ETHBMC: A Bounded Model Checker for Smart Contracts
暂无分享,去创建一个
[1] George Danezis,et al. Consensus in the Age of Blockchains , 2017, ArXiv.
[2] David Brumley,et al. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) , 2010, 2010 IEEE Symposium on Security and Privacy.
[3] Alex Groce,et al. Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts , 2019, 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[4] Zohar Manna,et al. The calculus of computation - decision procedures with applications to verification , 2007 .
[5] Ran Canetti,et al. Universally Composable Commitments , 2001, CRYPTO.
[6] Carsten Sinz,et al. A Theory of Arrays with set and copy Operations , 2012, SMT@IJCAR.
[7] Matteo Maffei,et al. A Semantic Framework for the Security Analysis of Ethereum smart contracts , 2018, POST.
[8] Flemming Nielson,et al. Principles of Program Analysis , 1999, Springer Berlin Heidelberg.
[9] Stefan Dziembowski,et al. Perun: Virtual Payment Hubs over Cryptocurrencies , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[10] Nick Szabo,et al. Formalizing and Securing Relationships on Public Networks , 1997, First Monday.
[11] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[12] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[13] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[14] Dimitar Dimitrov,et al. VerX: Safety Verification of Smart Contracts , 2020, 2020 IEEE Symposium on Security and Privacy (SP).
[15] Christian Rossow,et al. teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts , 2018, USENIX Security Symposium.
[16] Carsten Sinz,et al. A Precise Memory Model for Low-Level Bounded Model Checking , 2010, SSV.
[17] Radu State,et al. Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts , 2018, ACSAC.
[18] David L. Dill,et al. A Decision Procedure for Bit-Vectors and Arrays , 2007, CAV.
[19] Matthew Green,et al. Bolt: Anonymous Payment Channels for Decentralized Currencies , 2017, CCS.
[20] Leslie Lamport,et al. Time, clocks, and the ordering of events in a distributed system , 1978, CACM.
[21] Nikolaj Bjørner,et al. Z3: An Efficient SMT Solver , 2008, TACAS.
[22] Prateek Saxena,et al. Finding The Greedy, Prodigal, and Suicidal Contracts at Scale , 2018, ACSAC.
[23] Christian Cachin,et al. Architecture of the Hyperledger Blockchain Fabric , 2016 .
[24] Dawson R. Engler,et al. EXE: automatically generating inputs of death , 2006, CCS '06.
[25] Alan Mislove,et al. Analyzing Ethereum's Contract Topology , 2018, Internet Measurement Conference.
[26] Petar Tsankov,et al. Securify: Practical Security Analysis of Smart Contracts , 2018, CCS.
[27] Sukrit Kalra,et al. ZEUS: Analyzing Safety of Smart Contracts , 2018, NDSS.
[28] Carsten Sinz,et al. Extending the Theory of Arrays: memset, memcpy, and Beyond , 2013, VSTTE.
[29] Armin Biere,et al. Boolector 2 . 0 system description , 2015 .
[30] Koushik Sen,et al. Symbolic execution for software testing: three decades later , 2013, CACM.
[31] James C. King,et al. Symbolic execution and program testing , 1976, CACM.
[32] Christopher Krügel,et al. Driller: Augmenting Fuzzing Through Selective Symbolic Execution , 2016, NDSS.
[33] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[34] George Danezis,et al. SoK: Consensus in the Age of Blockchains , 2017, AFT.
[35] Nishant Rodrigues,et al. KEVM: A Complete Semantics of the Ethereum Virtual Machine , 2017 .
[36] Prateek Saxena,et al. Exploiting the laws of order in smart contracts , 2018, ISSTA.
[37] Prateek Saxena,et al. Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..
[38] Bruno Dutertre,et al. Yices 2.2 , 2014, CAV.
[39] Vincent Gramoli,et al. Vandal: A Scalable Security Analysis Framework for Smart Contracts , 2018, ArXiv.
[40] Yannis Smaragdakis,et al. MadMax: surviving out-of-gas conditions in Ethereum smart contracts , 2018, Proc. ACM Program. Lang..
[41] Yi Zhou,et al. Erays: Reverse Engineering Ethereum's Opaque Smart Contracts , 2018, USENIX Security Symposium.
[42] Ghassan O. Karame,et al. Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks , 2018, NDSS.