A survey on Blockchain Technology and its




Download 0,66 Mb.
Pdf ko'rish
bet24/28
Sana18.12.2023
Hajmi0,66 Mb.
#122650
1   ...   20   21   22   23   24   25   26   27   28
Bog'liq
Huaqun Xingjie - A Survey on blockchain Technology and its Security - 2022 March

Distributed Systems Security (NDSS) Symposium, San 
Diego, CA, USA, 2018.
[96] L. Luu, D.-H. Chu, H. Olickel, P. Saxena and A. Hobor, 
"Making Smart Contracts Smarter," in The 2016 ACM 
SIGSAC Conference on Computer and Communications 
Security (CCS'16), October 2016.
[97] "Mythril," 
Accessed 
Apr 
7, 
2021 
from 
https://github.com/ConsenSys/mythril, 2018. 
[98] J. Frank, C. Aschermann and T. Holz, "EthBMC: A 
Bounded Model Checker for Smart Contracts," in 29th 
USENIX Security Symposium, 2020.
[99] M. Mossberg, F. Manzano, E. Hennenfent, A. Groce, G. 
Grieco, J. Feist, T. Brunson and A. Dinaburg, 
"Manticore: A User-Friendly Symbolic Execution 
Framework for Binaries and Smart Contracts," in 34th 
IEEE/ACM International Conference on Automated 
Software Engineering (ASE), San Diego, CA, USA, 
2019.
[100] I. Nikolic, A. Kolluri, I. Sergey, P. Saxena and A. Hobor, 
"Finding The Greedy, Prodigal, and Suicidal Contracts 
at Scale," in The 34th Annual Computer Security 
Applications Conference (ACSAC), 2018.
[101] N. Grech, M. Kong, A. Jurisevic, L. Brent, B. Scholz and 
Y. Smaragdakis, "MadMax: Surviving Out-of-Gas 
Conditions in Ethereum Smart Contracts," in ACM on 
Programming Languages, 2018.
[102] C. F. Torres, J. Schütte and R. State, "Osiris: Hunting for 
Integer Bugs in Ethereum Smart Contracts," in 34th 
Annual Computer Security Applications Conference 
(ACSAC), 2018.
[103] M. Zhang, X. Zhang, Y. Zhang and Z. Lin, "TxSpector: 
Uncovering Attacks in Ethereum from Transactions," in 
29th USENIX Security Symposium, 2020.
[104] S. Zhou, Z. Yang, J. Xiang, Y. Cao, M. Yang and Y. 
Zhang, "An Ever-evolving Game: Evaluation of Real-
world Attacks and Defenses in Ethereum Ecosystem," in 
29th USENIX Security Symposium, 2020.
[105] C. F. Torres and M. Steichen, "The Art of The Scam: 
Demystifying Honeypots in Ethereum Smart Contracts," 
in 28th USENIX Security Symposium, Santa Clara, CA, 
USA, 2019.
[106] A. Gervais, G. O. Karame, K. Wüst, V. Glykantzis, H. 
Ritzdorf and S. Capkun, "On the Security and 
Performance of Proof of Work Blockchains," in 2016 
ACM 
SIGSAC 
Conference 
on 
Computer 
and 
Communications Security, 2016.
[107] R. Zhang and B. Preneel, "Lay Down the Common 
Metrics: 
Evaluating 
Proof-of-Work 
Consensus 
Protocols' Security," in 2019 IEEE Symposium on 
Security and Privacy, San Francisco, CA, USA, 2019.
[108] B. Jiang, Y. Liu and W. Chan, "ContractFuzzer: Fuzzing 
Smart Contracts for Vulnerability Detection," in 
Proceedings of the 33rd ACM/IEEE International 
Conference on Automated Software Engineering, 2018.
[109] C. Liu, H. Liu, Z. Cao, Z. Chen, B. Chen and B. Roscoe, 
"ReGuard: finding reentrancy bugs in smart contracts," 
in The 40th International Conference on Software 
Engineering: Companion, 2018.
[110] Y. Fu, M. Ren, F. Ma, H. Shi, X. Yang, Y. Jiang, H. Li 
and X. Shi, "EVMFuzzer: detect EVM vulnerabilities via 
fuzz testing," in 27th ACM Joint Meeting on European 
Software Engineering Conference and Symposium on the 
Foundations of Software Engineering, 2019.
[111] V. Wustholz and M. Christakis, "HARVEY: A Greybox 
Fuzzer for Smart Contracts," in The 28th ACM Joint 
Meeting on European Software Engineering Conference 
and Symposium on the Foundations of Software 
Engineering, 2020.
[112] L. Luu, Y. Velner, J. Teutsch and P. Saxena, 
"SMARTPOOL: 
Practical 
Decentralized 
Pooled 
Mining," in 26th USENIX Security Symposium
Vancouver, BC, Canada, 2017.
[113] M. Drijvers, K. Edalatnejad, B. Ford, E. Kiltz, J. Loss, 
G. Neven and I. Stepanovs, "On the Security of Two-
Round Multi-Signatures," in 40th IEEE Symposium on 

Download 0,66 Mb.
1   ...   20   21   22   23   24   25   26   27   28




Download 0,66 Mb.
Pdf ko'rish