Survey of Research on Smart Contract Vulnerability Detection

As an important part of blockchain technology, smart contracts are widely used in various fields through decentralized applications written by smart contracts, providing important technical support for the development and application of blockchain. However, the development has brought security probl...

Full description

Saved in:
Bibliographic Details
Published inJisuanji kexue yu tansuo Vol. 16; no. 11; pp. 2456 - 2470
Main Author LI Leixiao, ZHENG Yue, GAO Haoyu, XIONG Xiao, NIU Tieming, DU Jinze, GAO Jing
Format Journal Article
LanguageChinese
Published Journal of Computer Engineering and Applications Beijing Co., Ltd., Science Press 01.11.2022
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:As an important part of blockchain technology, smart contracts are widely used in various fields through decentralized applications written by smart contracts, providing important technical support for the development and application of blockchain. However, the development has brought security problems at the same time, and a large number of vulnerability attacks against smart contracts have made researchers pay more attention to the security vulnerabilities of smart contracts. How to quickly and accurately perform vulnerability detection has become an urgent problem to be solved. Firstly, through the analysis of common vulnerabilities such as reentrancy attack vulnerabilities, integer overflow and access control vulnerabilities, researchers can fully understand the common vulnerabilities. Secondly, by investigating the current status of vulnerability detection methods such as formal verification, symbolic execution, machine learning and their corresponding tools at home and abroad, analyzing and discussing t
ISSN:1673-9418
DOI:10.3778/j.issn.1673-9418.2203024