A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and Defenses
暂无分享,去创建一个
[1] Vincent Gramoli,et al. The Balance Attack or Why Forkable Blockchains are Ill-Suited for Consortium , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[2] Yi Zhang,et al. KEVM: A Complete Formal Semantics of the Ethereum Virtual Machine , 2018, 2018 IEEE 31st Computer Security Foundations Symposium (CSF).
[3] Albert Rubio,et al. EthIR: A Framework for High-Level Analysis of Ethereum Bytecode , 2018, ATVA.
[4] Shouhuai Xu,et al. Metrics Towards Measuring Cyber Agility , 2019, IEEE Transactions on Information Forensics and Security.
[5] Shouhuai Xu,et al. Emergent behavior in cybersecurity , 2014, HotSoS '14.
[6] Andreas G. Veneris,et al. Astraea: A Decentralized Blockchain Oracle , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[7] Yannis Smaragdakis,et al. MadMax: surviving out-of-gas conditions in Ethereum smart contracts , 2018, Proc. ACM Program. Lang..
[8] Ittai Abraham,et al. Online detection of effectively callback free objects with applications to smart contracts , 2017, Proc. ACM Program. Lang..
[9] Yi Zhou,et al. Erays: Reverse Engineering Ethereum's Opaque Smart Contracts , 2018, USENIX Security Symposium.
[10] Aron Laszka,et al. Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach , 2017, Financial Cryptography.
[11] Yonggang Wen,et al. A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks , 2018, IEEE Access.
[12] Ghassan O. Karame,et al. Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks , 2018, NDSS.
[13] Wei Ni,et al. Attack and Defence of Ethereum Remote APIs , 2018, 2018 IEEE Globecom Workshops (GC Wkshps).
[14] Massimo Bartoletti,et al. Dissecting Ponzi schemes on Ethereum: identification, analysis, and impact , 2017, Future Gener. Comput. Syst..
[15] Shouhuai Xu,et al. Characterizing the power of moving target defense via cyber epidemic dynamics , 2014, HotSoS '14.
[16] Rui Zhang,et al. Security and Privacy on Blockchain , 2019, ACM Comput. Surv..
[17] Sourav Sengupta,et al. Towards Safer Smart Contracts: A Sequence Learning Approach to Detecting Vulnerabilities , 2018, ArXiv.
[18] Ao Li,et al. Detecting Standard Violation Errors in Smart Contracts , 2018, ArXiv.
[19] Shouhuai Xu,et al. Active cyber defense dynamics exhibiting rich phenomena , 2015, HotSoS.
[20] Ilya Sergey,et al. Scilla: a Smart Contract Intermediate-Level LAnguage , 2018, ArXiv.
[21] Matteo Maffei,et al. Foundations and Tools for the Static Analysis of Ethereum Smart Contracts , 2018, CAV.
[22] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[23] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[24] Steve Omohundro,et al. Cryptocurrencies, smart contracts, and artificial intelligence , 2014, SIGAI.
[25] Patrick Cousot,et al. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints , 1977, POPL.
[26] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[27] Sidney Amani,et al. Towards verifying ethereum smart contract bytecode in Isabelle/HOL , 2018, CPP.
[28] Thomas Engel,et al. The state of affairs in BGP security: A survey of attacks and defenses , 2018, Comput. Commun..
[29] Nikhil Swamy,et al. Formal Verification of Smart Contracts: Short Paper , 2016, PLAS@CCS.
[30] Arthur Gervais,et al. Ethereum Eclipse Attacks , 2016 .
[31] Pierre-Yves Strub,et al. Dependent types and multi-monadic effects in F* , 2016, POPL.
[32] Gordon J. Pace,et al. Runtime Verification of Ethereum Smart Contracts , 2018, 2018 14th European Dependable Computing Conference (EDCC).
[33] Ethan Heilman,et al. Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network , 2020, IACR Cryptol. ePrint Arch..
[34] Shouhuai Xu,et al. Unified Preventive and Reactive Cyber Defense Dynamics Is Still Globally Convergent , 2019, IEEE/ACM Transactions on Networking.
[35] Raimir Holanda Filho,et al. Model-Based Quantitative Network Security Metrics: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[36] William J. Knottenbelt,et al. Towards Safer Smart Contracts: A Survey of Languages and Verification Methods , 2018, ArXiv.
[37] Pieter H. Hartel,et al. Rethinking Blockchain Security: Position Paper , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[38] Marko Vukolic,et al. Blockchain Consensus Protocols in the Wild , 2017, DISC.
[39] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[40] Prateek Saxena,et al. Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..
[41] Huashan Chen,et al. Quantifying the security effectiveness of firewalls and DMZs , 2018, HotSoS.
[42] Vincent Gramoli,et al. From blockchain consensus back to Byzantine consensus , 2017, Future Gener. Comput. Syst..
[43] Shouhuai Xu,et al. Cyber Epidemic Models with Dependences , 2015, Internet Math..
[44] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[45] Jason Teutsch,et al. SmartPool: Practical Decentralized Pooled Mining , 2017, USENIX Security Symposium.
[46] Jun Zhang,et al. A Nonoutsourceable Puzzle Under GHOST Rule , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).
[47] Shouhuai Xu,et al. Preventive and Reactive Cyber Defense Dynamics Is Globally Stable , 2016, IEEE Transactions on Network Science and Engineering.
[48] Peng Jiang,et al. A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..
[49] Grigore Rosu,et al. An overview of the K semantic framework , 2010, J. Log. Algebraic Methods Program..
[50] Aviv Zohar,et al. Secure High-Rate Transaction Processing in Bitcoin , 2015, Financial Cryptography.
[51] Michael J. Coblenz. Obsidian: A Safer Blockchain Programming Language , 2017, 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C).
[52] Yonggang Wen,et al. A Survey on Consensus Mechanisms and Mining Management in Blockchain Networks , 2018, ArXiv.
[53] Shouhuai Xu,et al. Cybersecurity dynamics , 2014, HotSoS '14.
[54] Aziz Mohaisen,et al. Domain Name System Security and Privacy: Old Problems and New Challenges , 2016, ArXiv.
[55] Meng Shen,et al. Data Security and Privacy in Bitcoin System: A Survey , 2020, Journal of Computer Science and Technology.
[56] Christian Rossow,et al. teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts , 2018, USENIX Security Symposium.
[57] Prateek Saxena,et al. Finding The Greedy, Prodigal, and Suicidal Contracts at Scale , 2018, ACSAC.
[58] Emin Gün Sirer,et al. (Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work , 2017, Financial Cryptography Workshops.
[59] Ning Zhang,et al. A Survey of Distributed Consensus Protocols for Blockchain Networks , 2019, IEEE Communications Surveys & Tutorials.
[60] Sukrit Kalra,et al. ZEUS: Analyzing Safety of Smart Contracts , 2018, NDSS.
[61] Massimo Bartoletti,et al. A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.
[62] Sophia Drossopoulou,et al. Writing safe smart contracts in Flint , 2018, Programming.
[63] Matteo Maffei,et al. A Semantic Framework for the Security Analysis of Ethereum smart contracts , 2018, POST.
[64] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[65] George Danezis,et al. Consensus in the Age of Blockchains , 2017, ArXiv.
[66] Andrew Miller,et al. Measuring Ethereum Network Peers , 2018, Internet Measurement Conference.
[67] Robert M. Hierons,et al. Smart contracts vulnerabilities: a call for blockchain software engineering? , 2018, 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE).
[68] Alf Zugenmaier,et al. The Impact of Uncle Rewards on Selfish Mining in Ethereum , 2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[69] Hubert Ritzdorf,et al. On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..
[70] Yi Zhang,et al. A formal verification tool for Ethereum VM bytecode , 2018, ESEC/SIGSOFT FSE.
[71] Bo Gao,et al. sCompile: Critical Path Identification and Analysis for Smart Contracts , 2018, ICFEM.
[72] Ying Wang,et al. An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks , 2017, ISPEC.
[73] Ye Liu,et al. ContractFuzzer: Fuzzing Smart Contracts for Vulnerability Detection , 2018, 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[74] Aziz Mohaisen,et al. Exploring the Attack Surface of Blockchain: A Systematic Overview , 2019, ArXiv.
[75] Nancy A. Lynch,et al. Impossibility of distributed consensus with one faulty process , 1985, JACM.
[76] Petar Tsankov,et al. Securify: Practical Security Analysis of Smart Contracts , 2018, CCS.
[77] Shouhuai Xu,et al. Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity , 2020, Proactive and Dynamic Network Defense.
[78] Zhong Chen,et al. ReGuard: Finding Reentrancy Bugs in Smart Contracts , 2018, 2018 IEEE/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion).
[79] Chen Feng,et al. Selfish Mining in Ethereum , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).
[80] Gernot Salzer,et al. A Survey of Tools for Analyzing Ethereum Smart Contracts , 2019, 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON).
[81] Simon Kim. Measuring Ethereum's peer-to-peer network , 2017 .
[82] Marcus Pendleton,et al. A Survey on Systems Security Metrics , 2016, ACM Comput. Surv..
[83] Uwe Zdun,et al. Smart contracts: security patterns in the ethereum ecosystem and solidity , 2018, 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE).
[84] Yoichi Hirai,et al. Defining the Ethereum Virtual Machine for Interactive Theorem Provers , 2017, Financial Cryptography Workshops.
[85] William H. Sanders,et al. Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.
[86] James C. King,et al. Symbolic execution and program testing , 1976, CACM.
[87] Vincent Gramoli,et al. Vandal: A Scalable Security Analysis Framework for Smart Contracts , 2018, ArXiv.
[88] Mauro Conti,et al. A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.
[89] Alan Mislove,et al. Stick a fork in it: Analyzing the Ethereum network partition , 2017, HotNets.
[90] Fan Zhang,et al. Town Crier: An Authenticated Data Feed for Smart Contracts , 2016, CCS.
[91] Lawrence Charles Paulson,et al. Isabelle/HOL: A Proof Assistant for Higher-Order Logic , 2002 .
[92] Sergei Tikhomirov,et al. SmartCheck: Static Analysis of Ethereum Smart Contracts , 2018, 2018 IEEE/ACM 1st International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB).
[93] Russell O'Connor,et al. Simplicity: A New Language for Blockchains , 2017, PLAS@CCS.
[94] Björn Scheuermann,et al. Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.
[95] Elaine Shi,et al. Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab , 2016, Financial Cryptography Workshops.