期刊文献+

智能合约漏洞检测技术研究综述 被引量:3

Research overview on smart contract vulnerability detection technology
下载PDF
导出
摘要 区块链技术已经进入了以智能合约为标志的区块链2.0时代,频发的智能合约安全问题给区块链生态带来了严重的损失。通过对比不同的智能合约漏洞检测方法与检测工具存在的安全漏洞问题,总结出13种常见漏洞检测项。通过讨论5种主流的智能合约漏洞检测方法与相应的漏洞检测工具,对比总结5种漏洞检测工具针对13种漏洞检测项的检测情况。对比分析3种漏洞检测工具对于200个测试合约的检测结果,得出模糊测试检测方法简单高效并且不会产生误报。最后,针对检测结果展望智能合约漏洞检测技术的未来研究方向,并给出针对现有漏洞检测方法的改进思路,从而利于提高智能合约漏洞检测效率。 Blockchain has entered the blockchain 2.0 era marked by smart contracts.However,frequent security issues of smart contracts cause serious losses to blockchain ecology.By comparing the security vulnerabilities of different smart contract vulnerability detection methods and detection tools,thirteen vulnerability detection items are summarised.By discussing the mainstream of smart contract vulnerability detection method and the corresponding detection tools,detections of 13 vulnerability detection items by 5 vulnerability detection tools are compared and summarized.The detection results of 3 vulnerability detection tools for 200 test contracts is verified and the detection results show that the fuzzing detection method is simple and efficient without producing false positives.Based on the experimental results,the future prospective research and the improvement strategies of existing vulnerability detection methods are proposed to improve the efficiency of smart contract vulnerability detection.
作者 孙家泽 余盼盼 王小银 张斌 SUN Jiaze;YU Panpan;WANG Xiaoyin;ZHANG Bin(School of Computer Science and Technology,Xi'an University of Posts and Telecommunications,Xi'an 710121,China)
出处 《西安邮电大学学报》 2020年第5期1-9,32,共10页 Journal of Xi’an University of Posts and Telecommunications
基金 陕西省重点研发计划项目(2020GY-010) 西安市科技计划项目(2019218114GXRC017CG018-GXYD17.10)。
关键词 区块链安全 智能合约 漏洞检测工具 blockchain security smart contracts vulnerability detection methods
  • 相关文献

参考文献8

二级参考文献63

  • 1岳彩松,李建华,银鹰.基于Fuzz的MS Office漏洞检测[J].信息安全与通信保密,2007,29(9):111-113. 被引量:4
  • 2Chien- nan liu. SOC Verification Methodology, www. cs.ccu. edu. tw/~ pahsiung/courses/soc/notes04 _ Verify.pdf.
  • 3Ali Habibi, Sofiene Tahar. A Survey: System - on - a-Chip Design and Verification, technical report, hvg. ece.concordia. ca/Publications/ECH _ REP/SOC_ TR03/SOC_ TR03. pdf.
  • 4R.E. Bryant. Graph - based algorithms for Boolean function manipulation. IEEE Transactions on Computers,C- 35(8), 1986.
  • 5Modeling, specifying and verifying, www - cad. eecs.berkeley. edu/~ kenmcmil/smv/doc/tutorial/node3.html.
  • 6PCI Special interest Group, PCI Local Bus Specificaton Rev2.2, Dec. 1998.
  • 7Pankaj Chauhan, Edmund M. Clarke, Yuan Lu, Dong Wang, Verifying IP - Core based System _ On _ Chip Design, www. gigascale. org/marcov/SOC. pdf.
  • 8Kanna Shimizu,David L. Dill,Alan J. Hu,Monitor_ Based Formal Specification of PCI, verify. stanford. edu/PAPERS/FMCAD00. pdf.
  • 9王彤彤,韩文报,王航.基于安全需求的软件漏洞分析模型[J].计算机科学,2007,34(9):287-289. 被引量:5
  • 10Brumley D, Poosankam P, et al. Automatic patch-based exploit generation is possible: techniques and implieations[C]// SP' 08: Proceedings of the IEEE Security and Privacy Symposium. NJ: IEEE, 2008:143-157.

共引文献211

同被引文献17

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部