计算机工程与应用 ›› 2025, Vol. 61 ›› Issue (9): 1-24.DOI: 10.3778/j.issn.1002-8331.2409-0433

• 热点与综述 • 上一篇    下一篇

数据交易中智能合约漏洞检测研究综述

李雯洁,李雷孝,刘东江,杜金泽,林浩   

  1. 1.内蒙古工业大学 数据科学与应用学院,呼和浩特 010080
    2.内蒙古自治区北疆网络空间安全重点实验室,呼和浩特 010080
    3.内蒙古自治区基于大数据的软件服务工程技术研究中心,呼和浩特 010080
    4.天津理工大学 计算机科学与工程学院,天津 300384
  • 出版日期:2025-05-01 发布日期:2025-04-30

Research Review on Vulnerability Detection of Smart Contract in Data Transaction

LI Wenjie, LI Leixiao, LIU Dongjiang, DU Jinze, LIN Hao   

  1. 1.College of Data Science and Application, Inner Mongolia University of Technology, Hohhot 010080, China
    2.Key Laboratory of Cyberspace Security in Northern Xinjiang, Inner Mongolia Autonomous Region, Hohhot 010080, China
    3.Inner Mongolia Autonomous Region Software Service Engineering Technology Research Center Based on Big Data, Hohhot 010080, China
    4.College of Computer Science and Engineering, Tianjin University of Technology, Tianjin 300384, China
  • Online:2025-05-01 Published:2025-04-30

摘要: 基于智能合约的数据交易有效克服了传统交易中的中心化、单点故障以及交易不透明等问题,显著提升了交易效率。然而,贯穿交易全程的智能合约由于其核心地位也面临着许多潜在威胁。概述了数据交易流程及合约漏洞现有的检测方法,接着按照数据交易中数据拥有者、数据请求者以及数据交易平台三个实体的交互关系对合约的漏洞重新分类;依据工具的作用,将工具分为智能合约漏洞检测工具和智能合约漏洞修复工具并从语言支持、平台兼容以及工具性能三方面对工具进行了对比分析。最后,总结了目前数据交易中智能合约面临的问题并对未来的研究方向提出展望。

关键词: 数据交易, 智能合约安全, 漏洞检测, 漏洞修复

Abstract: Data transactions based on smart contracts effectively overcome the problems of centralization, single point of failure and transaction opacity in traditional transactions, and significantly improve transaction efficiency. However, smart contracts throughout the transaction process also face a number of potential threats due to their central position. Firstly, this paper outlines the data transaction process and existing detection methods of contract vulnerabilities, and then reclassifies contract vulnerabilities according to the interaction between the three entities of data owner, data requester and data trading platform in data transactions. The tools are divided into smart contract vulnerability detection tools and smart contract vulnerability repair tools, and the tools are compared and analyzed from the aspects of language support, platform compatibility and tool performance. Finally, the paper summarizes the current problems faced by smart contracts in data transactions and puts forward the prospect of future research directions.

Key words: data transaction, smart contract security, vulnerability detection, vulnerability repair