共 32 条
[1]
Ahrendt W., 2019, PRINCIPLED SOFTWARE, P1, DOI [10.1007/978-3-319-98047-8_1, DOI 10.1007/978-3-319-98047-8_1]
[3]
Amani S., 2018, P 7 ACM SIGPLAN INT, DOI [10.1145/3167084, DOI 10.1145/3167084]
[4]
A Survey of Attacks on Ethereum Smart Contracts (SoK)
[J].
PRINCIPLES OF SECURITY AND TRUST (POST 2017),
2017, 10204
:164-186
[5]
Bartocci Ezio, 2018, Lectures on Runtime. Verification Introductory and Advanced Topics. LNCS 10457, P1, DOI 10.1007/978-3-319-75632-5_1
[6]
Formal Verification of Smart Contracts Short Paper
[J].
PROCEEDINGS OF THE 2016 ACM WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY (PLAS'16),
2016,
:91-96
[7]
Bodden E, 2007, LECT NOTES COMPUT SC, V4609, P525
[8]
Bodden E, 2010, LECT NOTES COMPUT SC, V6418, P183, DOI 10.1007/978-3-642-16612-9_15
[9]
Colombo C., 2013, ECEASST, V58
[10]
Colombo C., 2018, LNCS, V11247