security event tracing and tracking method and system based on block chain
CN116743499B (en) * 2023-08-09 2023-10-27 杭州安碣信息安全科技有限公司 Imitation transaction generation method for intelligent contract attack
CN117834263A (en) * 2023-12-29 2024-04-05 蚂蚁智安安全技术(上海)有限公司 Reentrant attack detection method and device for blockchain contracts

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7900201B1 (en) * 2004-12-21 2011-03-01 Zenprise, Inc. Automated remedying of problems in software application deployments
US8381192B1 (en) * 2007-08-03 2013-02-19 Google Inc. Software testing using taint analysis and execution path alteration
US9336121B2 (en) * 2013-03-15 2016-05-10 International Business Machines Corporation Capture and display of historical run-time execution traces in a code editor
US10503907B2 (en) * 2015-12-14 2019-12-10 Fmr Llc Intelligent threat modeling and visualization
EP3437002A4 (en) * 2016-03-31 2019-08-21 Clause, Inc. System and method for creating and executing data-driven legal contracts
WO2018144302A1 (en) * 2017-01-31 2018-08-09 Rush Thomas Jay Blockchain data-processing engine
US11055703B2 (en) * 2017-06-19 2021-07-06 Hitachi, Ltd. Smart contract lifecycle management

Also Published As

Publication number Publication date
US20210365555A1 (en) 2021-11-25
EP3769244A1 (en) 2021-01-27
WO2019180701A1 (en) 2019-09-26
EP3769244A4 (en) 2021-12-08
IL277113A (en) 2020-10-29

Similar Documents

Publication Publication Date Title
IL277113A (en) A method and system for detecting and preventing issues in smart contracts based on historical behavior analysis
GB201817495D0 (en) A force sensing system and method
IL262308A (en) A method and system for hvac malfunction and inefficiency detection over smart meters data
IL261627B (en) A method and system for optimizing and predicting demand response
SG11201801375UA (en) Systems and methods for determining information related to a current order based on historical orders
GB201816898D0 (en) Systems and methods for thermal monitoring in a retail facility
NO20181658A1 (en) Automated storage and retrieval system, a storage facility and a method thereof
IL262948A (en) A system and method for identifying diagnosis-enabling data
IL273962A (en) Device, method and system for detecting parking in a no parking area
EP3578993A4 (en) Accuracy management method, accuracy management system, management device, analysis device, and method for determining abnormality in accuracy management
IL255249A0 (en) Method and system for detecting a person in an image based on location in the image
IL251967A0 (en) A system and method for clustering wi-fi fingerprints for indoor-outdoor detection
ZA202101066B (en) A method and system for cosmetic recommendations
EP3559859A4 (en) System and method for controlling a signal in a fingerprint sensing device
SG10201601838TA (en) Method and system for visitor tracking at a pos area
GB202104170D0 (en) System and method for providing recommendations based on consumer location
EP3891464C0 (en) Measurement system and method for measuring a measurement object, in particular a plastic profile
ZA201903889B (en) System and method for determining a plant status
GB202006276D0 (en) System and method for identigying transition points in a retail facility
KR102341042B9 (en) A method and system for monitoring a movable asset using a monitoring device
ZA201805911B (en) A life insurance payment calculation system and method
GB2571095B (en) A method and system for determining an oil change interval
GB201803313D0 (en) RFID device, system and method
GB201818233D0 (en) Methods and systems for monitoring a facility
GB201610753D0 (en) A system for automated code calculation and an automated code calculation method