Making contract users safer: Toward building a Safe Browsing platform on Ethereum
暂无分享,去创建一个
[1] Xiaotao Feng,et al. Detecting Vulnerability on IoT Device Firmware: A Survey , 2023, IEEE/CAA Journal of Automatica Sinica.
[2] S. Wen,et al. Event detection in online social network: Methodologies, state-of-art, and evolution , 2022, Comput. Sci. Rev..
[3] Xingliang Yuan,et al. Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval of ERC20 Tokens on Ethereum , 2022, RAID.
[4] Yuefeng Du,et al. Enhancing Cryptocurrency Blocklisting: A Secure, Trustless, and Effective Realization , 2022, 2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS).
[5] Sheng Wen,et al. Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey , 2022, IEEE/CAA Journal of Automatica Sinica.
[6] S. Çamtepe,et al. Fuzzing: A Survey for Roadmap , 2022, ACM Comput. Surv..
[7] J. Keung,et al. Predicting the precise number of software defects: Are we there yet? , 2022, Inf. Softw. Technol..
[8] Zhiwen Xie,et al. Improving Ponzi Scheme Contract Detection Using Multi-Channel TextCNN and Transformer , 2021, Sensors.
[9] Xinyu Wang,et al. PPSB: An Open and Flexible Platform for Privacy-Preserving Safe Browsing , 2021, IEEE Transactions on Dependable and Secure Computing.
[10] Giovanni Vigna,et al. SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds , 2021, 2022 IEEE Symposium on Security and Privacy (SP).
[11] J. Keung,et al. A Multi-Modal Transformer-based Code Summarization Approach for Smart Contracts , 2021, 2021 IEEE/ACM 29th International Conference on Program Comprehension (ICPC).
[12] Benjamin Livshits,et al. On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols , 2021, 2021 IEEE Symposium on Security and Privacy (SP).
[13] Long H. Pham,et al. SGUARD: Towards Fixing Vulnerable Smart Contracts Automatically , 2021, 2021 IEEE Symposium on Security and Privacy (SP).
[14] ZhangJun,et al. A Survey of Android Malware Detection with Deep Neural Models , 2020, ACM Comput. Surv..
[15] Xingliang Yuan,et al. Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem , 2020 .
[16] Sheng Wen,et al. Software Vulnerability Detection Using Deep Neural Networks: A Survey , 2020, Proceedings of the IEEE.
[17] Lei Wu,et al. Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum , 2020, ACM Trans. Softw. Eng. Methodol..
[18] Dimitar Dimitrov,et al. VerX: Safety Verification of Smart Contracts , 2020, 2020 IEEE Symposium on Security and Privacy (SP).
[19] Jun Sun,et al. Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity , 2020, 2020 IEEE Symposium on Security and Privacy (SP).
[20] Zhou Xu,et al. Improving Ranking-Oriented Defect Prediction Using a Cost-Sensitive Ranking SVM , 2020, IEEE Transactions on Reliability.
[21] Simon Bell,et al. An Analysis of Phishing Blacklists: Google Safe Browsing, OpenPhish, and PhishTank , 2020, ACSW.
[22] Zibin Zheng,et al. Who Are the Phishers? Phishing Scam Detection on Ethereum via Network Embedding , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[23] Mislav Balunovic,et al. Learning to Fuzz from Symbolic Execution with Application to Smart Contracts , 2019, CCS.
[24] Heejo Lee,et al. VERISMART: A Highly Precise Safety Verifier for Ethereum Smart Contracts , 2019, 2020 IEEE Symposium on Security and Privacy (SP).
[25] Radu State,et al. Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts , 2018, ACSAC.
[26] Ghassan O. Karame,et al. Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks , 2018, NDSS.
[27] Xiao Chen,et al. Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection , 2018, IEEE Transactions on Information Forensics and Security.
[28] Ye Liu,et al. ContractFuzzer: Fuzzing Smart Contracts for Vulnerability Detection , 2018, 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[29] Petar Tsankov,et al. Securify: Practical Security Analysis of Smart Contracts , 2018, CCS.
[30] Prateek Saxena,et al. Finding The Greedy, Prodigal, and Suicidal Contracts at Scale , 2018, ACSAC.
[31] Prateek Saxena,et al. Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..
[32] Bin Fan,et al. Cuckoo Filter: Practically Better Than Bloom , 2014, CoNEXT.
[33] Zahra Moravej,et al. Secure SCADA communication by using a modified key management scheme. , 2013, ISA transactions.
[34] Yuxing Tang,et al. SODA: A Generic Online Detection Framework for Smart Contracts , 2020, NDSS.
[35] Sukrit Kalra,et al. ZEUS: Analyzing Safety of Smart Contracts , 2018, NDSS.