Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A smart contract security vulnerability detection method, device, terminal and storage medium

A smart contract and vulnerability detection technology, applied in computer security devices, image analysis, instruments, etc., can solve problems such as being vulnerable to hacker attacks, and achieve the effect of improving accuracy, improving precision, and avoiding sequence errors.

Active Publication Date: 2021-09-28
BEIJING KINGSOFT INTERNET SECURITY SOFTWARE CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When smart contracts have security vulnerabilities, they are vulnerable to hackers, such as the largest The DAO incident

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A smart contract security vulnerability detection method, device, terminal and storage medium
  • A smart contract security vulnerability detection method, device, terminal and storage medium
  • A smart contract security vulnerability detection method, device, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention.

[0046] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0047] It should also be understood that the terminology used in the description of the present invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the present invention. As used in this specification and the appended claims, the singular forms "a", "an" and "the" are intended to include plural referents unless the context clearly dictates otherwise.

[0048] It sh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a smart contract security vulnerability detection method, device, terminal and storage medium, wherein the method includes: constructing a grayscale image matrix according to a bytecode file; transforming the grayscale image matrix into a grayscale image; extracting grayscale The features of the grayscale image are input into the preset security vulnerability identification model to detect whether there are security vulnerabilities in the bytecode file. By implementing the application, the security loopholes existing in the smart contract can be detected, and at the same time, the detection accuracy of detecting the security loopholes can be improved.

Description

technical field [0001] The present invention relates to the technical field of computer security, in particular to a method, device, terminal and storage medium for detecting security loopholes in smart contracts. Background technique [0002] Blockchain technology, also known as distributed ledger technology, is a technical solution for decentralized trust and collective maintenance of distributed ledgers. In essence, multiple nodes collectively participate in data storage and multi-party computing. A distributed data system that cannot be tampered with and whose calculation results are credible. Blockchain is not a single technology, but the result of the integration of multiple technologies. Using blockchain technology to maintain a reliable and difficult-to-tamper ledger record can reduce the risk of trust and effectively reduce the risk of public participation. Collaboration maintenance costs. The continuous development and improvement of blockchain technology makes s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06T7/45G06K9/46G06K9/62
CPCG06F21/577G06T7/45G06V10/40G06F18/00
Inventor 杨文玉
Owner BEIJING KINGSOFT INTERNET SECURITY SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products