Ethainter: a smart contract security analyzer for composite vulnerabilities
Smart contracts on permissionless blockchains are exposed to inherent security risks due to
interactions with untrusted entities. Static analyzers are essential for identifying security risks …
interactions with untrusted entities. Static analyzers are essential for identifying security risks …
Ityfuzz: Snapshot-based fuzzer for smart contract
Smart contracts are critical financial instruments, and their security is of utmost importance.
However, smart contract programs are difficult to fuzz due to the persistent blockchain state …
However, smart contract programs are difficult to fuzz due to the persistent blockchain state …
[PDF][PDF] Ethscope: A transaction-centric security analytics framework to detect malicious smart contracts on ethereum
As one of the representative blockchain platforms, Ethereum has attracted lots of attacks.
Due to the potential financial loss, there is a pressing need to detect malicious smart …
Due to the potential financial loss, there is a pressing need to detect malicious smart …
Shaping blockchain technology for securing supply chains
Purchases in supply chains involve a network of suppliers, manufacturers, logistics or even
customers needed for the procurement of goods or services. These are needed to operate a …
customers needed for the procurement of goods or services. These are needed to operate a …
Security vulnerabilities in smart contracts as specifications in linear temporal logic
I Ray - 2021 - uwspace.uwaterloo.ca
Ethereum is a distributed computer with a native cryptocurrency. Like other monetary
transaction based systems, a problem this platform faces is accounts and transactions being …
transaction based systems, a problem this platform faces is accounts and transactions being …
Survey on Quality Assurance of Smart Contracts
With the increasing adoption of smart contracts, ensuring their security has become a critical
concern. Numerous vulnerabilities and attacks have been identified and exploited, resulting …
concern. Numerous vulnerabilities and attacks have been identified and exploited, resulting …