Journal of Computer Applications ›› 2026, Vol. 46 ›› Issue (4): 1182-1190.DOI: 10.11772/j.issn.1001-9081.2025040492
• Cyber security • Previous Articles
Wei SHE1,2, Kong CHENG1,2, Shuhui ZHANG1,2, Jiawei MA1,2, Chenhong QI3, Guangjun ZAI1,2(
)
Received:2025-05-06
Revised:2025-07-15
Accepted:2025-07-17
Online:2026-04-21
Published:2026-04-10
Contact:
Guangjun ZAI
About author:SHE Wei, born in 1977, Ph. D., professor. His research interests include blockchain, information security, intelligent systems.Supported by:
佘维1,2, 程孔1,2, 张淑慧1,2, 马佳伟1,2, 齐晨虹3, 宰光军1,2(
)
通讯作者:
宰光军
作者简介:佘维(1977—),男,湖南常德人,教授,博士,CCF会员,主要研究方向:区块链、信息安全、智能系统基金资助:CLC Number:
Wei SHE, Kong CHENG, Shuhui ZHANG, Jiawei MA, Chenhong QI, Guangjun ZAI. Covert communication model assisted by smart contracts[J]. Journal of Computer Applications, 2026, 46(4): 1182-1190.
佘维, 程孔, 张淑慧, 马佳伟, 齐晨虹, 宰光军. 智能合约辅助下的隐蔽通信模型[J]. 《计算机应用》唯一官方网站, 2026, 46(4): 1182-1190.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2025040492
| 方法 | 类别 | 嵌入载体层次 | 优势 | 劣势 |
|---|---|---|---|---|
| 文献[ | 留痕 | 数据层 | 数据或身份的完整与隐蔽 | 线索挖掘风险、高交易成本 |
| 文献[ | 留痕 | 合约层 | ||
| 文献[ | 无痕 | 网络层 | 零成本、无线索、高安全 | 数据完整性需额外证明;可能破坏区块链网络生态 |
Tab. 1 Advantages and disadvantages of various blockchain covert communications
| 方法 | 类别 | 嵌入载体层次 | 优势 | 劣势 |
|---|---|---|---|---|
| 文献[ | 留痕 | 数据层 | 数据或身份的完整与隐蔽 | 线索挖掘风险、高交易成本 |
| 文献[ | 留痕 | 合约层 | ||
| 文献[ | 无痕 | 网络层 | 零成本、无线索、高安全 | 数据完整性需额外证明;可能破坏区块链网络生态 |
| 符号 | 含义及其描述 |
|---|---|
| 序列;从字节码中提取出的纯粹的操作码 | |
三元组;包含操作码与用来描述操作码的 序列特征的另外两种元素 | |
| 序列;包含三元组中出现的所有操作码 | |
| 对OP_s随机化后的新序列 | |
映射关系序列;其中单个二进制原始消息与 单个三元组一一对应 | |
| 映射关系序列;OP_r中的元素及其首尾位置的映射 | |
密钥,嵌入算法的输出、传输的内容、提取算法的 输入;格式符合本文定义的传输协议格式 |
Tab. 2 Main symbols and their meanings of proposed algorithm
| 符号 | 含义及其描述 |
|---|---|
| 序列;从字节码中提取出的纯粹的操作码 | |
三元组;包含操作码与用来描述操作码的 序列特征的另外两种元素 | |
| 序列;包含三元组中出现的所有操作码 | |
| 对OP_s随机化后的新序列 | |
映射关系序列;其中单个二进制原始消息与 单个三元组一一对应 | |
| 映射关系序列;OP_r中的元素及其首尾位置的映射 | |
密钥,嵌入算法的输出、传输的内容、提取算法的 输入;格式符合本文定义的传输协议格式 |
| 变量名称 | 变量值 |
|---|---|
['PUSH1','PUSH1','PUSH1','DUP3','DUP3','DUP3','CODECOPY','DUP1','MLOAD','BYTE','PUSH1',…, 'PUSH5','STOP','ADDMOD','EQ','STOP','CALLER'] | |
[('PUSH1',3,1),('DUP3',3,1),('CODECOPY',1,1),('DUP1',1,1),('MLOAD',1,1),('BYTE',1,1), ('PUSH1',1,2),…,('PUSH5',1,13),('STOP',1,12),('ADDMOD',1,6),('EQ',1,46),('STOP',1,13)] | |
['SSTORE','SUB','SHA3','SWAP13','BYTE','PUSH26','PUSH18','DUP9','SWAP11','PUSH31',…,'SWAP15', 'PC','PUSH8','PUSH11','LOG4','CODECOPY','EXP','SWAP5','DUP12'] |
Tab. 3 Some preprocessing results
| 变量名称 | 变量值 |
|---|---|
['PUSH1','PUSH1','PUSH1','DUP3','DUP3','DUP3','CODECOPY','DUP1','MLOAD','BYTE','PUSH1',…, 'PUSH5','STOP','ADDMOD','EQ','STOP','CALLER'] | |
[('PUSH1',3,1),('DUP3',3,1),('CODECOPY',1,1),('DUP1',1,1),('MLOAD',1,1),('BYTE',1,1), ('PUSH1',1,2),…,('PUSH5',1,13),('STOP',1,12),('ADDMOD',1,6),('EQ',1,46),('STOP',1,13)] | |
['SSTORE','SUB','SHA3','SWAP13','BYTE','PUSH26','PUSH18','DUP9','SWAP11','PUSH31',…,'SWAP15', 'PC','PUSH8','PUSH11','LOG4','CODECOPY','EXP','SWAP5','DUP12'] |
| 变量名称 | 变量值 |
|---|---|
{('PUSH1',3,1):'0',('DUP3',3,1):'0',('CODECOPY',1,1):'1',('DUP1',1,1):'0',('MLOAD',1,1):'0', ('BYTE',1,1):'0',…,('PUSH3',1,90):'1',('DUP3',1,39):'0',('SLOAD',1,7):'1',('PUSH3',1,91):'1', ('JUMP',1,72):'1',('JUMPDEST',1,90):'0'} | |
{'SSTORE':(0,5),'SUB':(5,17),'BYTE':(17,25),'PUSH26':(25,26),'SWAP11':(26,27),'DUP13':(27,28), 'PUSH32':(28,49),…,'SWAP4':(1 186,1 190),'PC':(1 190,1 191),'PUSH8':(1 191,1 192),'CODECOPY': (1 192,1 199),'SWAP5':(1 199,1 200)} |
Tab. 4 Some embedding process results
| 变量名称 | 变量值 |
|---|---|
{('PUSH1',3,1):'0',('DUP3',3,1):'0',('CODECOPY',1,1):'1',('DUP1',1,1):'0',('MLOAD',1,1):'0', ('BYTE',1,1):'0',…,('PUSH3',1,90):'1',('DUP3',1,39):'0',('SLOAD',1,7):'1',('PUSH3',1,91):'1', ('JUMP',1,72):'1',('JUMPDEST',1,90):'0'} | |
{'SSTORE':(0,5),'SUB':(5,17),'BYTE':(17,25),'PUSH26':(25,26),'SWAP11':(26,27),'DUP13':(27,28), 'PUSH32':(28,49),…,'SWAP4':(1 186,1 190),'PC':(1 190,1 191),'PUSH8':(1 191,1 192),'CODECOPY': (1 192,1 199),'SWAP5':(1 199,1 200)} |
| 序号 | 合约地址 | 操作码长度 | 载密容量/bit |
|---|---|---|---|
| 0001 | 0x50d4dd8cf5b8b6aa5c7253a7fbb258717a10ae22 | 3 897 | 3 619 |
| 0004 | 0x4d0691f7e64560f81380148f3c716a80db1766bf | 3 887 | 3 652 |
| 0024 | 0x69992cF0BFBE908b891BAda33350e3270b3C6776 | 9 521 | 9 000 |
| 1000 | 0x726CFE2bb4495c0CCB45F16fbD67Db8eB11766E6 | 7 915 | 7 561 |
| 2000 | 0x787695adf946b21e8093764925670b59a5e20a02 | 8 595 | 8 049 |
Tab. 5 Capacity statistics of some smart contracts
| 序号 | 合约地址 | 操作码长度 | 载密容量/bit |
|---|---|---|---|
| 0001 | 0x50d4dd8cf5b8b6aa5c7253a7fbb258717a10ae22 | 3 897 | 3 619 |
| 0004 | 0x4d0691f7e64560f81380148f3c716a80db1766bf | 3 887 | 3 652 |
| 0024 | 0x69992cF0BFBE908b891BAda33350e3270b3C6776 | 9 521 | 9 000 |
| 1000 | 0x726CFE2bb4495c0CCB45F16fbD67Db8eB11766E6 | 7 915 | 7 561 |
| 2000 | 0x787695adf946b21e8093764925670b59a5e20a02 | 8 595 | 8 049 |
| 方法 | 嵌入强度 | 是否链下 存储扩展 | 费用消耗/美元 |
|---|---|---|---|
| 文献[ | MB级 | 是 | 不少于单个交易费用 |
| 文献[ | KB级 | 否 | 不少于单个交易费用 |
| 文献[ | KB级 | 否 | 0 |
| 文献[ | MB级 | 是 | 1.47(单个交易费用) |
| 本文模型 | MB级 | 否 | 0 |
Tab. 6 Comparison of embedding strength and cost consumption of covert communication methods
| 方法 | 嵌入强度 | 是否链下 存储扩展 | 费用消耗/美元 |
|---|---|---|---|
| 文献[ | MB级 | 是 | 不少于单个交易费用 |
| 文献[ | KB级 | 否 | 不少于单个交易费用 |
| 文献[ | KB级 | 否 | 0 |
| 文献[ | MB级 | 是 | 1.47(单个交易费用) |
| 本文模型 | MB级 | 否 | 0 |
| [1] | 苑文昕,陈兴蜀,朱毅,等. 基于深度学习的 HTTP 负载隐蔽信道检测方法[J]. 信息网络安全, 2023, 23(7): 53-63. |
| YUAN W X, CHEN X S, ZHU Y, et al. HTTP payload covert channel detection method based on deep learning[J]. Netinfo Security, 2023, 23(7): 53-63. | |
| [2] | SIMMONS G J. The prisoners’ problem and the subliminal channel[C]// Advances in cryptology: Proceedings of Crypto 1984. Berlin: Springer, 1984: 51-67. |
| [3] | PARTALA J. Provably secure covert communication on blockchain[J]. Cryptography, 2018, 2(3): No.18. |
| [4] | 佘维,霍丽娟,田钊,等. 面向纯文本信息隐藏的区块链隐蔽通信模型[J]. 计算机科学, 2022, 49(1): 345-352. |
| SHE W, HUO L J, TIAN Z, et al. Blockchain covert communication model for plain text information hiding[J]. Computer Science, 2022, 49(1): 345-352. | |
| [5] | 佘维,荣欣鹏,刘炜,等. 基于马尔可夫链的生成式区块链隐蔽通信模型[J]. 通信学报, 2022, 43(10): 121-132. |
| SHE W, RONG X P, LIU W, et al. Generative blockchain-based covert communication model based on Markov chain[J]. Journal on Communications, 2022, 43(10): 121-132. | |
| [6] | ZHANG L, ZHANG Z, WANG W, et al. Research on a covert communication model realized by using smart contracts in blockchain environment[J]. IEEE Systems Journal, 2022, 16(2): 2822-2833. |
| [7] | 佘维,马天祥,冯海格,等. 基于合约调用掩盖下的区块链隐蔽通信方法[J]. 计算机应用, 2025, 45(9): 2865-2872. |
| SHE W, MA T X, FENG H G, et al. Blockchain covert communication method based on contract call concealment[J]. Journal of Computer Applications, 2025, 45(9): 2865-2872. | |
| [8] | LI Y, CHEN W, HUANG X, et al. Efficient covert communication scheme based on Ethereum[C]// Proceedings of the IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications. Piscataway: IEEE, 2023: 249-256. |
| [9] | ZHANG T, WU Q, WANG Q, et al. Covert communication via blockchain: hiding patterns and communication patterns[J]. Computer Standards and Interfaces, 2024, 90: No.103851. |
| [10] | 佘维,马佳伟,张淑慧,等. 基于动态时间型二叉树的隐蔽通信模型[J]. 通信学报, 2025, 46(2): 147-165. |
| SHE W, MA J W, ZHANG S H, et al. Covert communication model based on dynamic time binary trees[J]. Journal on Communications, 2025, 46(2): 147-165. | |
| [11] | LUO X, ZHANG P, ZHANG M, et al. A novel covert communication method based on bitcoin transaction[J]. IEEE Transactions on Industrial Informatics, 2022, 18(4): 2830-2839. |
| [12] | TIAN Y, LIAO X, DONG L, et al. Amount-based covert communication over blockchain[J]. IEEE Transactions on Network and Service Management, 2024, 21(3): 3095-3111. |
| [13] | 熊礼治,朱蓉,付章杰. 基于交易构造和转发机制的区块链网络隐蔽通信方法[J]. 通信学报, 2022, 43(8): 176-187. |
| XIONG L Z, ZHU R, FU Z J. Covert communication method of blockchain network based on transaction construction and forwarding mechanism[J]. Journal on Communications, 2022, 43(8): 176-187. | |
| [14] | ZHU L, LIU Q, CHEN Z, et al. A novel covert timing channel based on bitcoin messages[J]. IEEE Transactions on Computers, 2023, 72(10): 2913-2924. |
| [15] | CHEN Z, ZHU L, JIANG P, et al. Tackling data mining risks: a tripartite covert channel merging blockchain and IPFS[J]. IEEE Transactions on Network Science and Engineering, 2025, 12(3): 1831-1848. |
| [16] | 朱方圆. 区块链技术在供应链金融中应用探讨[J]. 合作经济与科技, 2025(10): 62-64. |
| ZHU F Y. Discussion on the application of blockchain technology in supply chain finance[J]. Co-Operative Economy and Science, 2025(10): 62-64. | |
| [17] | 林丹,林凯欣,吴嘉婧,等. 基于字节码的以太坊智能合约分类方法[J]. 网络与信息安全学报, 2022, 8(5): 111-120. |
| LIN D, LIN K X, WU J J, et al. Bytecode-based approach for Ethereum smart contract classification[J]. Chinese Journal of Network and Information Security, 2022, 8(5): 111-120. | |
| [18] | CHEN Z, ZHU L, JIANG P, et al. Blockchain meets covert communication: a survey[J]. IEEE Communications Surveys and Tutorials, 2022, 24(4): 2163-2192. |
| [19] | HEGADI R, PATIL A P. A statistical analysis on in-built pseudo random number generators using NIST test suite[C] // Proceedings of the 5th International Conference on Computing, Communication and Security. Piscataway: IEEE, 2020: 1-6. |
| [20] | HU M, WANG H. Mutual information-optimized steganalysis for generative steganography[J]. IEEE Transactions on Information Forensics and Security, 2025, 20: 1852-1865. |
| [1] | Wei SHE, Tianxiang MA, Haige FENG, Zhao TIAN, Wei LIU. Blockchain covert communication method based on contract call concealment [J]. Journal of Computer Applications, 2025, 45(9): 2865-2872. |
| [2] | Haiyang PENG, Weixing JI, Fawang LIU. Blockchain-based data notarization model for autonomous driving simulation testing [J]. Journal of Computer Applications, 2025, 45(8): 2421-2427. |
| [3] | Li’e WANG, Caiyi LIN, Yongdong LI, Xingcheng FU, Xianxian LI. Digital content copyright protection and fair tracking scheme based on blockchain [J]. Journal of Computer Applications, 2025, 45(6): 1756-1765. |
| [4] | Jingfeng WEI, Zhongyuan YAO, Shuosen MA, Chao WANG, Shangkun GUO, Ziqiang ZHU, Xueming SI. Review of blockchain technology applications in carbon emission trading system [J]. Journal of Computer Applications, 2025, 45(12): 3872-3880. |
| [5] | Yushu LI, Ying XING, Siqi LU, Heng PAN, Senchun CHAI, Xueming SI. Deep learning-based vulnerability detection tool for C/C++ smart contracts at function-body slice level [J]. Journal of Computer Applications, 2025, 45(11): 3493-3501. |
| [6] | Xinyang LUO, Wunan WAN, Shibin ZHANG, Jinquan ZHANG. Trust management scheme for internet of vehicles based on blockchain and multi-attribute decision making [J]. Journal of Computer Applications, 2025, 45(11): 3470-3476. |
| [7] | Chunxia LIU, Hanying XU, Gaimei GAO, Weichao DANG, Zilu LI. Smart contract vulnerability detection method based on echo state network [J]. Journal of Computer Applications, 2025, 45(1): 153-161. |
| [8] | He HUANG, Yu JIN. Cloud data auditing scheme based on voting and Ethereum smart contracts [J]. Journal of Computer Applications, 2024, 44(7): 2093-2101. |
| [9] | Peng FANG, Fan ZHAO, Baoquan WANG, Yi WANG, Tonghai JIANG. Development, technologies and applications of blockchain 3.0 [J]. Journal of Computer Applications, 2024, 44(12): 3647-3657. |
| [10] | Chaoying YAN, Ziyi ZHANG, Yingnan QU, Qiuyu LI, Dixiang ZHENG, Lijun SUN. Double auction carbon trading based on consortium blockchain [J]. Journal of Computer Applications, 2024, 44(10): 3240-3245. |
| [11] | Luyu CHEN, Xiaofeng MA, Jing HE, Shengzhi GONG, Jian GAO. Blockchain smart contract privacy authorization method based on TrustZone [J]. Journal of Computer Applications, 2023, 43(6): 1969-1978. |
| [12] | Meng CAO, Sunjie YU, Hui ZENG, Hongzhou SHI. Hierarchical access control and sharing system of medical data based on blockchain [J]. Journal of Computer Applications, 2023, 43(5): 1518-1526. |
| [13] | Yihan WANG, Chen TANG, Lan ZHANG. Anti-fraud and anti-tampering online trading mechanism for bulk stock [J]. Journal of Computer Applications, 2023, 43(4): 1309-1317. |
| [14] | Juncheng TONG, Bo ZHAO. Review on blockchain smart contract vulnerability detection and automatic repair [J]. Journal of Computer Applications, 2023, 43(3): 785-793. |
| [15] | Jinwei PU, Qingjian GAO, Xin ZHENG, Yinghui XU. SM4 resistant differential power analysis lightweight threshold implementation [J]. Journal of Computer Applications, 2023, 43(11): 3490-3496. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||