Chinese Journal of Network and Information Security ›› 2022, Vol. 8 ›› Issue (5): 111-120.doi: 10.11959/j.issn.2096-109x.2022046
• Papers • Previous Articles Next Articles
Dan LIN1, Kaixin LIN2, Jiajing WU2, Zibin ZHENG1
Revised:
2022-09-01
Online:
2022-10-15
Published:
2022-10-01
Supported by:
CLC Number:
Dan LIN, Kaixin LIN, Jiajing WU, Zibin ZHENG. Bytecode-based approach for Ethereum smart contract classification[J]. Chinese Journal of Network and Information Security, 2022, 8(5): 111-120.
"
操作码值 | 描述 | 举例 |
0x00~0x0B | 停止和算术操作 | STOP,ADD,SUB,DIV |
0x10~0x1A | 比较和按位逻辑操作 | LT,GT,EQ,ISZERO |
0x20 | 加密操作 | SHA3 |
0x30~0x3E | 环境信息 | ADDRESS,CALLER |
0x40~0x45 | 块信息 | BLOCKHASH,COINBASE |
0x50~0x5B | 堆栈、内存、存储和流操作 | POP,JUMP,JUMPI,JUMPDEST |
0x60~0x7F | Push 操作 | PUSH1~PUSH32 |
0x80~0x8F | 复制操作 | DUP1~DUP16 |
0x90~0x9F | 交换操作 | SWAP1~SWAP16 |
0xA0~0xA4 | 日志操作 | LOG0-LOG4 |
0xF0~0xFF | 系统操作 | CALL,RETURN |
"
智能合约地址 | 创建者地址 | 运行字节码 |
0xc66ea802717b | 0x12bcc9daff | 0x606060405236156100c1576 |
fb9833400264dd | da452b6c4b0 | 000357c010000000000000000 |
12c2bceaa34a6d | a1571360925 | 0000000000000000000000000 |
a64fcc79 | 0000000000000009004806309 | |
5ea7b3146100c357806318160d | ||
dd146100f857806323b872dd14 | ||
61011b57806323de6651146101 | ||
595780633018205f1461018357 | ||
80635687f2b8… |
[1] | 沈鑫, 裴庆祺, 刘雪峰 . 区块链技术综述[J]. 网络与信息安全学报, 2016,2(11): 11-20. |
SHEN X , PEI Q Q , LIU X F . Survey of block chain[J]. Chinese Journal of Network and Information Security, 2016,2(11): 11-20. | |
[2] | 贺海武, 延安, 陈泽华 . 基于区块链的智能合约技术与应用综述[J]. 计算机研究与发展, 2018,55(11): 2452-2466. |
HE H W , YAN A , CHEN Z H . Survey of smart contract technology and application based on blockchain[J]. Journal of Computer Research and Development, 2018,55(11): 2452-2466. | |
[3] | 付梦琳, 吴礼发, 洪征 ,等. 智能合约安全漏洞挖掘技术研究[J]. 计算机应用, 2019,39(7): 1959-1966. |
FU M L , WU L F , HONG Z ,et al. Research on vulnerability mining technique for smart contracts[J]. Journal of Computer Applications, 2019,39(7): 1959-1966. | |
[4] | 陈伟利, 郑子彬 . 区块链数据分析:现状、趋势与挑战[J]. 计算机研究与发展, 2018,55(9): 1853-1870. |
CHEN W L , ZHENG Z B . Blockchain data analysis:a review of status,trends and challenges[J]. Journal of Computer Research and Development, 2018,55(9): 1853-1870. | |
[5] | NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[R]. 2009. |
[6] | 张亮, 刘百祥, 张如意 ,等. 区块链技术综述[J]. 计算机工程, 2019,45(5): 1-12. |
ZHANG L , LIU B X , ZHANG R Y ,et al. Overview of blockchain technology[J]. Computer Engineering, 2019,45(5): 1-12. | |
[7] | BUTERIN V . A next-generation smart contract and decentralized blockchain platform[EB]. |
[8] | WU J J , YUAN Q , LIN D ,et al. Who are the phishers? phishing scam detection on ethereum via network embedding[J]. IEEE Transactions on Systems,Man,and Cybernetics:Systems, 2022,52(2): 1156-1166. |
[9] | HUANG T , LIN D , WU J J . Ethereum account classification based on graph convolutional network[J]. IEEE Transactions on Circuits and Systems II:Express Briefs, 2022,69(5): 2528-2532. |
[10] | LIN D , WU J J , YUAN Q ,et al. Modeling and understanding ethereum transaction records via a complex network approach[J]. IEEE Transactions on Circuits and Systems II:Express Briefs, 2020,67(11): 2737-2741. |
[11] | 吴嘉婧, 刘洁利, 林丹 ,等. 区块链交易网络研究综述[J]. 中山大学学报(自然科学版), 2021,60(5): 1-12. |
WU J J , LIU J L , LIN D ,et al. Blockchain transaction networks:a survey[J]. Acta Scientiarum Naturalium Universitatis Sunyatseni, 2021,60(5): 1-12. | |
[12] | 黄步添, 刘琦, 何钦铭 ,等. 基于语义嵌入模型与交易信息的智能合约自动分类系统[J]. 自动化学报, 2017,43(9): 1532-1543. |
HUANG B T , LIU Q , HE Q M ,et al. Towards automatic smart-contract codes classification by means of word embedding model and transaction information[J]. Acta Automatica Sinica, 2017,43(9): 1532-1543. | |
[13] | SHI C , XIANG Y , DOSS R ,et al. A bytecode-based approach for smart contract classification[J]. arXiv preprint arXiv:2106.15497, 2021. |
[14] | CHEN W L , ZHENG Z B , CUI J H ,et al. Detecting ponzi schemes on Ethereum:towards healthier blockchain technology[C]// Proceedings of the 2018 World Wide Web Conference. 2018: 1409-1418. |
[15] | HU T , LIU X L , CHEN T ,et al. Transaction-based classification and detection approach for Ethereum smart contract[J]. Information Processing & Management, 2021,58(2): 102462. |
[16] | ZHENG P L , ZHENG Z B , WU J J ,et al. XBlock-ETH:extracting and exploring blockchain data from Ethereum[J]. IEEE Open Journal of the Computer Society, 2020,1: 95-106. |
[17] | CONTRO F , CROSARA M , CECCATO M ,et al. EtherSolve:computing an accurate control-flow graph from Ethereum bytecode[C]// Proceedings of 2021 IEEE/ACM 29th International Conference on Program Comprehension (ICPC). 2021: 127-137. |
[18] | NARAYANAN A , CHANDRAMOHAN M , VENKATESAN R ,et al. Graph2vec:learning distributed representations of graphs[J]. arXiv preprint arXiv:1707.05005, 2017. |
[19] | LAU J H , BALDWIN T . An empirical evaluation of doc2vec with practical insights into document embedding generation[J]. arXiv preprint arXiv:1607.05368, 2016. |
[20] | SHERVASHIDZE N , SCHWEITZER P , VAN LEEUWEN E J ,et al. Weisfeiler-Lehman graph kernels[J]. Journal of Machine Learning Research, 2011,12(9). |
[21] | CHEN T , HE T , BENESTY M ,et al. XGBoost:extreme gradient boosting[J]. R Package Version 0.4-2, 2015,1(4): 1-4. |
[22] | SAFAVIAN S R , LANDGREBE D . A survey of decision tree classifier methodology[J]. IEEE Transactions on Systems,Man,and Cybernetics, 1991,21(3): 660-674. |
[23] | BELGIU M , DR?GU? L , . Random forest in remote sensing:a review of applications and future directions[J]. ISPRS Journal of Photogrammetry and Remote Sensing, 2016,114: 24-31. |
[24] | RISH I , . An empirical study of the naive bayes classifier[C]// IJCAI 2001 Workshop on Empirical Methods in Artificial Intelligence. 2001: 41-46. |
[25] | SCHULDT C , LAPTEV I , CAPUTO B . Recognizing human actions:a local SVM approach[C]// Proceedings of the 17th International Conference on Pattern Recognition. 2004: 32-36. |
[26] | RAO H D , SHI X Z , RODRIGUE A K ,et al. Feature selection based on artificial bee colony and gradient boosting decision tree[J]. Applied Soft Computing, 2019,74: 634-642. |
[1] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[2] | Heli WANG, Qiao YAN. Selfish mining detection scheme based on the characters of transactions [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 104-114. |
[3] | Beiyuan YU, Shanyao REN, Jianwei LIU. Overview of blockchain assets theft attacks and defense technology [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 1-17. |
[4] | Long DAI, Jing ZHANG, Xuefeng FAN, Xiaoyi ZHOU. NLP neural network copyright protection based on black box watermark [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 140-149. |
[5] | Fei TANG, Ning GAN, Xianggui YANG, Jinyang WANG. Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 9-19. |
[6] | Liquan CHEN, Xiao LI, Zheyi YANG, Sijie QIAN. Blockchain-based high transparent PKI authentication protocol [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 1-11. |
[7] | Wenbo ZHANG, Simin CHEN, Lifei WEI, Wei SONG, Dongmei HUANG. State-of-the-art survey of smart contract verification based on formal methods [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 12-28. |
[8] | Feng LIU, Jie YANG, Jiayin QI. Survey on blockchain privacy protection techniques in cryptography [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44. |
[9] | Xiaoling SONG, Yong LIU, Jingnan DONG, Yongfei HUANG. Application and prospect of blockchain in Metaverse [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 45-65. |
[10] | Lin JIN, Youliang TIAN. Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 66-76. |
[11] | Pengkun JIANG, Wenyin ZHANG, Jiuru WANG, Shanyun HUANG, Wanshui SONG. Blockchain covert communication scheme based on the cover of normal transactions [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 77-86. |
[12] | Jianlin NIU, Zhiyu REN, Xuehui DU. Cross-domain authentication scheme based on consortium blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 123-133. |
[13] | Baoqin ZHAI, Jian WANG, Lei HAN, Jiqiang LIU, Jiahao HE, Tianhao LIU. Hierarchical proxy consensus optimization for IoV based on blockchain and trust value [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 142-153. |
[14] | Yu ZHANG, Binglong LI, Xuejuan LI, Heyu ZHANG. Evidence classification method of chat text based on DSR and BGRU model [J]. Chinese Journal of Network and Information Security, 2022, 8(2): 150-159. |
[15] | Zhongyuan QIN, Zhaoxiang HE, Tao LI, Liquan CHEN. Adversarial example defense algorithm for MNIST based on image reconstruction [J]. Chinese Journal of Network and Information Security, 2022, 8(1): 86-94. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|