共 36 条
[2]
Amani S, 2018, PROCEEDINGS OF THE 7TH ACM SIGPLAN INTERNATIONAL CONFERENCE ON CERTIFIED PROGRAMS AND PROOFS, CPP 2018, P66, DOI 10.1145/3167084
[3]
A Survey of Attacks on Ethereum Smart Contracts (SoK)
[J].
PRINCIPLES OF SECURITY AND TRUST (POST 2017),
2017, 10204
:164-186
[4]
Baier C, 2008, PRINCIPLES OF MODEL CHECKING, P1
[6]
Formal Verification of Smart Contracts Short Paper
[J].
PROCEEDINGS OF THE 2016 ACM WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY (PLAS'16),
2016,
:91-96
[8]
Chen T, 2017, 2017 IEEE 24TH INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), P442, DOI 10.1109/SANER.2017.7884650
[9]
Cimatti A., 2002, Computer Aided Verification, volume 2404 of Lecture Notes in Computer Science, P359, DOI DOI 10.1007/3-540-45657-0_29