暂无分享,去创建一个
Lei Ma | Yang Liu | Haijun Wang | Yinxing Xue | Yun Lin | Yi Li | Mingliang Ma | Jiaming Ye | Tianyong Peng
[1] Jason Bennett Thatcher,et al. Blockchain Technology in Business and Information Systems Research , 2017, Business & Information Systems Engineering.
[2] Heejo Lee,et al. VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[3] Chanchal Kumar Roy,et al. NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization , 2008, 2008 16th IEEE International Conference on Program Comprehension.
[4] D. Defays,et al. An Efficient Algorithm for a Complete Link Method , 1977, Comput. J..
[5] Yang Liu,et al. BinGo: cross-architecture cross-OS binary search , 2016, SIGSOFT FSE.
[6] Chanchal K. Roy,et al. A Survey on Software Clone Detection Research , 2007 .
[7] Prateek Saxena,et al. Exploiting the laws of order in smart contracts , 2018, ISSTA.
[8] R. Doolittle,et al. Progressive sequence alignment as a prerequisitetto correct phylogenetic trees , 2007, Journal of Molecular Evolution.
[9] Xin Chen,et al. The DAO attack paradoxes in propositional logic , 2017, 2017 4th International Conference on Systems and Informatics (ICSAI).
[10] Zhendong Su,et al. DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones , 2007, 29th International Conference on Software Engineering (ICSE'07).
[11] Yaniv David,et al. Tracelet-based code search in executables , 2014, PLDI.
[12] Jun Sun,et al. Detecting differences across multiple instances of code clones , 2014, ICSE.
[13] Martin Emms. Clustering by Tree Distance for Parse Tree Normalisation , 2006, NLUCS.
[14] Sergei Tikhomirov,et al. SmartCheck: Static Analysis of Ethereum Smart Contracts , 2018, 2018 IEEE/ACM 1st International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB).
[15] Sukrit Kalra,et al. ZEUS: Analyzing Safety of Smart Contracts , 2018, NDSS.
[16] Massimo Bartoletti,et al. A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.
[17] Prateek Saxena,et al. Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..
[18] Alex Groce,et al. Slither: A Static Analysis Framework for Smart Contracts , 2019, 2019 IEEE/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB).
[19] David Maier,et al. The Complexity of Some Problems on Subsequences and Supersequences , 1978, JACM.
[20] Shouhuai Xu,et al. VulPecker: an automated vulnerability detection system based on code similarity analysis , 2016, ACSAC.
[21] Nikolaj Bjørner,et al. Z3: An Efficient SMT Solver , 2008, TACAS.
[22] Prateek Saxena,et al. Finding The Greedy, Prodigal, and Suicidal Contracts at Scale , 2018, ACSAC.
[23] Nikolaus Augsten,et al. Efficient Computation of the Tree Edit Distance , 2015, TODS.
[24] Jorge A. Navas,et al. The SeaHorn Verification Framework , 2015, CAV.
[25] Petar Tsankov,et al. Securify: Practical Security Analysis of Smart Contracts , 2018, CCS.
[26] Shinji Kusumoto,et al. CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code , 2002, IEEE Trans. Software Eng..
[27] Nick Szabo,et al. Smart Contracts: Building Blocks for Digital Markets , 2018 .
[28] Ittai Abraham,et al. Online detection of effectively callback free objects with applications to smart contracts , 2017, Proc. ACM Program. Lang..