共 82 条
[1]
ETHIR: A Framework for High-Level Analysis of Ethereum Bytecode
[J].
AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS (ATVA 2018),
2018, 11138
:513-520
[2]
Alharby M, 2018, 2018 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, BIG DATA AND BLOCKCHAIN (ICCBB 2018), P96
[3]
Allen F. E., 1970, ACM Sigplan Notices, V5, P1
[5]
Ant, Antlr
[6]
Eth2Vec: Learning contract-wide code representations for vulnerability detection on Ethereum smart contracts
[J].
BLOCKCHAIN-RESEARCH AND APPLICATIONS,
2022, 3 (04)
[7]
SoK: Unraveling Bitcoin Smart Contracts
[J].
PRINCIPLES OF SECURITY AND TRUST, POST 2018,
2018, 10804
:217-242
[8]
A Survey of Attacks on Ethereum Smart Contracts (SoK)
[J].
PRINCIPLES OF SECURITY AND TRUST (POST 2017),
2017, 10204
:164-186
[9]
Behkish Nassirzadeh, 2023, Mathematical Research for Blockchain Economy, P143
[10]
Bose P, 2022, P IEEE S SECUR PRIV, P161, DOI [10.1109/SP46214.2022.9833721, 10.1109/SP46214.2022.00072]