Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A smart contract intrusion detection method, device, terminal device and storage medium

A technology of smart contracts and intrusion detection, applied in the field of blockchain, can solve the problems of low security of smart contracts, unpredictable attack behavior of smart contracts, and inability to find loopholes in smart contracts, and achieve the effect of improving security.

Active Publication Date: 2022-05-10
GUANGZHOU UNIVERSITY
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the smart contract is automatically executed and cannot be modified once released, it is necessary to audit the smart contract to find vulnerabilities before the smart contract is released. In the existing technology, the source code of the smart contract is detected by the existing smart contract vulnerability detection tool , can detect potential vulnerabilities in smart contracts, but most of the existing detection tools are designed to deal with specific known vulnerabilities, and due to the unpredictability of smart contract attack behavior, only by analyzing the source code, and The loopholes in the actual operation of the smart contract cannot be found, resulting in lower security of the smart contract

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A smart contract intrusion detection method, device, terminal device and storage medium
  • A smart contract intrusion detection method, device, terminal device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0034] Such as figure 1 As shown, it is a schematic flow chart of a method for inoculation provided by an embodiment of the present invention, including:

[0035] Step S101: collect the transaction data during the current blockchain transaction; wherein, the transaction data includes transaction source address information and characteristic instruction sequence call information; the characteristic instruction sequence call information is set by the smart contract t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a smart contract intrusion detection method, device, terminal equipment and storage medium. The method includes: collecting transaction data during the current block chain transaction; wherein, the transaction data includes transaction source address information and characteristic instructions Sequence call information; the characteristic instruction sequence call information is collected by the probe program set in the smart contract to be protected when the smart contract to be protected is running, and the behavior information of the call instruction sequence; the transaction data and the preset The attack feature data is matched; wherein, the attack feature data is stored in the preset smart contract attack database, and the attack feature data includes malicious addresses and attack behavior information; according to the transaction data and the preset attack feature data According to the matching result of the data, it is judged whether there is an intrusion behavior, and if there is, an intrusion detection warning is generated. The security of smart contracts can be improved by implementing the embodiments of the present invention.

Description

technical field [0001] The present invention relates to the technical field of block chains, in particular to a smart contract intrusion detection method, device, terminal equipment and storage medium. Background technique [0002] Blockchain is a distributed ledger technology that uses cryptography to ensure that the data recorded in it is open, transparent, safe and credible. The core feature of blockchain is decentralization and consensus mechanism. It establishes a trust network in a complex network environment through certain algorithms to ensure the security of information exchange between points. From another perspective, blockchain technology is a decentralized and trustless collective maintenance database technology, and its essence is an Internet protocol. As a powerful technology, blockchain provides strong data integrity guarantees in trustless networks. [0003] A smart contract is a code deployed on the blockchain. According to the content of the contract, it...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/10G06F21/56G06F21/57
CPCH04L63/1408H04L63/1416H04L63/1425H04L63/1491H04L63/1441H04L63/1433H04L67/10G06F21/577G06F21/566
Inventor 田志宏杜莎莎苏申曾标林炼升孙彦斌崔翔谭庆丰
Owner GUANGZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products