|
A survey on Blockchain Technology and itsBog'liq Huaqun Xingjie - A Survey on blockchain Technology and its Security - 2022 MarchDistributed Systems Security (NDSS) Symposium, San
Diego, CA, USA, 2018.
[96] L. Luu, D.-H. Chu, H. Olickel, P. Saxena and A. Hobor,
"Making Smart Contracts Smarter," in The 2016 ACM
SIGSAC Conference on Computer and Communications
Security (CCS'16), October 2016.
[97] "Mythril,"
Accessed
Apr
7,
2021
from
https://github.com/ConsenSys/mythril, 2018.
[98] J. Frank, C. Aschermann and T. Holz, "EthBMC: A
Bounded Model Checker for Smart Contracts," in 29th
USENIX Security Symposium, 2020.
[99] M. Mossberg, F. Manzano, E. Hennenfent, A. Groce, G.
Grieco, J. Feist, T. Brunson and A. Dinaburg,
"Manticore: A User-Friendly Symbolic Execution
Framework for Binaries and Smart Contracts," in 34th
IEEE/ACM International Conference on Automated
Software Engineering (ASE), San Diego, CA, USA,
2019.
[100] I. Nikolic, A. Kolluri, I. Sergey, P. Saxena and A. Hobor,
"Finding The Greedy, Prodigal, and Suicidal Contracts
at Scale," in The 34th Annual Computer Security
Applications Conference (ACSAC), 2018.
[101] N. Grech, M. Kong, A. Jurisevic, L. Brent, B. Scholz and
Y. Smaragdakis, "MadMax: Surviving Out-of-Gas
Conditions in Ethereum Smart Contracts," in ACM on
Programming Languages, 2018.
[102] C. F. Torres, J. Schütte and R. State, "Osiris: Hunting for
Integer Bugs in Ethereum Smart Contracts," in 34th
Annual Computer Security Applications Conference
(ACSAC), 2018.
[103] M. Zhang, X. Zhang, Y. Zhang and Z. Lin, "TxSpector:
Uncovering Attacks in Ethereum from Transactions," in
29th USENIX Security Symposium, 2020.
[104] S. Zhou, Z. Yang, J. Xiang, Y. Cao, M. Yang and Y.
Zhang, "An Ever-evolving Game: Evaluation of Real-
world Attacks and Defenses in Ethereum Ecosystem," in
29th USENIX Security Symposium, 2020.
[105] C. F. Torres and M. Steichen, "The Art of The Scam:
Demystifying Honeypots in Ethereum Smart Contracts,"
in 28th USENIX Security Symposium, Santa Clara, CA,
USA, 2019.
[106] A. Gervais, G. O. Karame, K. Wüst, V. Glykantzis, H.
Ritzdorf and S. Capkun, "On the Security and
Performance of Proof of Work Blockchains," in 2016
ACM
SIGSAC
Conference
on
Computer
and
Communications Security, 2016.
[107] R. Zhang and B. Preneel, "Lay Down the Common
Metrics:
Evaluating
Proof-of-Work
Consensus
Protocols' Security," in 2019 IEEE Symposium on
Security and Privacy, San Francisco, CA, USA, 2019.
[108] B. Jiang, Y. Liu and W. Chan, "ContractFuzzer: Fuzzing
Smart Contracts for Vulnerability Detection," in
Proceedings of the 33rd ACM/IEEE International
Conference on Automated Software Engineering, 2018.
[109] C. Liu, H. Liu, Z. Cao, Z. Chen, B. Chen and B. Roscoe,
"ReGuard: finding reentrancy bugs in smart contracts,"
in The 40th International Conference on Software
Engineering: Companion, 2018.
[110] Y. Fu, M. Ren, F. Ma, H. Shi, X. Yang, Y. Jiang, H. Li
and X. Shi, "EVMFuzzer: detect EVM vulnerabilities via
fuzz testing," in 27th ACM Joint Meeting on European
Software Engineering Conference and Symposium on the
Foundations of Software Engineering, 2019.
[111] V. Wustholz and M. Christakis, "HARVEY: A Greybox
Fuzzer for Smart Contracts," in The 28th ACM Joint
Meeting on European Software Engineering Conference
and Symposium on the Foundations of Software
Engineering, 2020.
[112] L. Luu, Y. Velner, J. Teutsch and P. Saxena,
"SMARTPOOL:
Practical
Decentralized
Pooled
Mining," in 26th USENIX Security Symposium,
Vancouver, BC, Canada, 2017.
[113] M. Drijvers, K. Edalatnejad, B. Ford, E. Kiltz, J. Loss,
G. Neven and I. Stepanovs, "On the Security of Two-
Round Multi-Signatures," in 40th IEEE Symposium on
|
| |