Summary-Based Symbolic Evaluation for Smart Contracts
暂无分享,去创建一个
Rastislav Bodik | Emina Torlak | Yu Feng | Yu Feng | R. Bodík | E. Torlak | Rastislav Bodík | Emina Torlak
[1] Yi Zhang,et al. A formal verification tool for Ethereum VM bytecode , 2018, ESEC/SIGSOFT FSE.
[2] Matteo Maffei,et al. A Semantic Framework for the Security Analysis of Ethereum smart contracts , 2018, POST.
[3] Yannis Smaragdakis,et al. MadMax: surviving out-of-gas conditions in Ethereum smart contracts , 2018, Proc. ACM Program. Lang..
[4] Ittai Abraham,et al. Online detection of effectively callback free objects with applications to smart contracts , 2017, Proc. ACM Program. Lang..
[5] Prateek Saxena,et al. Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..
[6] David Brumley,et al. AEG: Automatic Exploit Generation , 2011, NDSS.
[7] David Brumley,et al. Unleashing Mayhem on Binary Code , 2012, 2012 IEEE Symposium on Security and Privacy.
[8] Patrick Cousot,et al. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints , 1977, POPL.
[9] Zvonimir Rakamaric,et al. SMACK: Decoupling Source Language Details from Verifier Implementations , 2014, CAV.
[10] Armin Biere,et al. Boolector 2 . 0 system description , 2015 .
[11] Emina Torlak,et al. A lightweight symbolic virtual machine for solver-aided host languages , 2014, PLDI.
[12] C. Cordell Green,et al. What Is Program Synthesis? , 1985, J. Autom. Reason..
[13] Patrice Godefroid,et al. Compositional dynamic test generation , 2007, POPL '07.
[14] Rajeev Alur,et al. Syntax-guided synthesis , 2013, 2013 Formal Methods in Computer-Aided Design.
[15] Marsha Chechik,et al. Tools and Algorithms for the Construction and Analysis of Systems , 2016, Lecture Notes in Computer Science.
[16] Roberto Baldoni,et al. A Survey of Symbolic Execution Techniques , 2016, ACM Comput. Surv..
[17] Ye Liu,et al. ContractFuzzer: Fuzzing Smart Contracts for Vulnerability Detection , 2018, 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[18] Sukrit Kalra,et al. ZEUS: Analyzing Safety of Smart Contracts , 2018, NDSS.
[19] Massimo Bartoletti,et al. A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.
[20] Petar Tsankov,et al. Securify: Practical Security Analysis of Smart Contracts , 2018, CCS.
[21] Nikolai Tillmann,et al. Demand-Driven Compositional Symbolic Execution , 2008, TACAS.
[22] Yoichi Hirai,et al. Defining the Ethereum Virtual Machine for Interactive Theorem Provers , 2017, Financial Cryptography Workshops.
[23] James C. King,et al. Symbolic execution and program testing , 1976, CACM.
[24] Christian Rossow,et al. teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts , 2018, USENIX Security Symposium.
[25] Dawson R. Engler,et al. RWset: Attacking Path Explosion in Constraint-Based Test Generation , 2008, TACAS.