首页 | 本学科首页   官方微博 | 高级检索  
     

以太坊Solidity智能合约漏洞检测方法综述
引用本文:张潆藜,马佳利,刘子昂,刘新,周睿.以太坊Solidity智能合约漏洞检测方法综述[J].计算机科学,2022,49(3):52-61.
作者姓名:张潆藜  马佳利  刘子昂  刘新  周睿
作者单位:兰州大学信息科学与工程学院 兰州 730000
基金项目:教育部-中国移动科研基金;兰州大学中央高校基本科研业务费专项;国家自然科学基金;国家重点研发计划;青海省科技计划;甘肃省科技重大专项创新联合体项目
摘    要:以太坊Solidity智能合约基于区块链技术,作为一种旨在以信息化方式传播、验证或执行的计算机协议,为各类分布式应用服务提供了基础.虽然落地还不足6年,但因其安全漏洞事件频繁爆发,且造成了巨大的经济损失,使得其安全性检查方面的研究备受关注.首先基于以太坊相关技术对智能合约的一些特殊机制和运行原理进行介绍,并根据智能合约...

关 键 词:智能合约  区块链  安全漏洞  漏洞检测工具  机器学习

Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts
ZHANG Ying-li,MA Jia-li,LIU Zi-ang,LIU Xin,ZHOU Rui.Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts[J].Computer Science,2022,49(3):52-61.
Authors:ZHANG Ying-li  MA Jia-li  LIU Zi-ang  LIU Xin  ZHOU Rui
Affiliation:(School of Information Science&Engineering,Lanzhou University,Lanzhou 730000,China)
Abstract:Based on blockchain technology,Ethereum Solidity smart contract as a computer protocol is designed to spread,verify,or execute contracts in an informative way,and it provides a foundation for various distributed application services.Although implemented for less than six years,its security problems have frequently broken out and caused substantial financial losses,which attracts more attention in the security inspection research.This paper firstly introduces some specific mechanisms and operating principles of smart contracts based on Ethereum related techniques,and analyzes some smart contract vulnerabilities occurring frequently and deriving from the characteristics of smart contracts.Then,this paper explains the traditional mainstream smart contract vulnerability detecting tools in terms of symbolic execution,fuzzing,formal verification,and taint analysis.In addition,in order to cope with the endless new vulnerabilities and the need to improve the efficiency of detection,vulnerabilities detection based on machine learning in recent years is classified and summarized according to the various ways of problem transformation in three perspectives including text processing,non-Euclidean graph and standard image.Finally,this paper proposes to formulate more extensive and accurate standardized information database and measurement indicators towards the insufficiency of the detection methods in two directions.
Keywords:Smart contracts  Blockchain  Security vulnerability  Vulnerability detection tools  Machine learning
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号