共 12 条
[1]
Brumley D., 2007, RICH AUTOMATICALLY P, P28
[2]
Buterin V., 2013, GitHub repository
[3]
BRICK: A Binary Tool for Run-time Detecting and Locating Integer-based Vulnerability
[J].
2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2,
2009,
:208-215
[4]
Dannenberg R. B., 2010, Proceedings of the 2010 IEEE 21st International Symposium on Software Reliability Engineering (ISSRE 2010), P91, DOI 10.1109/ISSRE.2010.29
[5]
Dietz W, 2012, PROC INT CONF SOFTW, P760, DOI 10.1109/ICSE.2012.6227142
[6]
ZEUS: Analyzing Safety of Smart Contracts
[J].
25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018),
2018,
[7]
ReGuard: Finding Reentrancy Bugs in Smart Contracts
[J].
PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - COMPANION (ICSE-COMPANION,
2018,
:65-68
[8]
S-GRAM: Towards Semantic-Aware Security Auditing for Ethereum Smart Contracts
[J].
PROCEEDINGS OF THE 2018 33RD IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMTED SOFTWARE ENGINEERING (ASE' 18),
2018,
:814-819
[9]
Making Smart Contracts Smarter
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:254-269
[10]
Molnar D., 2009, 18 USENIX SEC S MONT, P67