暂无分享,去创建一个
Giovanni Vigna | Dipanjan Das | Christopher Kruegel | Yu Feng | Priyanka Bose | Yanju Chen | C. Kruegel | Yu Feng | Giovanni Vigna | Dipanjan Das | P. Bose | Yanju Chen | G. Vigna | Priyanka Bose
[1] Emina Torlak,et al. Scaling symbolic evaluation for automated verification of systems code with Serval , 2019, SOSP.
[2] Ye Liu,et al. ContractFuzzer: Fuzzing Smart Contracts for Vulnerability Detection , 2018, 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[3] Chao Wang,et al. Conc-iSE: Incremental symbolic execution of concurrent software , 2016, 2016 31st IEEE/ACM International Conference on Automated Software Engineering (ASE).
[4] Massimo Bartoletti,et al. A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.
[5] Marie-Laure Potet,et al. Finding the needle in the heap: combining static analysis and dynamic symbolic execution to trigger use-after-free , 2016, SSPREW '16.
[6] Prateek Saxena,et al. Exploiting the laws of order in smart contracts , 2018, ISSTA.
[7] Clara Schneidewind,et al. eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts , 2020, CCS.
[8] Valentin Wüstholz,et al. Harvey: a greybox fuzzer for smart contracts , 2019, ESEC/SIGSOFT FSE.
[9] Ghassan O. Karame,et al. Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks , 2018, NDSS.
[10] Yannis Smaragdakis,et al. Precise static modeling of Ethereum “memory” , 2020, Proc. ACM Program. Lang..
[11] Emina Torlak,et al. Nickel: A Framework for Design and Verification of Information Flow Control Systems , 2018, OSDI.
[12] Anna Philippou,et al. Tools and Algorithms for the Construction and Analysis of Systems , 2018, Lecture Notes in Computer Science.
[13] Sergei Tikhomirov,et al. SmartCheck: Static Analysis of Ethereum Smart Contracts , 2018, 2018 IEEE/ACM 1st International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB).
[14] Yinqian Zhang,et al. TXSPECTOR: Uncovering Attacks in Ethereum from Transactions , 2020, USENIX Security Symposium.
[15] Patrice Godefroid,et al. Compositional dynamic test generation , 2007, POPL '07.
[16] Chenxiong Qian,et al. Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[17] Ittai Abraham,et al. Online detection of effectively callback free objects with applications to smart contracts , 2017, Proc. ACM Program. Lang..
[18] Petar Tsankov,et al. Securify: Practical Security Analysis of Smart Contracts , 2018, CCS.
[19] Yannis Smaragdakis,et al. MadMax: surviving out-of-gas conditions in Ethereum smart contracts , 2018, Proc. ACM Program. Lang..
[20] Alex Groce,et al. Slither: A Static Analysis Framework for Smart Contracts , 2019, 2019 IEEE/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB).
[21] Junfeng Yang,et al. Verifying systems rules using rule-directed symbolic execution , 2013, ASPLOS '13.
[22] Emina Torlak,et al. A lightweight symbolic virtual machine for solver-aided host languages , 2014, PLDI.
[23] Valentin Wüstholz,et al. Targeted Greybox Fuzzing with Static Lookahead Analysis , 2019, 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE).
[24] Thorsten Holz,et al. ETHBMC: A Bounded Model Checker for Smart Contracts , 2020, USENIX Security Symposium.
[25] Deian Stefan,et al. Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code , 2020, USENIX Security Symposium.
[26] Chengyu Zhang,et al. Detecting nondeterministic payment bugs in Ethereum smart contracts , 2019, Proc. ACM Program. Lang..
[27] Jun Sun,et al. sFuzz: An Efficient Adaptive Fuzzer for Solidity Smart Contracts , 2020, 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE).
[28] Stephen McCamant,et al. Statically-directed dynamic automated test generation , 2011, ISSTA '11.
[29] Benjamin Livshits,et al. Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited , 2021, USENIX Security Symposium.
[30] Xi Wang,et al. Hyperkernel: Push-Button Verification of an OS Kernel , 2017, SOSP.
[31] A. Yu. Gerasimov. Directed Dynamic Symbolic Execution for Static Analysis Warnings Confirmation , 2018, Program. Comput. Softw..
[32] Yuxing Tang,et al. SODA: A Generic Online Detection Framework for Smart Contracts , 2020, NDSS.
[33] Rastislav Bodik,et al. Summary-Based Symbolic Evaluation for Smart Contracts , 2020, 2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[34] Andrew C. Myers,et al. Compositional Security for Reentrant Applications , 2021, 2021 IEEE Symposium on Security and Privacy (SP).
[35] Chao Wang,et al. Assertion guided symbolic execution of multithreaded programs , 2015, ESEC/SIGSOFT FSE.
[36] Yannis Smaragdakis,et al. Gigahorse: Thorough, Declarative Decompilation of Smart Contracts , 2019, 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE).
[37] Christian Rossow,et al. teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts , 2018, USENIX Security Symposium.
[38] Vincent Gramoli,et al. Vandal: A Scalable Security Analysis Framework for Smart Contracts , 2018, ArXiv.
[39] Fernando Magno Quintão Pereira,et al. A fast and low-overhead technique to secure programs against integer overflows , 2013, Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization (CGO).
[40] Jun Sun,et al. Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity , 2020, 2020 IEEE Symposium on Security and Privacy (SP).
[41] Nikolai Tillmann,et al. Demand-Driven Compositional Symbolic Execution , 2008, TACAS.
[42] Prateek Saxena,et al. Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..
[43] Emina Torlak,et al. Precise Attack Synthesis for Smart Contracts , 2019, ArXiv.
[44] Sukrit Kalra,et al. ZEUS: Analyzing Safety of Smart Contracts , 2018, NDSS.