共 41 条
[1]
Abdellatif T, 2018, INT CONF NEW TECHNOL
[2]
Alt L, 2018, LECT NOTES COMPUT SC, V11247, P376, DOI 10.1007/978-3-030-03427-6_28
[3]
[Anonymous], 2005, Technical Report
[4]
[Anonymous], 2019, ETHEREUM CONSTANTINO
[5]
[Anonymous], 2004, JOT, DOI [10.5381/jot.2004.3.6.a2, DOI 10.5381/JOT.2004.3.6.A2]
[6]
[Anonymous], 2018, NIST-National Vulnerability Database
[7]
Antonopoulos A. M., 2019, Mastering Ethereum: Building Smart Contracts and DApps, V1st ed.
[8]
A Survey of Attacks on Ethereum Smart Contracts (SoK)
[J].
PRINCIPLES OF SECURITY AND TRUST (POST 2017),
2017, 10204
:164-186
[9]
Barrett Clark, 2011, Computer Aided Verification. Proceedings 23rd International Conference, CAV 2011, P171, DOI 10.1007/978-3-642-22110-1_14
[10]
Barrett C., 2018, Handbook of Model Checking, P305, DOI DOI 10.1007/978-3-319-10575-8_11