Online detection of effectively callback free objects with applications to smart contracts
暂无分享,去创建一个
Ittai Abraham | Noam Rinetzky | Shmuel Sagiv | Guy Golan-Gueta | Yoni Zohar | Shelly Grossman | Yan Michalevsky | Shmuel Sagiv | Ittai Abraham | Guy Golan-Gueta | Yan Michalevsky | Shelly Grossman | N. Rinetzky | Yoni Zohar
[1] Nikhil Swamy,et al. Formal Verification of Smart Contracts: Short Paper , 2016, PLAS@CCS.
[2] K. Rustan M. Leino,et al. Modular Verification of Static Class Invariants , 2005, FM.
[3] Leslie Lamport,et al. Time, clocks, and the ordering of events in a distributed system , 1978, CACM.
[4] Gary T. Leavens,et al. Proceedings of the 3rd annual conference on Systems, programming, and applications: software for humanity , 2012, SPLASH 2012.
[5] Prateek Saxena,et al. Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..
[6] Elaine Shi,et al. Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab , 2016, Financial Cryptography Workshops.
[7] Francesco Logozzo. Class invariants as abstract interpretation of trace semantics , 2009, Comput. Lang. Syst. Struct..
[8] K. Rustan M. Leino,et al. Dafny: An Automatic Program Verifier for Functional Correctness , 2010, LPAR.
[9] C. A. R. Hoare,et al. Proof of correctness of data representations , 1972, Acta Informatica.
[10] Ondrej Lhoták,et al. Averroes: Whole-Program Analysis without the Whole Program , 2013, ECOOP.
[11] Edsger W. Dijkstra,et al. A Discipline of Programming , 1976 .
[12] Nick Szabo,et al. Formalizing and Securing Relationships on Public Networks , 1997, First Monday.
[13] Ilya Sergey,et al. A Concurrent Perspective on Smart Contracts , 2017, Financial Cryptography Workshops.
[14] Jean-Christophe Filliâtre,et al. Why3 - Where Programs Meet Provers , 2013, ESOP.
[15] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[16] K. Rustan M. Leino,et al. Data abstraction and information hiding , 2002, TOPL.
[17] Javier Esparza,et al. Reachability Analysis of Pushdown Automata: Application to Model-Checking , 1997, CONCUR.
[18] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[19] Anindya Banerjee,et al. Ownership confinement ensures representation independence for object-oriented programs , 2002, JACM.
[20] Jeffrey D. Ullman,et al. Introduction to Automata Theory, Languages and Computation , 1979 .
[21] Hongseok Yang,et al. Liveness-Preserving Atomicity Abstraction , 2011, ICALP.
[22] Rob Pike. Go at Google , 2012, SPLASH '12.