共 23 条
[1]
Barnat J, CAV 13
[2]
Bauer L, PLDI 05
[3]
Formal Verification of Smart Contracts Short Paper
[J].
PROCEEDINGS OF THE 2016 ACM WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY (PLAS'16),
2016,
:91-96
[4]
Bjorner N, SMT 12
[5]
Bradely A. R, VMCAI 2011
[6]
Practical byzantine fault tolerance and proactive recovery
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2002, 20 (04)
:398-461
[7]
Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016,
2016, 9604
:79-94
[8]
IRM enforcement of Java']Java stack inspection
[J].
2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2000,
:246-255
[9]
Flexible policy-directed code safety
[J].
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
1999,
:32-45
[10]
Gurfinkel A., CAV 15