Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts
暂无分享,去创建一个
Ari Juels | Florian Tramèr | Lorenz Breidenbach | Philip Daian | A. Juels | Florian Tramèr | Philip Daian | Lorenz Breidenbach
[1] Brian Randell,et al. System structure for software fault tolerance , 1975, IEEE Transactions on Software Engineering.
[2] Dave E. Eckhardt,et al. A Theoretical Basis for the Analysis of Multiversion Software Subject to Coincident Errors , 1985, IEEE Transactions on Software Engineering.
[3] Nancy G. Leveson,et al. An experimental evaluation of the assumption of independence in multiversion programming , 1986, IEEE Transactions on Software Engineering.
[4] Nancy G. Leveson,et al. A reply to the criticisms of the Knight & Leveson experiment , 1990, SOEN.
[5] David F. McAllister,et al. An Experimental Evaluation of Software Redundancy as a Strategy For Improving Reliability , 1991, IEEE Trans. Software Eng..
[6] Algirdas A. Avi. The Methodology of N-Version Programming , 1995 .
[7] Nick Szabo,et al. Formalizing and Securing Relationships on Public Networks , 1997, First Monday.
[8] Markus Jakobsson,et al. X-Cash: Executable Digital Cash , 1998, Financial Cryptography.
[9] W. M. McKeeman,et al. Differential Testing for Software , 1998, Digit. Tech. J..
[10] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[11] Steven J. Murdoch,et al. Embedding Covert Channels into TCP/IP , 2005, Information Hiding.
[12] Richard Ford,et al. N-Version programming for the detection of zero-day exploits , 2006 .
[13] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[14] Martin C. Libicki,et al. Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar , 2014 .
[15] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[16] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[17] Jason Teutsch,et al. Demystifying Incentives in the Consensus Computer , 2015, CCS.
[18] Elaine Shi,et al. Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab , 2016, Financial Cryptography Workshops.
[19] Elaine Shi,et al. The Ring of Gyges: Investigating the Future of Criminal Smart Contracts , 2016, CCS.
[20] Fan Zhang,et al. Town Crier: An Authenticated Data Feed for Smart Contracts , 2016, CCS.
[21] Nikhil Swamy,et al. Formal Verification of Smart Contracts: Short Paper , 2016, PLAS@CCS.
[22] Prateek Saxena,et al. Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..
[23] Ari Juels,et al. Setting Standards for Altering and Undoing Smart Contracts , 2016, RuleML.
[24] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[25] Massimo Bartoletti,et al. A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.
[26] Nishant Rodrigues,et al. KEVM: A Complete Semantics of the Ethereum Virtual Machine , 2017 .
[27] Fan Zhang,et al. Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).
[28] Yoichi Hirai,et al. Defining the Ethereum Virtual Machine for Interactive Theorem Provers , 2017, Financial Cryptography Workshops.
[29] Christian Rossow,et al. teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts , 2018, USENIX Security Symposium.
[30] Sidney Amani,et al. Towards verifying ethereum smart contract bytecode in Isabelle/HOL , 2018, CPP.
[31] C. Ern. Information hiding techniques for steganography and digital watermarking , 2018 .