Characterizing the Cost of Introducing Secure Programming Patterns and Practices in Ethereum
暂无分享,去创建一个
[1] Sergei Tikhomirov,et al. SmartCheck: Static Analysis of Ethereum Smart Contracts , 2018, 2018 IEEE/ACM 1st International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB).
[2] James A. Whittaker,et al. How to Break Web Software: Functional and Security Testing of Web Applications and Web Services , 2006 .
[3] David A. Wheeler,et al. Secure Programming for Linux and Unix HOWTO , 2003 .
[4] Sukrit Kalra,et al. ZEUS: Analyzing Safety of Smart Contracts , 2018, NDSS.
[5] Massimo Bartoletti,et al. A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.
[6] Xiapu Luo,et al. Under-optimized smart contracts devour your money , 2017, 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER).
[7] Charles P. Pfleeger,et al. Security in computing , 1988 .
[8] Peter Sommerlad,et al. Security Patterns: Integrating Security and Systems Engineering , 2006 .
[9] Uwe Zdun,et al. Smart contracts: security patterns in the ethereum ecosystem and solidity , 2018, 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE).
[10] Chris Dannen. Bridging the Blockchain Knowledge Gap , 2017 .
[11] Ramesh Nagappan,et al. Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management , 2005 .
[12] Marlon Dumas,et al. Optimized Execution of Business Processes on Blockchain , 2016, BPM.
[13] Austen Rainer,et al. Case Study Research in Software Engineering - Guidelines and Examples , 2012 .
[14] Hironori Washizaki,et al. A survey on security patterns , 2008 .
[15] Peter McBurney,et al. Validation and Verification of Smart Contracts: A Research Agenda , 2017, Computer.