Smart Contract Security through AI
52 patents in this list
Updated:
Smart contract vulnerabilities have led to losses exceeding $2 billion since 2020, with reentrancy attacks and arithmetic overflow errors being primary vectors. Traditional static analysis tools catch only 45% of these vulnerabilities, while runtime monitoring faces latency constraints when processing blockchain transactions that average 15 transactions per second.
The fundamental challenge lies in developing analysis systems that can detect vulnerabilities and anomalous behavior in real-time without introducing prohibitive computational overhead to the blockchain network.
This page brings together solutions from recent research—including AI-powered anomaly detection systems, machine learning models for transaction risk scoring, automated policy evolution frameworks, and distributed security monitoring architectures. These and other approaches focus on practical implementation strategies that balance security coverage with computational efficiency in production blockchain environments.
1. System for Auditing Smart Contracts with Multi-Analyzer Vulnerability Detection and Explainable Scoring
Qatar Foundation for Education, Science and Community Development, 2024
Efficient and effective system for auditing smart contracts to determine vulnerabilities. The system extracts raw smart contract data from blockchains, analyzes it using multiple security analyzers, aggregates the findings, and generates a smart contract security report with an explainable score. This allows automated auditing with explainability, integrating into development workflows to catch vulnerabilities early.
2. Distributed Register System with Machine Learning-Based Transaction Analysis and Dispute Resolution
BANK OF AMERICA CORPORATION, 2024
Securely storing and analyzing transaction data using a distributed register and machine learning for dispute resolution. The system allows secure, immutable storage of resource transactions using a distributed register. Disputes can be initiated by users, analyzed using machine learning, and resolutions determined based on historical data. The distributed register prevents unauthorized data manipulation. Users can access verified data via multiple channels.
3. Automated Legal Document Analysis System with Machine Learning-Based Term Classification and Change Monitoring
CITIZN COMPANY, 2024
Automated system for reviewing contracts and other legal documents to identify potential issues and provide qualitative analysis of document terms. The system uses machine learning to analyze source documents and provide feedback on term favorability, monitor changes over time, and certify compliance. It takes a source document, classifies it based on document type and industry, and uses AI to analyze the terms. This allows rapid, substantive analysis of document provisions without extensive legal expertise. The system can also monitor documents over time to identify changes and generate alerts for significant ones.
4. Method for Determining Blockchain Smart Contract Trigger Events via Knowledge Database Querying
GOOGLE LLC, 2024
Determining trigger events for blockchain smart contracts using a search engine and knowledge database. The method involves obtaining smart contract data from the blockchain, processing it to determine the trigger event, generating a query based on the event, recursively searching the knowledge database with the query, and determining if the event has occurred based on the search results. This allows leveraging authoritative sources like search engines to determine blockchain smart contract triggers instead of relying solely on blockchain data.
5. Blockchain Transaction Anomaly Detection via Graph-Based Neural Network Analysis
U.S. Bank, 2024
Detecting anomalies in blockchain transactions using artificial intelligence to identify fraud and other invalid transactions. The method involves extracting graph parameters from block transaction graphs, generating statistical approximations, comparing against thresholds, detecting irregular patterns, identifying anomalies, generating address graphs, and alerting when anomalies are found. A neural network trained to analyze graphs for irregular patterns based on statistical approximations detects anomalies in block transactions over time.
6. Blockchain Anomaly Detection System with AI-Based Real-Time Block Parameter Analysis
U.S. Bank, 2024
Real-time identification of anomalies in blockchain using artificial intelligence to detect fraud and invalid transactions. The system extracts block parameters and generates statistical approximations. It compares these approximations to thresholds and detects irregular patterns indicating anomalies. The AI model identifies anomalies within the block and generates alerts when anomalies are found. This allows real-time detection and prevention of fraudulent transactions in blockchains.
7. Computer System for Transaction Evaluation Using Machine Learning with Periodic Model Retraining
PayPal, Inc., 2024
Evaluating transaction requests received by a computer system using a machine learning algorithm to improve accuracy in granting versus declining transactions. The computer system trains a machine learning model using historical transaction requests. When a new request comes in, the model scores it and compares to a threshold. If above, the request is granted, if below, declined. This improves accuracy compared to just using a fixed threshold as the model learns from prior requests. However, wrongly rejecting or granting transactions can degrade performance. To mitigate this, the model is retrained periodically using a subset of recent requests to adapt to changing conditions. This allows updating the model without having to retrain from scratch.
8. Smart Contract Vulnerability Detection via Contract Calling Network and Developer Characteristic Analysis
杭州趣链科技有限公司, HANGZHOU QULIAN TECHNOLOGY CO LTD, 2024
Smart contract vulnerability detection method that can detect potential issues in smart contracts before they are deployed to the blockchain to prevent losses from loopholes. The method involves constructing a smart contract calling network based on the relationships between contracts, and using that network to predict vulnerabilities. Developer characteristics are also considered as a supplement. The network is modeled from the mutual calling relationships between contracts, and the aggregated feature vector is used for semi-supervised node classification tasks. This allows detection without needing source code, and can be done before deployment.
9. Blockchain Operation Security System Utilizing AI-Driven Real-Time Analysis of Labeled Data
Coinbase, Inc., 2024
System for providing real-time security actions for blockchain operations based on AI models trained on labeled blockchain data. The system receives blockchain data, identifies operations, generates feature inputs based on blockchain characteristics, processes through AI models trained on labeled data, determines security actions, and alerts users of potential risks before execution. The labeled data is from sources and previously processed blocks. This allows customized risk assessment and prevention for new operations.
10. Blockchain-Based Smart Contract Security Detection System with Code Analysis and Transaction Pattern Recognition
广东时汇信息科技有限公司, GUANGDONG SHIHUI INFORMATION TECHNOLOGY CO LTD, 2024
Smart contract security detection system using blockchain to identify and mitigate security risks in smart contracts. It analyzes code, transaction records, and access control to comprehensively detect security issues. The system uses techniques like threshold analysis, abnormal pattern detection, and data correlation to analyze transaction patterns, amounts, and frequencies. It also identifies logical errors and data privacy issues. The system integrates the analysis results and generates repair suggestions to help mitigate identified risks.
11. Smart Contract Monitoring Framework with Formal Verification-Integrated Transaction and Code Analysis
GUANGDONG QILIAN TECH CO LTD, GUANGDONG QILIAN TECHNOLOGY CO LTD, 2024
Smart contract runtime status monitoring using formal verification to improve the reliability and completeness of monitoring compared to existing methods. The technique combines transaction analysis and code analysis, leveraging formal verification to detect abnormal states in smart contracts. It provides a framework for monitoring smart contract runtime security using formal modeling of transactions and code verification. This reduces developer workload compared to traditional formal verification while improving coverage and completeness compared to transaction and code analysis alone.
12. Blockchain Smart Contract Security Threat Detection System with Anomaly-Based Transaction Risk Scoring
Ancilia, Inc., 2023
Automatic detection of security threats in blockchain smart contracts using machine learning and anomaly detection to identify abnormal transactions and alert blockchain users. The system monitors transactions on a blockchain, generates risk scores for each transaction based on expected behavior learned from smart contract analysis, and sends alerts if scores fall below thresholds. It uses techniques like signature matching, heuristics, and machine learning models to detect malicious transactions.
13. Smart Contract Vulnerability Detection Tool Utilizing Fine-Tuned GPT Model for Automated Code Analysis
BEIJING TENGRUIYUN CULTURE TECH CO LTD, BEIJING TENGRUIYUN CULTURE TECHNOLOGY CO LTD, 2023
Large model-based smart contract vulnerability detection tool using a fine-tuned GPT model to automatically analyze smart contract code for security issues. The tool trains a GPT language model on open source smart contracts with known vulnerabilities to give it the ability to understand and process smart contract source code. It then uses this trained model to scan new contracts and identify potential vulnerabilities and security risks. The tool generates an evaluation report with detected vulnerabilities, weaknesses, and repair suggestions.
14. Smart Contract Vulnerability Detection via Graph Neural Network and Reinforcement Learning-Based Subgraph Extraction
UESTC, 2023
An interpretable smart contract vulnerability detection and location method using reinforcement learning. The method involves generating a contract graph from the smart contract source code, using a graph neural network to classify contract vulnerabilities, and extracting the subgraphs with the greatest impact on the classification results using reinforcement learning. This allows multi-class vulnerability detection and locating specific code fragments with vulnerabilities, providing interpretable risk positioning results for smart contract vulnerability detection.
15. Hypergraph-Based Smart Contract Vulnerability Detection via Representation Learning
NUOWEI AICHUANG GUANGZHOU TECH CO LTD, NUOWEI AICHUANG TECHNOLOGY CO LTD, SOUTH CHINA AGRICULTURAL UNIVERSITY, 2023
Blockchain smart contract vulnerability detection using hypergraph representation learning. The method involves preprocessing smart contract code, generating a hypergraph representation of the code with nodes representing code elements and edges representing relations between them, extracting features from the hypergraph, learning a classification model on the hypergraph features to detect smart contract vulnerabilities, and finally applying the trained model to new smart contracts for vulnerability detection.
16. Smart Contract Vulnerability Detection in Drone Clusters Using Hybrid Neural Network with Attention Mechanism
ARMY ENGINEERING UNIV OF CHINA PEOPLES LIBERATION ARMY, ARMY ENGINEERING UNIVERSITY OF CHINA PEOPLES LIBERATION ARMY, 2023
Smart contract application method for drone clusters that aims to improve drone cluster security by using smart contracts on a blockchain. The method involves detecting potential smart contract vulnerabilities in drone cluster applications like flight data management, collaboration, safety, and certification. It proposes a hybrid neural network model based on attention mechanism to detect small sample smart contract vulnerabilities. This addresses the issue of training deep learning models relying on large datasets when obtaining drone attack samples is difficult. The model is designed to analyze the high-level language, blockchain, and virtual machine levels of smart contracts for vulnerabilities like integer overflow, reentrancy, timing dependency, sequence dependency, and authorization.
17. Blockchain Smart Contract with Dynamic Endorsement Policy Adaptation Based on Fraud Pattern Analysis
International Business Machines Corporation, 2023
Automatically evolving smart contract endorsement policies in blockchain to adapt and mitigate fraud. The method involves computing historical patterns of fraud attempts from transaction logs, predicting future fraud, correlating historical and predicted fraud, modifying endorsement policies based on correlations, and adding the modified policies to the smart contract. This allows the smart contract to dynamically evolve and adapt its endorsement rules over time based on detected fraud patterns.
18. Smart Contract Vulnerability Detection and Remediation System with Machine Learning and Virtual Sandbox Integration
Chitkara University, Bluest Mettle Solutions Private Limited, 2023
Dynamic vulnerability detection and remediation for smart contracts on blockchain networks using machine learning and virtual sandboxes to proactively identify, analyze, and mitigate potential vulnerabilities in smart contracts. The system leverages machine learning to analyze source code, bytecode, and historical vulnerability data to detect both known and unknown vulnerabilities. Virtual sandboxes provide secure testing environments for controlled execution of smart contracts while monitoring interactions for anomaly detection. Comprehensive reports and automated remediation recommendations empower stakeholders to address security risks.
19. Machine Learning Model for Reentrancy Attack Detection in Smart Contract Source Code
JIANGSU PAYEGIS TECH CO LTD, JIANGSU PAYEGIS TECHNOLOGY CO LTD, JIANGSU TONGFUDUN INFORMATION SECURITY TECH CO LTD, 2023
Detecting smart contract reentrancy attacks using machine learning to identify potential vulnerabilities in smart contracts that could lead to asset loss due to recursive function calls. The method involves training a reentrancy attack identification model using code snippets and function calls that represent reentrancy attack patterns in smart contract source code. This allows the model to detect similar code segments in new smart contracts to flag potential reentrancy vulnerabilities.
20. Decentralized Ecosystem for Contracting and Execution in Zero-Trust Computing Capsules with Multi-Party Trust Domain Federation
Hewlett Packard Enterprise Development LP, 2023
Decentralized ecosystem for contracting, execution, and policy enforcement in secure zero-trust computing capsules for multi-party environments. The ecosystem allows different entities from different trust domains to accelerate agreement on collaboration terms in many-to-many relationships between participants. It provides a way for participating entities to contract and execute agreements in a decentralized, confidential, and trustless manner. The contracts are executed within the ecosystem using smart contracts, where terms, resources, legislation, and privacy regulations are federated and orchestrated across trust domains. The ecosystem supports features like dispute resolution, resource federation, privacy compliance, and trust domain federation.
Request the full report with complete details of these
+32 patents for offline reading.