Making contract users safer: Toward building a Safe Browsing platform on Ethereum

[1]  Xiaotao Feng,et al.  Detecting Vulnerability on IoT Device Firmware: A Survey , 2023, IEEE/CAA Journal of Automatica Sinica.

[2]  S. Wen,et al.  Event detection in online social network: Methodologies, state-of-art, and evolution , 2022, Comput. Sci. Rev..

[3]  Xingliang Yuan,et al.  Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum , 2022, RAID.

[4]  Yuefeng Du,et al.  Enhancing Cryptocurrency Blocklisting: A Secure, Trustless, and Effective Realization , 2022, 2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS).

[5]  Sheng Wen,et al.  Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey , 2022, IEEE/CAA Journal of Automatica Sinica.

[6]  S. Çamtepe,et al.  Fuzzing: A Survey for Roadmap , 2022, ACM Comput. Surv..

[7]  J. Keung,et al.  Predicting the precise number of software defects: Are we there yet? , 2022, Inf. Softw. Technol..

[8]  Zhiwen Xie,et al.  Improving Ponzi Scheme Contract Detection Using Multi-Channel TextCNN and Transformer , 2021, Sensors.

[9]  Xinyu Wang,et al.  PPSB: An Open and Flexible Platform for Privacy-Preserving Safe Browsing , 2021, IEEE Transactions on Dependable and Secure Computing.

[10]  Giovanni Vigna,et al.  SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds , 2021, 2022 IEEE Symposium on Security and Privacy (SP).

[11]  J. Keung,et al.  A Multi-Modal Transformer-based Code Summarization Approach for Smart Contracts , 2021, 2021 IEEE/ACM 29th International Conference on Program Comprehension (ICPC).

[12]  Benjamin Livshits,et al.  On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols , 2021, 2021 IEEE Symposium on Security and Privacy (SP).

[13]  Long H. Pham,et al.  SGUARD: Towards Fixing Vulnerable Smart Contracts Automatically , 2021, 2021 IEEE Symposium on Security and Privacy (SP).

[14]  ZhangJun,et al.  A Survey of Android Malware Detection with Deep Neural Models , 2020, ACM Comput. Surv..

[15]  Xingliang Yuan,et al.  Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem , 2020 .

[16]  Sheng Wen,et al.  Software Vulnerability Detection Using Deep Neural Networks: A Survey , 2020, Proceedings of the IEEE.

[17]  Lei Wu,et al.  Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum , 2020, ACM Trans. Softw. Eng. Methodol..

[18]  Dimitar Dimitrov,et al.  VerX: Safety Verification of Smart Contracts , 2020, 2020 IEEE Symposium on Security and Privacy (SP).

[19]  Jun Sun,et al.  Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity , 2020, 2020 IEEE Symposium on Security and Privacy (SP).

[20]  Zhou Xu,et al.  Improving Ranking-Oriented Defect Prediction Using a Cost-Sensitive Ranking SVM , 2020, IEEE Transactions on Reliability.

[21]  Simon Bell,et al.  An Analysis of Phishing Blacklists: Google Safe Browsing, OpenPhish, and PhishTank , 2020, ACSW.

[22]  Zibin Zheng,et al.  Who Are the Phishers? Phishing Scam Detection on Ethereum via Network Embedding , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[23]  Mislav Balunovic,et al.  Learning to Fuzz from Symbolic Execution with Application to Smart Contracts , 2019, CCS.

[24]  Heejo Lee,et al.  VERISMART: A Highly Precise Safety Verifier for Ethereum Smart Contracts , 2019, 2020 IEEE Symposium on Security and Privacy (SP).

[25]  Radu State,et al.  Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts , 2018, ACSAC.

[26]  Ghassan O. Karame,et al.  Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks , 2018, NDSS.

[27]  Xiao Chen,et al.  Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection , 2018, IEEE Transactions on Information Forensics and Security.

[28]  Ye Liu,et al.  ContractFuzzer: Fuzzing Smart Contracts for Vulnerability Detection , 2018, 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE).

[29]  Petar Tsankov,et al.  Securify: Practical Security Analysis of Smart Contracts , 2018, CCS.

[30]  Prateek Saxena,et al.  Finding The Greedy, Prodigal, and Suicidal Contracts at Scale , 2018, ACSAC.

[31]  Prateek Saxena,et al.  Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..

[32]  Bin Fan,et al.  Cuckoo Filter: Practically Better Than Bloom , 2014, CoNEXT.

[33]  Zahra Moravej,et al.  Secure SCADA communication by using a modified key management scheme. , 2013, ISA transactions.

[34]  Yuxing Tang,et al.  SODA: A Generic Online Detection Framework for Smart Contracts , 2020, NDSS.

[35]  Sukrit Kalra,et al.  ZEUS: Analyzing Safety of Smart Contracts , 2018, NDSS.